首页 > 最新文献

Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications最新文献

英文 中文
Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication RSA素数乘法中基于机器学习的剖析攻击方法
Han-Byeol Park, Bo-Yeon Sim, Dong‐Guk Han
In this paper, we propose a machine learning-based profiling attack on the prime multiplication operation of RSA's key generation algorithm. The proposed attack takes advantage of the fact that a prime word value, which is the data storage unit, is loaded in the process of the multiplication operation for generating a modulus. We selected a commonly used product-scanning method as a multiplication algorithm. Then we collected the power consumption traces and constructed a profile of the secret prime value based on machine learning. In addition, the success rate of the attack was measured within a single trace to perform a realistic attack during the key generation operation. The secret prime values were derived with a maximum success rate of 99.8% in a single trace. Based on this, this paper suggests that if the secret value is an operand of the multiplication operation, there may be vulnerability against side-channel attacks because of the characteristics of the multiplication algorithm.1
在本文中,我们提出了一种基于机器学习的分析攻击RSA密钥生成算法的素数乘法运算。所提出的攻击利用了在乘法运算过程中加载素数字值(即数据存储单元)以生成模数的事实。我们选择了一种常用的乘积扫描法作为乘法算法。然后,我们收集了功耗轨迹,并基于机器学习构造了秘密素数的轮廓。此外,在密钥生成操作期间,在单个跟踪中测量攻击的成功率,以执行真实的攻击。秘密素数的推导成功率最高可达99.8%。在此基础上,本文提出,如果秘密值是乘法运算的操作数,由于乘法算法的特性,可能存在易受侧信道攻击的漏洞
{"title":"Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication","authors":"Han-Byeol Park, Bo-Yeon Sim, Dong‐Guk Han","doi":"10.1145/3440943.3444730","DOIUrl":"https://doi.org/10.1145/3440943.3444730","url":null,"abstract":"In this paper, we propose a machine learning-based profiling attack on the prime multiplication operation of RSA's key generation algorithm. The proposed attack takes advantage of the fact that a prime word value, which is the data storage unit, is loaded in the process of the multiplication operation for generating a modulus. We selected a commonly used product-scanning method as a multiplication algorithm. Then we collected the power consumption traces and constructed a profile of the secret prime value based on machine learning. In addition, the success rate of the attack was measured within a single trace to perform a realistic attack during the key generation operation. The secret prime values were derived with a maximum success rate of 99.8% in a single trace. Based on this, this paper suggests that if the secret value is an operand of the multiplication operation, there may be vulnerability against side-channel attacks because of the characteristics of the multiplication algorithm.1","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116307956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Intelligent Feeding Systems based on Deep Learning 基于深度学习的智能喂养系统开发
Wu-Chih Hu, Hsin-Te Wu, Jun-We Zhan, Ping-Hsin Hsieh
1The system can reduce the calculating workload of the IoT development board, as well as lowering the power consumption and guard the pool against water pollution. The intelligent feeding system offered by this study can effectively ease the workforce of the aquaculture industry. In the future, cage culture can also implement such a method to increase the safety of the operators. According to the experimental result of this study, the approach is feasible.
