首页 > 最新文献

Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications最新文献

英文 中文
CERT Training Platform over the Event-Recordable Container 基于事件可记录容器的CERT培训平台
Namjun Kim, Chanmo Yang, Dae-Il Cho, Seung Hyeon Geum, Ki-Woong Park
The current COVID-19 pandemic has resulted in many changes in the IT systems and services of institutions, which also heightened the concerns regarding the potential increase in intrusion incidents, especially when most works in institutions are performed at home. The need for pre-training against intrusion incidents has then become extremely necessary. Unfortunately, current learning methods in existing studies are insufficient for application in the present demand because these methods were originally designed for environments that are tailored-fit for learners and not in actual environments. This paper proposes a training system, namely, computer emergency response team (CERT), that can be specifically designed for learners in an institution to provide intrusion-incident cases using a Web-based training system. CERT can easily replicate the service or system in an institution to a honeypot environment to automatically collect and classify intrusion incidents using diverse evaluation criteria so that learning can be achieved from different perspectives. Hence, the institution operating service and system can easily be replicated. Artifacts of intrusion incidents are collected using the Docker container technology and event-recordable container, which are analyzed using a Web browser without installing a separate program. Thus, optimal learning results from the analysis of actual attacks are expected.
当前的COVID-19大流行导致机构的IT系统和服务发生了许多变化,这也加剧了人们对入侵事件可能增加的担忧,特别是当机构的大多数工作都在家中进行时。因此,对入侵事件进行预培训就变得极其必要。不幸的是,现有研究中现有的学习方法不足以应用于当前的需求,因为这些方法最初是为学习者量身定制的环境而不是实际环境。本文提出了一个培训系统,即计算机应急响应小组(computer emergency response team, CERT),它可以专门为机构中的学习者设计,使用基于web的培训系统提供入侵事件案例。CERT可以轻松地将机构中的服务或系统复制到蜜罐环境中,使用不同的评估标准自动收集和分类入侵事件,从而从不同的角度进行学习。因此,运营服务和系统的机构很容易被复制。使用Docker容器技术和事件可记录容器收集入侵事件的工件,使用Web浏览器对其进行分析,而无需安装单独的程序。因此,期望从实际攻击的分析中获得最佳的学习结果。
{"title":"CERT Training Platform over the Event-Recordable Container","authors":"Namjun Kim, Chanmo Yang, Dae-Il Cho, Seung Hyeon Geum, Ki-Woong Park","doi":"10.1145/3440943.3444738","DOIUrl":"https://doi.org/10.1145/3440943.3444738","url":null,"abstract":"The current COVID-19 pandemic has resulted in many changes in the IT systems and services of institutions, which also heightened the concerns regarding the potential increase in intrusion incidents, especially when most works in institutions are performed at home. The need for pre-training against intrusion incidents has then become extremely necessary. Unfortunately, current learning methods in existing studies are insufficient for application in the present demand because these methods were originally designed for environments that are tailored-fit for learners and not in actual environments. This paper proposes a training system, namely, computer emergency response team (CERT), that can be specifically designed for learners in an institution to provide intrusion-incident cases using a Web-based training system. CERT can easily replicate the service or system in an institution to a honeypot environment to automatically collect and classify intrusion incidents using diverse evaluation criteria so that learning can be achieved from different perspectives. Hence, the institution operating service and system can easily be replicated. Artifacts of intrusion incidents are collected using the Docker container technology and event-recordable container, which are analyzed using a Web browser without installing a separate program. Thus, optimal learning results from the analysis of actual attacks are expected.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132973636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Implementation of Smart Aquarium System with Intelligent Sensors 智能传感器智能水族系统的实现
Tzer-Long Chen, Nan-Kai Hsieh, Jhih-Chung Chang, Ming Chen Ho, Y. Chang, Po-Ya Chuang
Fish-farming is an entertainment for many people, but changing the water always takes a lot of time. The temperature of water will be changed during changing the water, and the quality of the water usually affects the fish life. This research was accompanied with smart sensor and fish tanks to achieve the smart fish tank. The smart fish tank owns Wi-Fi module which could collect the information of environment and control switch to maintain temperature, quality, inflow and outflow of water. IFTTT is used to send message in the smart fish tank. Besides, the light opening time was controlled to be suitable for nature light time that can bring more convenience for owner.
