首页 > 最新文献

Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications最新文献

英文 中文
CERT Training Platform over the Event-Recordable Container 基于事件可记录容器的CERT培训平台
Namjun Kim, Chanmo Yang, Dae-Il Cho, Seung Hyeon Geum, Ki-Woong Park
The current COVID-19 pandemic has resulted in many changes in the IT systems and services of institutions, which also heightened the concerns regarding the potential increase in intrusion incidents, especially when most works in institutions are performed at home. The need for pre-training against intrusion incidents has then become extremely necessary. Unfortunately, current learning methods in existing studies are insufficient for application in the present demand because these methods were originally designed for environments that are tailored-fit for learners and not in actual environments. This paper proposes a training system, namely, computer emergency response team (CERT), that can be specifically designed for learners in an institution to provide intrusion-incident cases using a Web-based training system. CERT can easily replicate the service or system in an institution to a honeypot environment to automatically collect and classify intrusion incidents using diverse evaluation criteria so that learning can be achieved from different perspectives. Hence, the institution operating service and system can easily be replicated. Artifacts of intrusion incidents are collected using the Docker container technology and event-recordable container, which are analyzed using a Web browser without installing a separate program. Thus, optimal learning results from the analysis of actual attacks are expected.
当前的COVID-19大流行导致机构的IT系统和服务发生了许多变化,这也加剧了人们对入侵事件可能增加的担忧,特别是当机构的大多数工作都在家中进行时。因此,对入侵事件进行预培训就变得极其必要。不幸的是,现有研究中现有的学习方法不足以应用于当前的需求,因为这些方法最初是为学习者量身定制的环境而不是实际环境。本文提出了一个培训系统,即计算机应急响应小组(computer emergency response team, CERT),它可以专门为机构中的学习者设计,使用基于web的培训系统提供入侵事件案例。CERT可以轻松地将机构中的服务或系统复制到蜜罐环境中,使用不同的评估标准自动收集和分类入侵事件,从而从不同的角度进行学习。因此,运营服务和系统的机构很容易被复制。使用Docker容器技术和事件可记录容器收集入侵事件的工件,使用Web浏览器对其进行分析,而无需安装单独的程序。因此,期望从实际攻击的分析中获得最佳的学习结果。
{"title":"CERT Training Platform over the Event-Recordable Container","authors":"Namjun Kim, Chanmo Yang, Dae-Il Cho, Seung Hyeon Geum, Ki-Woong Park","doi":"10.1145/3440943.3444738","DOIUrl":"https://doi.org/10.1145/3440943.3444738","url":null,"abstract":"The current COVID-19 pandemic has resulted in many changes in the IT systems and services of institutions, which also heightened the concerns regarding the potential increase in intrusion incidents, especially when most works in institutions are performed at home. The need for pre-training against intrusion incidents has then become extremely necessary. Unfortunately, current learning methods in existing studies are insufficient for application in the present demand because these methods were originally designed for environments that are tailored-fit for learners and not in actual environments. This paper proposes a training system, namely, computer emergency response team (CERT), that can be specifically designed for learners in an institution to provide intrusion-incident cases using a Web-based training system. CERT can easily replicate the service or system in an institution to a honeypot environment to automatically collect and classify intrusion incidents using diverse evaluation criteria so that learning can be achieved from different perspectives. Hence, the institution operating service and system can easily be replicated. Artifacts of intrusion incidents are collected using the Docker container technology and event-recordable container, which are analyzed using a Web browser without installing a separate program. Thus, optimal learning results from the analysis of actual attacks are expected.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132973636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Implementation of Smart Aquarium System with Intelligent Sensors 智能传感器智能水族系统的实现
Tzer-Long Chen, Nan-Kai Hsieh, Jhih-Chung Chang, Ming Chen Ho, Y. Chang, Po-Ya Chuang
Fish-farming is an entertainment for many people, but changing the water always takes a lot of time. The temperature of water will be changed during changing the water, and the quality of the water usually affects the fish life. This research was accompanied with smart sensor and fish tanks to achieve the smart fish tank. The smart fish tank owns Wi-Fi module which could collect the information of environment and control switch to maintain temperature, quality, inflow and outflow of water. IFTTT is used to send message in the smart fish tank. Besides, the light opening time was controlled to be suitable for nature light time that can bring more convenience for owner.