1 .减少物联网开发板的计算工作量,降低功耗,保护池不受水污染。本研究提供的智能饲养系统可以有效缓解水产养殖业的劳动力问题。在未来,网箱养殖也可以实施这样的方法,以增加操作人员的安全性。实验结果表明,该方法是可行的。
{"title":"Developing Intelligent Feeding Systems based on Deep Learning","authors":"Wu-Chih Hu, Hsin-Te Wu, Jun-We Zhan, Ping-Hsin Hsieh","doi":"10.1145/3440943.3444343","DOIUrl":"https://doi.org/10.1145/3440943.3444343","url":null,"abstract":"1The system can reduce the calculating workload of the IoT development board, as well as lowering the power consumption and guard the pool against water pollution. The intelligent feeding system offered by this study can effectively ease the workforce of the aquaculture industry. In the future, cage culture can also implement such a method to increase the safety of the operators. According to the experimental result of this study, the approach is feasible.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130156138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient healthcare service based on Stacking Ensemble 基于堆叠集成的高效医疗服务
Yunsang Joo, Seungwon Lee, Hyoungju Kim, Pankoo Kim, Seong Oun Hwang, Chang Choi
Recently, research using medical big data to predict patients with high probability of disease are receiving a lot of attention. Due to the advancement of artificial intelligence, continuous research is essential in that diseases can be predicted only by computational numbers and can be prevented before they occur. Therefore, machine learning and deep learning research using medical big data for disease prediction are actively progressing. Due to the nature of medical data, diseases are rare, so there is a tendency to oversampling or under sampling that can lead to information distortion. Also, given that most machine learning-based research is based on certain predictive models, there is a risk that the predictions themselves will reflect the biases that exist. So, if you generalize the data your model will train on, or adjust the model's bias, you can get better predictions. In this white paper, we use diabetes, heart disease, and breast cancer data through several individual classifiers to get predicted values and use them as training data for one meta-model to get the final predictions. That is, by constructing a stacking ensemble model, the presence or absence of a disease is predicted, and its performance is analysed through experiments. This model trains multiple classifiers on the same data, so there is a possibility that the model will overfit the data. So, when training multiple classifiers, we compare the model with and without cross validation. In the experiment, the model using cross-validation for training showed an average of 1.4% higher performance than that of the individual single model. On the other hand, the meta-model without cross-validation shows lower performance than that of individual single models. In other words, when constructing a stacking ensemble model, high performance could be obtained only by essentially cross-validating individual single classifiers. Performing one final prediction on the predicted values of high-performance individual models will yield more stable and reliable predictions. The cross-learning-based cumulative ensemble model proposed in this paper predicts the presence or absence of a disease and can be used for medical service development and disease prevention.
近年来,利用医疗大数据预测高概率患病患者的研究备受关注。由于人工智能的进步,持续的研究是必不可少的,因为疾病只能通过计算数字来预测,并且可以在疾病发生之前进行预防。因此,利用医疗大数据进行疾病预测的机器学习和深度学习研究正在积极推进。由于医疗数据的性质,疾病是罕见的,因此存在过采样或欠采样的倾向,从而导致信息失真。此外,考虑到大多数基于机器学习的研究都是基于某些预测模型,预测本身就有可能反映出存在的偏见。所以,如果你泛化你的模型将要训练的数据,或者调整模型的偏差,你可以得到更好的预测。在本白皮书中,我们使用糖尿病、心脏病和乳腺癌的数据,通过几个单独的分类器来获得预测值,并将它们作为一个元模型的训练数据来获得最终预测。即通过构建一个叠加系综模型来预测疾病的存在与否,并通过实验分析其性能。该模型在相同的数据上训练多个分类器,因此存在模型过拟合数据的可能性。因此,当训练多个分类器时,我们比较有和没有交叉验证的模型。在实验中,使用交叉验证进行训练的模型表现出比单个模型平均高出1.4%的性能。另一方面,未经交叉验证的元模型表现出比单个模型更低的性能。换句话说,在构建堆叠集成模型时,只有通过交叉验证单个分类器才能获得高性能。对高性能单个模型的预测值执行一个最终预测将产生更稳定和可靠的预测。本文提出的基于交叉学习的累积集成模型可以预测疾病的存在或不存在,可用于医疗服务开发和疾病预防。
{"title":"Efficient healthcare service based on Stacking Ensemble","authors":"Yunsang Joo, Seungwon Lee, Hyoungju Kim, Pankoo Kim, Seong Oun Hwang, Chang Choi","doi":"10.1145/3440943.3444727","DOIUrl":"https://doi.org/10.1145/3440943.3444727","url":null,"abstract":"Recently, research using medical big data to predict patients with high probability of disease are receiving a lot of attention. Due to the advancement of artificial intelligence, continuous research is essential in that diseases can be predicted only by computational numbers and can be prevented before they occur. Therefore, machine learning and deep learning research using medical big data for disease prediction are actively progressing. Due to the nature of medical data, diseases are rare, so there is a tendency to oversampling or under sampling that can lead to information distortion. Also, given that most machine learning-based research is based on certain predictive models, there is a risk that the predictions themselves will reflect the biases that exist. So, if you generalize the data your model will train on, or adjust the model's bias, you can get better predictions. In this white paper, we use diabetes, heart disease, and breast cancer data through several individual classifiers to get predicted values and use them as training data for one meta-model to get the final predictions. That is, by