对许多人来说,养鱼是一种娱乐,但换水总是要花很多时间。换水时水温会发生变化,水的质量通常会影响鱼的寿命。本研究配合智能传感器和智能鱼缸,实现智能鱼缸。智能鱼缸自带Wi-Fi模块,可以采集环境信息,控制开关,保持水温、水质、进出水量。在智能鱼缸中使用IFTTT发送信息。同时控制开灯时间,使之与自然光时间相适应,给业主带来更多的便利。
{"title":"The Implementation of Smart Aquarium System with Intelligent Sensors","authors":"Tzer-Long Chen, Nan-Kai Hsieh, Jhih-Chung Chang, Ming Chen Ho, Y. Chang, Po-Ya Chuang","doi":"10.1145/3440943.3444715","DOIUrl":"https://doi.org/10.1145/3440943.3444715","url":null,"abstract":"Fish-farming is an entertainment for many people, but changing the water always takes a lot of time. The temperature of water will be changed during changing the water, and the quality of the water usually affects the fish life. This research was accompanied with smart sensor and fish tanks to achieve the smart fish tank. The smart fish tank owns Wi-Fi module which could collect the information of environment and control switch to maintain temperature, quality, inflow and outflow of water. IFTTT is used to send message in the smart fish tank. Besides, the light opening time was controlled to be suitable for nature light time that can bring more convenience for owner.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129297946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Image Processing Approach for Improving the Recognition of Cluster-like Spheroidized Carbides 一种提高簇状球化碳化物识别的图像处理方法
Wesley Huang, K. Hsu, Chia-Sui Wang, Yih-Feng Chang, Chia-Mao Yei
This paper was mainly applied to image identification of metallographic structure of carbon steel. Though metallographic image identification is now needed by industry, it is rarely discussed in literature due to its industrial characteristics, let alone the theory of identifying complex structures. The identification of metallographic structure of common carbon steel is mostly carried out manually, which is mainly plagued by empiricism and subjective identification. This paper intended to calculate the percentage of spheroidized carbide in metallography. However, the distribution of carbides is affected by the insufficient heating process. For example, low heating temperature or short holding time will result in carbide connection, which leads to the reduction of the accuracy rate in calculating the spheroidization rate of carbide. However, the algorithm proposed in this paper mainly strengthens the accuracy rate of carbide cutting, and the connected carbide is morphologically cut to improve the identification accuracy rate. For carbide cutting, it is carried out in two stages. First, all disconnected components are cut by using the connected components, and then morphological erosion and expansion calculus are carried out for all carbides to cut connected carbides.