对许多人来说,养鱼是一种娱乐,但换水总是要花很多时间。换水时水温会发生变化,水的质量通常会影响鱼的寿命。本研究配合智能传感器和智能鱼缸,实现智能鱼缸。智能鱼缸自带Wi-Fi模块,可以采集环境信息,控制开关,保持水温、水质、进出水量。在智能鱼缸中使用IFTTT发送信息。同时控制开灯时间,使之与自然光时间相适应,给业主带来更多的便利。
{"title":"The Implementation of Smart Aquarium System with Intelligent Sensors","authors":"Tzer-Long Chen, Nan-Kai Hsieh, Jhih-Chung Chang, Ming Chen Ho, Y. Chang, Po-Ya Chuang","doi":"10.1145/3440943.3444715","DOIUrl":"https://doi.org/10.1145/3440943.3444715","url":null,"abstract":"Fish-farming is an entertainment for many people, but changing the water always takes a lot of time. The temperature of water will be changed during changing the water, and the quality of the water usually affects the fish life. This research was accompanied with smart sensor and fish tanks to achieve the smart fish tank. The smart fish tank owns Wi-Fi module which could collect the information of environment and control switch to maintain temperature, quality, inflow and outflow of water. IFTTT is used to send message in the smart fish tank. Besides, the light opening time was controlled to be suitable for nature light time that can bring more convenience for owner.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129297946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Image Processing Approach for Improving the Recognition of Cluster-like Spheroidized Carbides 一种提高簇状球化碳化物识别的图像处理方法
Wesley Huang, K. Hsu, Chia-Sui Wang, Yih-Feng Chang, Chia-Mao Yei
This paper was mainly applied to image identification of metallographic structure of carbon steel. Though metallographic image identification is now needed by industry, it is rarely discussed in literature due to its industrial characteristics, let alone the theory of identifying complex structures. The identification of metallographic structure of common carbon steel is mostly carried out manually, which is mainly plagued by empiricism and subjective identification. This paper intended to calculate the percentage of spheroidized carbide in metallography. However, the distribution of carbides is affected by the insufficient heating process. For example, low heating temperature or short holding time will result in carbide connection, which leads to the reduction of the accuracy rate in calculating the spheroidization rate of carbide. However, the algorithm proposed in this paper mainly strengthens the accuracy rate of carbide cutting, and the connected carbide is morphologically cut to improve the identification accuracy rate. For carbide cutting, it is carried out in two stages. First, all disconnected components are cut by using the connected components, and then morphological erosion and expansion calculus are carried out for all carbides to cut connected carbides.
本文主要应用于碳钢金相组织的图像识别。虽然金相图像识别现在是工业上的需要,但由于其工业特性,文献中很少讨论,更不用说识别复杂结构的理论了。普通碳钢的金相组织鉴定多采用人工进行,主要受经验主义和主观鉴定的困扰。本文旨在计算球化碳化物在金相中的百分比。但由于加热过程不充分,影响了碳化物的分布。例如,加热温度过低或保温时间过短会导致碳化物连接,从而导致计算碳化物球化率的准确率降低。而本文提出的算法主要是加强硬质合金切割的准确率,对连接的硬质合金进行形态切割,提高识别准确率。硬质合金切削分两个阶段进行。首先用连通成分切割所有断连成分,然后对所有碳化物进行形态侵蚀和膨胀演算,切割连通碳化物。
{"title":"An Image Processing Approach for Improving the Recognition of Cluster-like Spheroidized Carbides","authors":"Wesley Huang, K. Hsu, Chia-Sui Wang, Yih-Feng Chang, Chia-Mao Yei","doi":"10.1145/3440943.3444746","DOIUrl":"https://doi.org/10.1145/3440943.3444746","url":null,"abstract":"This paper was mainly applied to image identification of metallographic structure of carbon steel. Though metallographic image identification is now needed by industry, it is rarely discussed in literature due to its industrial characteristics, let alone the theory of identifying complex structures. The identification of metallographic structure of common carbon steel is mostly carried out manually, which is mainly plagued by empiricism and subjective identification. This paper intended to calculate the percentage of spheroidized carbide in metallography. However, the distribution of carbides is affected by the insufficient heating process. For example, low heating temperature or short holding time will result in carbide connection, which leads to the reduction of the accuracy rate in calculating the spheroidization rate of carbide. However, the algorithm proposed in this paper mainly strengthens the accuracy rate of carbide cutting, and the connected carbide is morphologically cut to improve the identification accuracy rate. For carbide cutting, it is carried out in two stages. First, all disconnected components are cut by using the connected components, and then morphological erosion and expansion calculus are carried out for all carbides to cut connected carbides.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning 基于机器学习的工业控制系统异常检测技术研究
Janghoon Kim, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo
This study proposed an anomaly detection technique in an industrial control system using supervised and unsupervised machine learning algorithms. For the dataset for learning, the HIL-based Augmented ICS (HAI) dataset provided for the study on security in industrial control systems was used. For the learning model, Light Gradient Boosted Machine -- a supervised learning algorithm and One-Class Support Vector Machine and Isolation Forest as unsupervised learning algorithms were employed. The proposed technique is presented in this paper, which is organized as follows: Feature selection, Data preprocessing, Hyperparameter optimization and verification, and Experiment and analysis of results. The performance difference according to the algorithm and model configuration was exhibited through the experimental results. In addition, issues to be considered in model configuration and future study directions for anomaly detection techniques in industrial control systems were presented based on the experimental results.