constructing a stacking ensemble model, the presence or absence of a disease is predicted, and its performance is analysed through experiments. This model trains multiple classifiers on the same data, so there is a possibility that the model will overfit the data. So, when training multiple classifiers, we compare the model with and without cross validation. In the experiment, the model using cross-validation for training showed an average of 1.4% higher performance than that of the individual single model. On the other hand, the meta-model without cross-validation shows lower performance than that of individual single models. In other words, when constructing a stacking ensemble model, high performance could be obtained only by essentially cross-validating individual single classifiers. Performing one final prediction on the predicted values of high-performance individual models will yield more stable and reliable predictions. The cross-learning-based cumulative ensemble model proposed in this paper predicts the presence or absence of a disease and can be used for medical service development and disease prevention.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An intelligent patrol system for Industry 4.0 Smart Factory 面向工业4.0智能工厂的智能巡检系统
Hung-Jen Chen, Chin-Chia Hsu, Chia-Hui Liu
The application of the sensor node of the Internet of Things can help managers to grasp the abnormal information of the production equipment and achieve the goal of effective factory management. The integration of a safe control mechanism into the inspection system can reduce the cost of company. Therefore, this paper proposed an intelligent secure and reliable patrol system. It supports the efficiency patrol system and privacy of the information. It also ensures only legally authorized users have right to access the information. We built the intelligent secure and reliable patrol system by using IoT technology and designed a trusted authentication mechanism within a smart, safe and reliable patrol system. The benefits of the system are: Ensuring the security of the transmission. The system user cannot modify the inspection information arbitrarily. It can make the production maintenance mechanism sounder. It will also help companies gradually move towards the goal of Industry 4.0 smart factory to improve the production efficiency of enterprises and increase production capacity.
物联网传感器节点的应用可以帮助管理者掌握生产设备的异常信息,达到有效管理工厂的目的。将安全控制机制集成到检查系统中可以降低公司的成本。为此,本文提出了一种安全可靠的智能巡逻系统。它支持高效巡查系统和信息的保密性。它还确保只有合法授权的用户才有权访问信息。我们利用物联网技术构建智能安全可靠的巡逻系统,并在智能安全可靠的巡逻系统中设计可信认证机制。该系统的好处是:保证了传输的安全性。系统用户不能随意修改巡检信息。使生产维护机制更加健全。它也将帮助企业逐步走向工业4.0智能工厂的目标,提高企业的生产效率,增加产能。
{"title":"An intelligent patrol system for Industry 4.0 Smart Factory","authors":"Hung-Jen Chen, Chin-Chia Hsu, Chia-Hui Liu","doi":"10.1145/3440943.3444339","DOIUrl":"https://doi.org/10.1145/3440943.3444339","url":null,"abstract":"The application of the sensor node of the Internet of Things can help managers to grasp the abnormal information of the production equipment and achieve the goal of effective factory management. The integration of a safe control mechanism into the inspection system can reduce the cost of company. Therefore, this paper proposed an intelligent secure and reliable patrol system. It supports the efficiency patrol system and privacy of the information. It also ensures only legally authorized users have right to access the information. We built the intelligent secure and reliable patrol system by using IoT technology and designed a trusted authentication mechanism within a smart, safe and reliable patrol system. The benefits of the system are: Ensuring the security of the transmission. The system user cannot modify the inspection information arbitrarily. It can make the production maintenance mechanism sounder. It will also help companies gradually move towards the goal of Industry 4.0 smart factory to improve the production efficiency of enterprises and increase production capacity.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132249819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training Analysis of Double Canoe Based on IOT 基于物联网的双人独木舟训练分析
Jo-Hung Yu, Meng-Tsung Lee, Jao-Chuan Lin, Chien-Hung Wu
Taiwan is a maritime country. In recent years, due to the open pole of the ocean, outdoor marine leisure sports have been promoted, especially canoeing activities are currently the most popular marine sport in Taiwan. The canoe sport also has competition games: Especially the two-person competition canoe requires two people to coordinate with each other at the same time. Therefore, this article proposes to build a two-person canoe training analysis based on IoT. In this article, an IoT device is installed on the two-person arm. When two people are sliding a canoe, the speed of the G-sensor can be used to judge the problem of coordination between the two parties, and the information proposed in this article will be sent to the platform. The platform will record the rate of each canoe user's sliding. Therefore, the system proposed in this article can be analyzed through platform information. Whether the coordination between the users of both sides is gradually growing, or it needs to be further revised. The method proposed in this article helps to scientifically train players.