本文主要应用于碳钢金相组织的图像识别。虽然金相图像识别现在是工业上的需要,但由于其工业特性,文献中很少讨论,更不用说识别复杂结构的理论了。普通碳钢的金相组织鉴定多采用人工进行,主要受经验主义和主观鉴定的困扰。本文旨在计算球化碳化物在金相中的百分比。但由于加热过程不充分,影响了碳化物的分布。例如,加热温度过低或保温时间过短会导致碳化物连接,从而导致计算碳化物球化率的准确率降低。而本文提出的算法主要是加强硬质合金切割的准确率,对连接的硬质合金进行形态切割,提高识别准确率。硬质合金切削分两个阶段进行。首先用连通成分切割所有断连成分,然后对所有碳化物进行形态侵蚀和膨胀演算,切割连通碳化物。
{"title":"An Image Processing Approach for Improving the Recognition of Cluster-like Spheroidized Carbides","authors":"Wesley Huang, K. Hsu, Chia-Sui Wang, Yih-Feng Chang, Chia-Mao Yei","doi":"10.1145/3440943.3444746","DOIUrl":"https://doi.org/10.1145/3440943.3444746","url":null,"abstract":"This paper was mainly applied to image identification of metallographic structure of carbon steel. Though metallographic image identification is now needed by industry, it is rarely discussed in literature due to its industrial characteristics, let alone the theory of identifying complex structures. The identification of metallographic structure of common carbon steel is mostly carried out manually, which is mainly plagued by empiricism and subjective identification. This paper intended to calculate the percentage of spheroidized carbide in metallography. However, the distribution of carbides is affected by the insufficient heating process. For example, low heating temperature or short holding time will result in carbide connection, which leads to the reduction of the accuracy rate in calculating the spheroidization rate of carbide. However, the algorithm proposed in this paper mainly strengthens the accuracy rate of carbide cutting, and the connected carbide is morphologically cut to improve the identification accuracy rate. For carbide cutting, it is carried out in two stages. First, all disconnected components are cut by using the connected components, and then morphological erosion and expansion calculus are carried out for all carbides to cut connected carbides.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset 基于机器学习的恶意软件检测与2019年KISA数据挑战数据集
Soonhong Kwon, HeeDong Yang, Manhee Lee, Jong‐Hyouk Lee
With the advent of the 4th industrial era, ICT technologies such as artificial intelligence and autonomous driving are rapidly developing. However, unlike these positive aspects, malicious hackers target IoT devices around us using malwares such as viruses, worms, and Trojan horses to steal confidential information or prevent IoT devices from operating normally. In addition, malicious hackers are developing and using intelligent and advanced malwares so that malware cannot be easily detected. In recent years, studied/development of malware detection technology using machine learning and deep learning technologies has been conducted to detect intelligent and advanced variants of malwares. In this paper, based on the KISA Data Challenge Dataset, basic machine learning based malware detection is performed and the limitations that have occurred are analyzed.
随着第四次工业时代的到来,人工智能、自动驾驶等信息通信技术迅速发展。然而,与这些积极方面不同的是,恶意黑客利用病毒、蠕虫和特洛伊木马等恶意软件攻击我们周围的物联网设备,窃取机密信息或阻止物联网设备正常运行。此外,恶意黑客正在开发和使用智能和高级恶意软件,因此恶意软件不容易被发现。近年来,利用机器学习和深度学习技术进行恶意软件检测技术的研究/开发,以检测恶意软件的智能和高级变体。本文基于KISA数据挑战数据集,进行了基于基本机器学习的恶意软件检测,并分析了已经出现的局限性。
{"title":"Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset","authors":"Soonhong Kwon, HeeDong Yang, Manhee Lee, Jong‐Hyouk Lee","doi":"10.1145/3440943.3444745","DOIUrl":"https://doi.org/10.1145/3440943.3444745","url":null,"abstract":"With the advent of the 4th industrial era, ICT technologies such as artificial intelligence and autonomous driving are rapidly developing. However, unlike these positive aspects, malicious hackers target IoT devices around us using malwares such as viruses, worms, and Trojan horses to steal confidential information or prevent IoT devices from operating normally. In addition, malicious hackers are developing and using intelligent and advanced malwares so that malware cannot be easily detected. In recent years, studied/development of malware detection technology using machine learning and deep learning technologies has been conducted to detect intelligent and advanced variants of malwares. In this paper, based on the KISA Data Challenge Dataset, basic machine learning based malware detection is performed and the limitations that have occurred are analyzed.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125739037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning 基于机器学习的工业控制系统异常检测技术研究
Janghoon Kim, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo
This study proposed an anomaly detection technique in an industrial control system using supervised and unsupervised machine learning algorithms. For the dataset for learning, the HIL-based Augmented ICS (HAI) dataset provided for the study on security in industrial control systems was used. For the learning model, Light Gradient Boosted Machine -- a supervised learning algorithm and One-Class Support Vector Machine and Isolation Forest as unsupervised learning algorithms were employed. The proposed technique is presented in this paper, which is organized as follows: Feature selection, Data preprocessing, Hyperparameter optimization and verification, and Experiment and analysis of results. The performance difference according to the algorithm and model configuration was exhibited through the experimental results. In addition, issues to be considered in model configuration and future study directions for anomaly detection techniques in industrial control systems were presented based on the experimental results.