本研究提出了一种基于监督和无监督机器学习算法的工业控制系统异常检测技术。用于学习的数据集,使用了基于hil的增强ICS (HAI)数据集,该数据集是为工业控制系统安全研究提供的。学习模型采用有监督学习算法Light Gradient boosting Machine和无监督学习算法One-Class Support Vector Machine和Isolation Forest。本文主要从特征选择、数据预处理、超参数优化与验证、实验与结果分析四个方面进行了介绍。实验结果显示了不同算法和模型配置的性能差异。此外,根据实验结果,提出了模型配置中需要考虑的问题和工业控制系统异常检测技术的未来研究方向。
{"title":"Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning","authors":"Janghoon Kim, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444743","DOIUrl":"https://doi.org/10.1145/3440943.3444743","url":null,"abstract":"This study proposed an anomaly detection technique in an industrial control system using supervised and unsupervised machine learning algorithms. For the dataset for learning, the HIL-based Augmented ICS (HAI) dataset provided for the study on security in industrial control systems was used. For the learning model, Light Gradient Boosted Machine -- a supervised learning algorithm and One-Class Support Vector Machine and Isolation Forest as unsupervised learning algorithms were employed. The proposed technique is presented in this paper, which is organized as follows: Feature selection, Data preprocessing, Hyperparameter optimization and verification, and Experiment and analysis of results. The performance difference according to the algorithm and model configuration was exhibited through the experimental results. In addition, issues to be considered in model configuration and future study directions for anomaly detection techniques in industrial control systems were presented based on the experimental results.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus 区块链加密货币实现机制研究:校园学习币
I. Chang, Ya-Hsueh Chuang, Tzer-Long Chen, Yiming Yin, Yen Ni Liu, T. Chen
The education reform has been thirty years since 1990, and in recent years the learning enthusiasm and class participation of student was decrease by the internet popularity. With the borderless online communication becoming more widespread, there are many information and method to learn, however, sometimes this information is inaccurate or wrong. No one can deny that the world is different than it was when our current teaching method was changed. According to education scholar's experience, the main reason for a lack of learning motivation. Several educators have already indicated that innovative teaching and curriculum such as PaGamo and MPAS that was applied by National Taiwan University prof. Ping-Cheng Yeh and Taichung Municipal Shuang Wen Junior High School Teacher Alex Wang. The PaGamo and MPAS used for get back for learning enthusiasm and motivation for student. This research will discussion the Blockchain technology and mobile app was used for campus learning coin to increase teaching effectiveness. The campus learning coin will be distributed in class and combined with consumption discount of campus to improve learning motivation and learning objectives.