台湾是一个海洋国家。近年来,由于海洋的开放极,户外海洋休闲运动得到推广,特别是皮划艇活动是目前台湾最受欢迎的海洋运动。皮划艇运动也有比赛项目,特别是双人比赛皮划艇需要两人同时配合。因此,本文提出构建一个基于IoT的双人独木舟训练分析。在本文中,将物联网设备安装在双人手臂上。当两个人划独木舟时,g传感器的速度可以用来判断双方的协调问题,并将本文提出的信息发送到平台。该平台将记录每个独木舟用户滑动的速度。因此,本文提出的系统可以通过平台信息进行分析。双方用户之间的协调性是否在逐渐增强,还是需要进一步修改。本文提出的方法有助于科学地训练运动员。
{"title":"Training Analysis of Double Canoe Based on IOT","authors":"Jo-Hung Yu, Meng-Tsung Lee, Jao-Chuan Lin, Chien-Hung Wu","doi":"10.1145/3440943.3444344","DOIUrl":"https://doi.org/10.1145/3440943.3444344","url":null,"abstract":"Taiwan is a maritime country. In recent years, due to the open pole of the ocean, outdoor marine leisure sports have been promoted, especially canoeing activities are currently the most popular marine sport in Taiwan. The canoe sport also has competition games: Especially the two-person competition canoe requires two people to coordinate with each other at the same time. Therefore, this article proposes to build a two-person canoe training analysis based on IoT. In this article, an IoT device is installed on the two-person arm. When two people are sliding a canoe, the speed of the G-sensor can be used to judge the problem of coordination between the two parties, and the information proposed in this article will be sent to the platform. The platform will record the rate of each canoe user's sliding. Therefore, the system proposed in this article can be analyzed through platform information. Whether the coordination between the users of both sides is gradually growing, or it needs to be further revised. The method proposed in this article helps to scientifically train players.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125148217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comments on "Securing implantable cardiac medical devices": Use of radio frequency energy harvesting 关于“保护植入式心脏医疗装置”的评论:使用射频能量收集
Jiyoon Kim, Sangmin Lee, Daniel Gerbi Duguma, Bonam Kim, I. You
Implantable Medical Devices (IMDs) have evolved over the years to stretch their application areas to provide a range of services from health-care to public safety. In order to handle such information, the high strength security and the proper authentication are required. For this, Ellouze et al. have proposed an authentication protocol for IMDs in 2013. The security in IMD that they propose and mention is reasonable, but some aspects are expected to be vulnerable to attack. In addition, not only are such schemes need to be secured, but their security should also be formally verified against their security requirements. Thus, we confirm the security of the authentication protocol for IMDs that have not been objectively verified through formal verification tool such as BAN-logic. Consequently, in this paper, Ellouze et al. are turned out to be insecure.