本研究提出了一种基于监督和无监督机器学习算法的工业控制系统异常检测技术。用于学习的数据集,使用了基于hil的增强ICS (HAI)数据集,该数据集是为工业控制系统安全研究提供的。学习模型采用有监督学习算法Light Gradient boosting Machine和无监督学习算法One-Class Support Vector Machine和Isolation Forest。本文主要从特征选择、数据预处理、超参数优化与验证、实验与结果分析四个方面进行了介绍。实验结果显示了不同算法和模型配置的性能差异。此外,根据实验结果,提出了模型配置中需要考虑的问题和工业控制系统异常检测技术的未来研究方向。
{"title":"Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning","authors":"Janghoon Kim, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444743","DOIUrl":"https://doi.org/10.1145/3440943.3444743","url":null,"abstract":"This study proposed an anomaly detection technique in an industrial control system using supervised and unsupervised machine learning algorithms. For the dataset for learning, the HIL-based Augmented ICS (HAI) dataset provided for the study on security in industrial control systems was used. For the learning model, Light Gradient Boosted Machine -- a supervised learning algorithm and One-Class Support Vector Machine and Isolation Forest as unsupervised learning algorithms were employed. The proposed technique is presented in this paper, which is organized as follows: Feature selection, Data preprocessing, Hyperparameter optimization and verification, and Experiment and analysis of results. The performance difference according to the algorithm and model configuration was exhibited through the experimental results. In addition, issues to be considered in model configuration and future study directions for anomaly detection techniques in industrial control systems were presented based on the experimental results.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Clicks-and-Mortar Smart System 点击和迫击炮智能系统
Yueh-Shiu Lee, Yen-Chiao Chuang, M. Chang, Mei-Wen Huang
1E-commerce nowadays has made its official way into the clicks-and-mortar era. The advantage of a clicks-and-mortar model is that the "mortar" counterpart can enjoy logistics support, which complements any operational inadequacy on the side of the virtual website - the "clicks" counterpart. In a clicks-and-mortar smart contract system, the clicks-and-mortar application enables any transaction to automatically execute each operational step. When a consumer selects a product and completes the payment for it, the smart contract can proceed to execute any terms established in its contents, ensuring the proper practice of every item in the contract.
如今,电子商务已经正式进入了点击和实体时代。“点击+实体”模式的优势在于,“实体”对手可以享受后勤支持,这补充了虚拟网站(“点击”对手)方面的任何运营不足。在点击和迫击炮智能合约系统中,点击和迫击炮应用程序允许任何交易自动执行每个操作步骤。当消费者选择产品并完成付款时,智能合约可以继续执行其内容中确定的任何条款,确保合约中的每一项都得到正确的执行。
{"title":"A Clicks-and-Mortar Smart System","authors":"Yueh-Shiu Lee, Yen-Chiao Chuang, M. Chang, Mei-Wen Huang","doi":"10.1145/3440943.3444342","DOIUrl":"https://doi.org/10.1145/3440943.3444342","url":null,"abstract":"1E-commerce nowadays has made its official way into the clicks-and-mortar era. The advantage of a clicks-and-mortar model is that the \"mortar\" counterpart can enjoy logistics support, which complements any operational inadequacy on the side of the virtual website - the \"clicks\" counterpart. In a clicks-and-mortar smart contract system, the clicks-and-mortar application enables any transaction to automatically execute each operational step. When a consumer selects a product and completes the payment for it, the smart contract can proceed to execute any terms established in its contents, ensuring the proper practice of every item in the contract.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus 区块链加密货币实现机制研究:校园学习币
I. Chang, Ya-Hsueh Chuang, Tzer-Long Chen, Yiming Yin, Yen Ni Liu, T. Chen
The education reform has been thirty years since 1990, and in recent years the learning enthusiasm and class participation of student was decrease by the internet popularity. With the borderless online communication becoming more widespread, there are many information and method to learn, however, sometimes this information is inaccurate or wrong. No one can deny that the world is different than it was when our current teaching method was changed. According to education scholar's experience, the main reason for a lack of learning motivation. Several educators have already indicated that innovative teaching and curriculum such as PaGamo and MPAS that was applied by National Taiwan University prof. Ping-Cheng Yeh and Taichung Municipal Shuang Wen Junior High School Teacher Alex Wang. The PaGamo and MPAS used for get back for learning enthusiasm and motivation for student. This research will discussion the Blockchain technology and mobile app was used for campus learning coin to increase teaching effectiveness. The campus learning coin will be distributed in class and combined with consumption discount of campus to improve learning motivation and learning objectives.