自1990年以来,我国教育改革已经进行了三十年,近年来,由于网络的普及,学生的学习热情和课堂参与度有所下降。随着无边界的网络交流越来越普遍,有很多信息和方法可以学习,然而,有时这些信息是不准确的或错误的。没有人能否认,现在的世界与我们改变现行的教学方法时不同了。根据教育学者的经验,学习动机缺乏的主要原因。一些教育工作者已经指出了创新的教学和课程,如台湾大学叶平诚教授和台中市双文初中王立强老师所应用的PaGamo和MPAS。PaGamo和MPAS用于恢复学生的学习热情和动力。本研究将探讨区块链技术和移动应用被用于校园学习币,以提高教学效率。校园学习币将在课堂中发放,并结合校园消费折扣,提高学习动机和学习目标。
{"title":"A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus","authors":"I. Chang, Ya-Hsueh Chuang, Tzer-Long Chen, Yiming Yin, Yen Ni Liu, T. Chen","doi":"10.1145/3440943.3444337","DOIUrl":"https://doi.org/10.1145/3440943.3444337","url":null,"abstract":"The education reform has been thirty years since 1990, and in recent years the learning enthusiasm and class participation of student was decrease by the internet popularity. With the borderless online communication becoming more widespread, there are many information and method to learn, however, sometimes this information is inaccurate or wrong. No one can deny that the world is different than it was when our current teaching method was changed. According to education scholar's experience, the main reason for a lack of learning motivation. Several educators have already indicated that innovative teaching and curriculum such as PaGamo and MPAS that was applied by National Taiwan University prof. Ping-Cheng Yeh and Taichung Municipal Shuang Wen Junior High School Teacher Alex Wang. The PaGamo and MPAS used for get back for learning enthusiasm and motivation for student. This research will discussion the Blockchain technology and mobile app was used for campus learning coin to increase teaching effectiveness. The campus learning coin will be distributed in class and combined with consumption discount of campus to improve learning motivation and learning objectives.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129754915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Clicks-and-Mortar Smart System 点击和迫击炮智能系统
Yueh-Shiu Lee, Yen-Chiao Chuang, M. Chang, Mei-Wen Huang
1E-commerce nowadays has made its official way into the clicks-and-mortar era. The advantage of a clicks-and-mortar model is that the "mortar" counterpart can enjoy logistics support, which complements any operational inadequacy on the side of the virtual website - the "clicks" counterpart. In a clicks-and-mortar smart contract system, the clicks-and-mortar application enables any transaction to automatically execute each operational step. When a consumer selects a product and completes the payment for it, the smart contract can proceed to execute any terms established in its contents, ensuring the proper practice of every item in the contract.
如今,电子商务已经正式进入了点击和实体时代。“点击+实体”模式的优势在于,“实体”对手可以享受后勤支持,这补充了虚拟网站(“点击”对手)方面的任何运营不足。在点击和迫击炮智能合约系统中,点击和迫击炮应用程序允许任何交易自动执行每个操作步骤。当消费者选择产品并完成付款时,智能合约可以继续执行其内容中确定的任何条款,确保合约中的每一项都得到正确的执行。
{"title":"A Clicks-and-Mortar Smart System","authors":"Yueh-Shiu Lee, Yen-Chiao Chuang, M. Chang, Mei-Wen Huang","doi":"10.1145/3440943.3444342","DOIUrl":"https://doi.org/10.1145/3440943.3444342","url":null,"abstract":"1E-commerce nowadays has made its official way into the clicks-and-mortar era. The advantage of a clicks-and-mortar model is that the \"mortar\" counterpart can enjoy logistics support, which complements any operational inadequacy on the side of the virtual website - the \"clicks\" counterpart. In a clicks-and-mortar smart contract system, the clicks-and-mortar application enables any transaction to automatically execute each operational step. When a consumer selects a product and completes the payment for it, the smart contract can proceed to execute any terms established in its contents, ensuring the proper practice of every item in the contract.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset 基于机器学习的恶意软件检测与2019年KISA数据挑战数据集
Soonhong Kwon, HeeDong Yang, Manhee Lee, Jong‐Hyouk Lee
With the advent of the 4th industrial era, ICT technologies such as artificial intelligence and autonomous driving are rapidly developing. However, unlike these positive aspects, malicious hackers target IoT devices around us using malwares such as viruses, worms, and Trojan horses to steal confidential information or prevent IoT devices from operating normally. In addition, malicious hackers are developing and using intelligent and advanced malwares so that malware cannot be easily detected. In recent years, studied/development of malware detection technology using machine learning and deep learning technologies has been conducted to detect intelligent and advanced variants of malwares. In this paper, based on the KISA Data Challenge Dataset, basic machine learning based malware detection is performed and the limitations that have occurred are analyzed.