多年来,植入式医疗器械(imd)已经发展到扩展其应用领域,以提供从医疗保健到公共安全的一系列服务。为了处理这些信息,需要高强度的安全性和适当的身份验证。为此,Ellouze等人在2013年提出了imd的认证协议。他们提出和提到的IMD的安全性是合理的,但是有些方面预计会容易受到攻击。此外,不仅需要对这些方案进行安全保护,而且还应该根据其安全需求对其安全性进行正式验证。因此,我们通过正式的验证工具(如ban逻辑)来确认尚未客观验证的imd的认证协议的安全性。因此,本文证明了Ellouze等人是不安全的。
{"title":"Comments on \"Securing implantable cardiac medical devices\": Use of radio frequency energy harvesting","authors":"Jiyoon Kim, Sangmin Lee, Daniel Gerbi Duguma, Bonam Kim, I. You","doi":"10.1145/3440943.3444733","DOIUrl":"https://doi.org/10.1145/3440943.3444733","url":null,"abstract":"Implantable Medical Devices (IMDs) have evolved over the years to stretch their application areas to provide a range of services from health-care to public safety. In order to handle such information, the high strength security and the proper authentication are required. For this, Ellouze et al. have proposed an authentication protocol for IMDs in 2013. The security in IMD that they propose and mention is reasonable, but some aspects are expected to be vulnerable to attack. In addition, not only are such schemes need to be secured, but their security should also be formally verified against their security requirements. Thus, we confirm the security of the authentication protocol for IMDs that have not been objectively verified through formal verification tool such as BAN-logic. Consequently, in this paper, Ellouze et al. are turned out to be insecure.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121109877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Algorithm based on Search Economics for Multi-Objective Optimization 一种基于搜索经济的多目标优化算法
Tzu-Tsai Kao, Chun-Wei Tsai, Ming-Chao Chiang
An effective multi-objective search algorithm based on a new meta-heuristic algorithm, named search economic (SE), is presented in this study. The basic idea of SE is to first partition the solution space into a certain number of regions to keep the diversity. Then, it will determine the later search directions by the so-called expected value that is composed of the objective values of the best-so-far solution of each region, the searched solutions, and the number of searches invested on a region. More important, the proposed algorithm will invest limited computing resources on promising regions to find a better Pareto optimal set (POS). Different from other search economics-based algorithms, the proposed method uses two transition operators of differential evolution and adds a self adaptive mechanism to tune its parameters. Experimental results show that the proposed algorithm outperforms all the other metaheuristic algorithms compared in this study in most cases in the sense that it can get a more uniformly distributed POS and a smaller distance to the Pareto optimal front.
本文提出了一种有效的多目标搜索算法,该算法基于一种新的元启发式算法——搜索经济算法。SE的基本思想是首先将解空间划分为一定数量的区域,以保持解空间的多样性。然后,它将通过所谓的期望值来确定后续的搜索方向,该期望值由每个区域的迄今最佳解的客观值、搜索的解和在一个区域上投入的搜索次数组成。更重要的是,该算法将有限的计算资源投入到有希望的区域,以寻找更好的帕累托最优集(POS)。与其他基于搜索经济的算法不同,该方法采用差分进化的两个转移算子,并增加了自适应机制来调整其参数。实验结果表明,在大多数情况下,本文提出的算法优于本文比较的所有其他元启发式算法,因为它可以获得更均匀分布的POS,并且距离Pareto最优前沿的距离更小。
{"title":"An Effective Algorithm based on Search Economics for Multi-Objective Optimization","authors":"Tzu-Tsai Kao, Chun-Wei Tsai, Ming-Chao Chiang","doi":"10.1145/3440943.3444726","DOIUrl":"https://doi.org/10.1145/3440943.3444726","url":null,"abstract":"An effective multi-objective search algorithm based on a new meta-heuristic algorithm, named search economic (SE), is presented in this study. The basic idea of SE is to first partition the solution space into a certain number of regions to keep the diversity. Then, it will determine the later search directions by the so-called expected value that is composed of the objective values of the best-so-far solution of each region, the searched solutions, and the number of searches invested on a region. More important, the proposed algorithm will invest limited computing resources on promising regions to find a better Pareto optimal set (POS). Different from other search economics-based algorithms, the proposed method uses two transition operators of differential evolution and adds a self adaptive mechanism to tune its parameters. Experimental results show that the proposed algorithm outperforms all the other metaheuristic algorithms compared in this study in most cases in the sense that it can get a more uniformly distributed POS and a smaller distance to the Pareto optimal front.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic PLC控制逻辑操纵攻击的检测与分析技术
Joochan Lee, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo
In recent years, 1 a large number of studies have been conducted on cybersecurity for Programmable Logic Controllers (PLCs) to cope with cyberattacks on Industrial Control Systems(ICS). However, few studies have been conducted on ensuring cybersafety for control logics running inside PLCs. In this study, a technique for detecting an attack on PLC control logic change was proposed by analyzing the network protocol data and project file structure. Based on the analysis results for the proposed technique, a tool was implemented to detect an manipulation attack on control logic, and whether such attack was detected or not was verified through experiments.