自1990年以来,我国教育改革已经进行了三十年,近年来,由于网络的普及,学生的学习热情和课堂参与度有所下降。随着无边界的网络交流越来越普遍,有很多信息和方法可以学习,然而,有时这些信息是不准确的或错误的。没有人能否认,现在的世界与我们改变现行的教学方法时不同了。根据教育学者的经验,学习动机缺乏的主要原因。一些教育工作者已经指出了创新的教学和课程,如台湾大学叶平诚教授和台中市双文初中王立强老师所应用的PaGamo和MPAS。PaGamo和MPAS用于恢复学生的学习热情和动力。本研究将探讨区块链技术和移动应用被用于校园学习币,以提高教学效率。校园学习币将在课堂中发放,并结合校园消费折扣,提高学习动机和学习目标。
{"title":"A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus","authors":"I. Chang, Ya-Hsueh Chuang, Tzer-Long Chen, Yiming Yin, Yen Ni Liu, T. Chen","doi":"10.1145/3440943.3444337","DOIUrl":"https://doi.org/10.1145/3440943.3444337","url":null,"abstract":"The education reform has been thirty years since 1990, and in recent years the learning enthusiasm and class participation of student was decrease by the internet popularity. With the borderless online communication becoming more widespread, there are many information and method to learn, however, sometimes this information is inaccurate or wrong. No one can deny that the world is different than it was when our current teaching method was changed. According to education scholar's experience, the main reason for a lack of learning motivation. Several educators have already indicated that innovative teaching and curriculum such as PaGamo and MPAS that was applied by National Taiwan University prof. Ping-Cheng Yeh and Taichung Municipal Shuang Wen Junior High School Teacher Alex Wang. The PaGamo and MPAS used for get back for learning enthusiasm and motivation for student. This research will discussion the Blockchain technology and mobile app was used for campus learning coin to increase teaching effectiveness. The campus learning coin will be distributed in class and combined with consumption discount of campus to improve learning motivation and learning objectives.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129754915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment 边缘云计算环境下安全容器数据保护蓝图
Seong-Jin Kim, K. Park
Edge computing is a computing technology that collects, analyses and processes data near the devices that generate the data. This enables services providers to curtail unnecessary data transmissions and deliver low latency services. Cloud computing technology has evolved from centralized environment to edge computing environment due to the need of handling drastically increasing amount of data in cloud computing environments. As the cloud computing environment went through changes, there has been emerging security issues caused by the high mobility of containers. The increased mobility of containers in edge computing environment increased the possibility of data leakage because containers migrate between the edge nodes and we cannot be assured that the data was completely deleted from the edge node the container previously resided. To enhance security of the data in the edge cloud computing environment, we suggest a blueprint of the secure container to protect data from potential threats.