随着第四次工业时代的到来,人工智能、自动驾驶等信息通信技术迅速发展。然而,与这些积极方面不同的是,恶意黑客利用病毒、蠕虫和特洛伊木马等恶意软件攻击我们周围的物联网设备,窃取机密信息或阻止物联网设备正常运行。此外,恶意黑客正在开发和使用智能和高级恶意软件,因此恶意软件不容易被发现。近年来,利用机器学习和深度学习技术进行恶意软件检测技术的研究/开发,以检测恶意软件的智能和高级变体。本文基于KISA数据挑战数据集,进行了基于基本机器学习的恶意软件检测,并分析了已经出现的局限性。
{"title":"Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset","authors":"Soonhong Kwon, HeeDong Yang, Manhee Lee, Jong‐Hyouk Lee","doi":"10.1145/3440943.3444745","DOIUrl":"https://doi.org/10.1145/3440943.3444745","url":null,"abstract":"With the advent of the 4th industrial era, ICT technologies such as artificial intelligence and autonomous driving are rapidly developing. However, unlike these positive aspects, malicious hackers target IoT devices around us using malwares such as viruses, worms, and Trojan horses to steal confidential information or prevent IoT devices from operating normally. In addition, malicious hackers are developing and using intelligent and advanced malwares so that malware cannot be easily detected. In recent years, studied/development of malware detection technology using machine learning and deep learning technologies has been conducted to detect intelligent and advanced variants of malwares. In this paper, based on the KISA Data Challenge Dataset, basic machine learning based malware detection is performed and the limitations that have occurred are analyzed.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125739037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication RSA素数乘法中基于机器学习的剖析攻击方法
Han-Byeol Park, Bo-Yeon Sim, Dong‐Guk Han
In this paper, we propose a machine learning-based profiling attack on the prime multiplication operation of RSA's key generation algorithm. The proposed attack takes advantage of the fact that a prime word value, which is the data storage unit, is loaded in the process of the multiplication operation for generating a modulus. We selected a commonly used product-scanning method as a multiplication algorithm. Then we collected the power consumption traces and constructed a profile of the secret prime value based on machine learning. In addition, the success rate of the attack was measured within a single trace to perform a realistic attack during the key generation operation. The secret prime values were derived with a maximum success rate of 99.8% in a single trace. Based on this, this paper suggests that if the secret value is an operand of the multiplication operation, there may be vulnerability against side-channel attacks because of the characteristics of the multiplication algorithm.1
在本文中,我们提出了一种基于机器学习的分析攻击RSA密钥生成算法的素数乘法运算。所提出的攻击利用了在乘法运算过程中加载素数字值(即数据存储单元)以生成模数的事实。我们选择了一种常用的乘积扫描法作为乘法算法。然后,我们收集了功耗轨迹,并基于机器学习构造了秘密素数的轮廓。此外,在密钥生成操作期间,在单个跟踪中测量攻击的成功率,以执行真实的攻击。秘密素数的推导成功率最高可达99.8%。在此基础上,本文提出,如果秘密值是乘法运算的操作数,由于乘法算法的特性,可能存在易受侧信道攻击的漏洞
{"title":"Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication","authors":"Han-Byeol Park, Bo-Yeon Sim, Dong‐Guk Han","doi":"10.1145/3440943.3444730","DOIUrl":"https://doi.org/10.1145/3440943.3444730","url":null,"abstract":"In this paper, we propose a machine learning-based profiling attack on the prime multiplication operation of RSA's key generation algorithm. The proposed attack takes advantage of the fact that a prime word value, which is the data storage unit, is loaded in the process of the multiplication operation for generating a modulus. We selected a commonly used product-scanning method as a multiplication algorithm. Then we collected the power consumption traces and constructed a profile of the secret prime value based on machine learning. In addition, the success rate of the attack was measured within a single trace to perform a realistic attack during the key generation operation. The secret prime values were derived with a maximum success rate of 99.8% in a single trace. Based on this, this paper suggests that if the secret value is an operand of the multiplication operation, there may be vulnerability against side-channel attacks because of the characteristics of the multiplication algorithm.1","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116307956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Classification method of Fake News based on Ensemble Learning 基于集成学习的假新闻分类方法
Sae-Bom Lee, Joon Shik Lim, Jin-Soo Cho, Sang-Yeob Oh, T. Whangbo, Chang-Hyun Choi
With1 the advent of the next generation of computing, news is available in various environments anytime, anywhere. This is a positive aspect of rapid information sharing, but information with unclear sources was produced in a news format and quickly spread to the public through social network services. The concept of fake news, which began to draw attention as of the 2016 U.S. presidential election, is now causing many economic and social damage around the world. As a result, IT and the industry are paying attention to classifying fake news and active research is ongoing. Therefore, identifying fake news and obtaining accurate information is a very important area in the information age. In this paper, after analyzing the Fake News Dataset of the ISOT, an Information Security and Object Technology, two methods of weighting were used. Based on this, Soft Voting Classifier, an ensemble method that showed the highest performance when using TF-IDF values as weight, is proposed as a fake news classification model.