边缘计算是一种在生成数据的设备附近收集、分析和处理数据的计算技术。这使服务提供商能够减少不必要的数据传输并提供低延迟服务。由于在云计算环境中需要处理急剧增加的数据量,云计算技术已经从集中式环境发展到边缘计算环境。随着云计算环境的变化,容器的高移动性带来了新的安全问题。容器在边缘计算环境中增加流动性的增加数据泄漏的可能性,因为容器边缘节点之间的迁移和我们不能保证完全删除从边缘节点的数据容器之前居住。加强安全云计算环境中数据的优势,我们建议的蓝图从潜在威胁安全的容器来保护数据。
{"title":"Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment","authors":"Seong-Jin Kim, K. Park","doi":"10.1145/3440943.3444355","DOIUrl":"https://doi.org/10.1145/3440943.3444355","url":null,"abstract":"Edge computing is a computing technology that collects, analyses and processes data near the devices that generate the data. This enables services providers to curtail unnecessary data transmissions and deliver low latency services. Cloud computing technology has evolved from centralized environment to edge computing environment due to the need of handling drastically increasing amount of data in cloud computing environments. As the cloud computing environment went through changes, there has been emerging security issues caused by the high mobility of containers. The increased mobility of containers in edge computing environment increased the possibility of data leakage because containers migrate between the edge nodes and we cannot be assured that the data was completely deleted from the edge node the container previously resided. To enhance security of the data in the edge cloud computing environment, we suggest a blueprint of the secure container to protect data from potential threats.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Classification method of Fake News based on Ensemble Learning 基于集成学习的假新闻分类方法
Sae-Bom Lee, Joon Shik Lim, Jin-Soo Cho, Sang-Yeob Oh, T. Whangbo, Chang-Hyun Choi
With1 the advent of the next generation of computing, news is available in various environments anytime, anywhere. This is a positive aspect of rapid information sharing, but information with unclear sources was produced in a news format and quickly spread to the public through social network services. The concept of fake news, which began to draw attention as of the 2016 U.S. presidential election, is now causing many economic and social damage around the world. As a result, IT and the industry are paying attention to classifying fake news and active research is ongoing. Therefore, identifying fake news and obtaining accurate information is a very important area in the information age. In this paper, after analyzing the Fake News Dataset of the ISOT, an Information Security and Object Technology, two methods of weighting were used. Based on this, Soft Voting Classifier, an ensemble method that showed the highest performance when using TF-IDF values as weight, is proposed as a fake news classification model.
随着下一代计算技术的出现,新闻可以在各种环境中随时随地获得。这是信息快速共享的积极方面,但来源不明的信息以新闻形式产生,并通过社交网络服务迅速传播给公众。从2016年美国总统选举开始引起人们关注的假新闻概念,目前正在世界各地造成许多经济和社会损害。因此,信息技术(IT)和业界正在关注虚假新闻的分类,并正在积极进行研究。因此,识别假新闻,获取准确信息是信息时代一个非常重要的领域。本文在对ISOT(信息安全与对象技术)的假新闻数据集进行分析后,采用了两种加权方法。在此基础上,提出了一种以TF-IDF值为权重时表现出最高性能的集成方法——软投票分类器作为假新闻分类模型。
{"title":"A Classification method of Fake News based on Ensemble Learning","authors":"Sae-Bom Lee, Joon Shik Lim, Jin-Soo Cho, Sang-Yeob Oh, T. Whangbo, Chang-Hyun Choi","doi":"10.1145/3440943.3444362","DOIUrl":"https://doi.org/10.1145/3440943.3444362","url":null,"abstract":"With1 the advent of the next generation of computing, news is available in various environments anytime, anywhere. This is a positive aspect of rapid information sharing, but information with unclear sources was produced in a news format and quickly spread to the public through social network services. The concept of fake news, which began to draw attention as of the 2016 U.S. presidential election, is now causing many economic and social damage around the world. As a result, IT and the industry are paying attention to classifying fake news and active research is ongoing. Therefore, identifying fake news and obtaining accurate information is a very important area in the information age. In this paper, after analyzing the Fake News Dataset of the ISOT, an Information Security and Object Technology, two methods of weighting were used. Based on this, Soft Voting Classifier, an ensemble method that showed the highest performance when using TF-IDF values as weight, is proposed as a fake news classification model.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"90 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116693789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MiningBreastCancer: Selection of Candidate Gene Associated with Breast Cancer via Comparison between Data Mining of TCGA and Text Mining of PubMed 挖掘乳腺癌:通过TCGA数据挖掘和PubMed文本挖掘的比较选择乳腺癌相关候选基因
Chou-Cheng Chen, Y. Kuo, Chi-Hui Chiang
In 2016, 12,676 new cases of breast cancer were diagnosed among Taiwan women. In 2018 the standardized death rate of breast cancer was 12.5 per 100,000 persons. Previous studies have integrated data and text mining to yield fusion genes, identify genetic factors for breast cancer and select single-gene feature sets for colon cancer discrimination. However, our study is the first to select significantly different expression between breast normal tissue and cancer using TCGA data and biostatistics, excluding know genes using abstracts from PubMed and natural language processing. The top twenty genes for research potential from the selection of Mining-BreastCancer are EML3, ABCB9, GRASP, KANK3, GPR146, ZNF623, CCDC9, ADCY4, DLL1, ADAM33, GRRP1, LRRN4CL, C14orf180, ABCD4, ABCC6P1, PEAR1, FAM43A, C20orf160, KIF21A and PP-FIA3. Few studies for these genes exist, but they hold significantly different expressions between breast cancer and normal tissue, each pathologic tumor and lymph node, or between each pathologic metastasis. These results show that MiningBreastCancer can help scientists select genes for research potential. MiningBreastCancer is available through http://bio.yungyun.com.tw/MiningBreastCancer.aspx.
2016年,台湾女性确诊乳腺癌新病例12676例。2018年,乳腺癌标准化死亡率为12.5 / 10万人。先前的研究将数据和文本挖掘结合起来,以产生融合基因,确定乳腺癌的遗传因素,并选择单基因特征集用于结肠癌的区分。然而,我们的研究是第一个使用TCGA数据和生物统计学来选择乳腺正常组织和癌症之间显著不同的表达,排除了使用PubMed摘要和自然语言处理的已知基因。在采矿型乳腺癌的筛选中,具有研究潜力的前20个基因分别是EML3、ABCB9、GRASP、KANK3、GPR146、ZNF623、CCDC9、ADCY4、DLL1、ADAM33、GRRP1、LRRN4CL、C14orf180、ABCD4、ABCC6P1、PEAR1、FAM43A、C20orf160、KIF21A和PP-FIA3。对这些基因的研究很少,但它们在乳腺癌与正常组织、各病理性肿瘤与淋巴结、各病理性转移之间的表达存在显著差异。这些结果表明,挖掘乳腺癌可以帮助科学家选择具有研究潜力的基因。MiningBreastCancer可通过http://bio.yungyun.com.tw/MiningBreastCancer.aspx获得。
{"title":"MiningBreastCancer: Selection of Candidate Gene Associated with Breast Cancer via Comparison between Data Mining of TCGA and Text Mining of PubMed","authors":"Chou-Cheng Chen, Y. Kuo, Chi-Hui Chiang","doi":"10.1145/3440943.3444718","DOIUrl":"https://doi.org/10.1145/3440943.3444718","url":null,"abstract":"In 2016, 12,676 new cases of breast cancer were diagnosed among Taiwan women. In 2018 the standardized death rate of breast cancer was 12.5 per 100,000 persons. Previous studies have integrated data and text mining to yield fusion genes, identify genetic factors for breast cancer and select single-gene feature sets for colon cancer discrimination. However, our study is the first to select significantly different expression between breast normal tissue and cancer using TCGA data and biostatistics, excluding know genes using abstracts from PubMed and natural language processing. The top twenty genes for research potential from the selection of Mining-BreastCancer are EML3, ABCB9, GRASP, KANK3, GPR146, ZNF623, CCDC9, ADCY4, DLL1, ADAM33, GRRP1, LRRN4CL, C14orf180, ABCD4, ABCC6P1, PEAR1, FAM43A, C20orf160, KIF21A and PP-FIA3. Few studies for these genes exist, but they hold significantly different expressions between breast cancer and normal tissue, each pathologic tumor and lymph node, or between each pathologic metastasis. These results show that MiningBreastCancer can help scientists select genes for research potential. MiningBreastCancer is available through http://bio.yungyun.com.tw/MiningBreastCancer.aspx.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128026358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1