随着下一代计算技术的出现,新闻可以在各种环境中随时随地获得。这是信息快速共享的积极方面,但来源不明的信息以新闻形式产生,并通过社交网络服务迅速传播给公众。从2016年美国总统选举开始引起人们关注的假新闻概念,目前正在世界各地造成许多经济和社会损害。因此,信息技术(IT)和业界正在关注虚假新闻的分类,并正在积极进行研究。因此,识别假新闻,获取准确信息是信息时代一个非常重要的领域。本文在对ISOT(信息安全与对象技术)的假新闻数据集进行分析后,采用了两种加权方法。在此基础上,提出了一种以TF-IDF值为权重时表现出最高性能的集成方法——软投票分类器作为假新闻分类模型。
{"title":"A Classification method of Fake News based on Ensemble Learning","authors":"Sae-Bom Lee, Joon Shik Lim, Jin-Soo Cho, Sang-Yeob Oh, T. Whangbo, Chang-Hyun Choi","doi":"10.1145/3440943.3444362","DOIUrl":"https://doi.org/10.1145/3440943.3444362","url":null,"abstract":"With1 the advent of the next generation of computing, news is available in various environments anytime, anywhere. This is a positive aspect of rapid information sharing, but information with unclear sources was produced in a news format and quickly spread to the public through social network services. The concept of fake news, which began to draw attention as of the 2016 U.S. presidential election, is now causing many economic and social damage around the world. As a result, IT and the industry are paying attention to classifying fake news and active research is ongoing. Therefore, identifying fake news and obtaining accurate information is a very important area in the information age. In this paper, after analyzing the Fake News Dataset of the ISOT, an Information Security and Object Technology, two methods of weighting were used. Based on this, Soft Voting Classifier, an ensemble method that showed the highest performance when using TF-IDF values as weight, is proposed as a fake news classification model.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"90 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116693789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing Intelligent Feeding Systems based on Deep Learning 基于深度学习的智能喂养系统开发
Wu-Chih Hu, Hsin-Te Wu, Jun-We Zhan, Ping-Hsin Hsieh
1The system can reduce the calculating workload of the IoT development board, as well as lowering the power consumption and guard the pool against water pollution. The intelligent feeding system offered by this study can effectively ease the workforce of the aquaculture industry. In the future, cage culture can also implement such a method to increase the safety of the operators. According to the experimental result of this study, the approach is feasible.
1 .减少物联网开发板的计算工作量,降低功耗,保护池不受水污染。本研究提供的智能饲养系统可以有效缓解水产养殖业的劳动力问题。在未来,网箱养殖也可以实施这样的方法,以增加操作人员的安全性。实验结果表明,该方法是可行的。
{"title":"Developing Intelligent Feeding Systems based on Deep Learning","authors":"Wu-Chih Hu, Hsin-Te Wu, Jun-We Zhan, Ping-Hsin Hsieh","doi":"10.1145/3440943.3444343","DOIUrl":"https://doi.org/10.1145/3440943.3444343","url":null,"abstract":"1The system can reduce the calculating workload of the IoT development board, as well as lowering the power consumption and guard the pool against water pollution. The intelligent feeding system offered by this study can effectively ease the workforce of the aquaculture industry. In the future, cage culture can also implement such a method to increase the safety of the operators. According to the experimental result of this study, the approach is feasible.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130156138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1