近年来,人们对可编程逻辑控制器(plc)的网络安全进行了大量研究,以应对针对工业控制系统(ICS)的网络攻击。然而,关于确保plc内部运行的控制逻辑的网络安全的研究很少。本文通过分析网络协议数据和项目文件结构,提出了一种检测PLC控制逻辑变更攻击的技术。在分析结果的基础上,实现了一种检测控制逻辑操纵攻击的工具,并通过实验验证了这种攻击是否被检测到。
{"title":"Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic","authors":"Joochan Lee, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444742","DOIUrl":"https://doi.org/10.1145/3440943.3444742","url":null,"abstract":"In recent years, 1 a large number of studies have been conducted on cybersecurity for Programmable Logic Controllers (PLCs) to cope with cyberattacks on Industrial Control Systems(ICS). However, few studies have been conducted on ensuring cybersafety for control logics running inside PLCs. In this study, a technique for detecting an attack on PLC control logic change was proposed by analyzing the network protocol data and project file structure. Based on the analysis results for the proposed technique, a tool was implemented to detect an manipulation attack on control logic, and whether such attack was detected or not was verified through experiments.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126870014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks 单亲家长和孩子对数字绘本故事书共同学习计划的态度
Y. Ou, Yueming Yu, Yu-Xi Chen, Zhen-Yu Wu
With the advancement of technology, modern people increasingly tend to communicate with other people through electronic products, and various relationships gradually become alienated, including the Parent-Child Relationship. Parent-child relationship can cultivate children's interaction and trust with other people in social relations, so education systems all over the world encourage the establishment of parent-child relationships to learn together. This research attempted to use children's picture storybooks as study tools to examine parents' and children's attitudes toward an English as a Foreign Language (EFL) parent-child co-learning program. Several parents, and G1 and G2 children, were invited as experimental subjects to participate in a ten-week co-learning program. Experimental results show that parents and children generally have a positive attitude towards the process of joint learning plans.
随着科技的进步,现代人越来越倾向于通过电子产品与他人交流,各种关系逐渐异化,包括亲子关系。亲子关系可以培养孩子在社会关系中与其他人的互动和信任,因此世界各国的教育制度都鼓励建立亲子关系,共同学习。本研究试图以儿童绘本故事书为研究工具,探讨家长与儿童对英语亲子共同学习计划的态度。几位家长和G1和G2的孩子被邀请作为实验对象参加为期十周的共同学习计划。实验结果表明,家长和孩子对共同学习计划的过程普遍持积极态度。
{"title":"Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks","authors":"Y. Ou, Yueming Yu, Yu-Xi Chen, Zhen-Yu Wu","doi":"10.1145/3440943.3444338","DOIUrl":"https://doi.org/10.1145/3440943.3444338","url":null,"abstract":"With the advancement of technology, modern people increasingly tend to communicate with other people through electronic products, and various relationships gradually become alienated, including the Parent-Child Relationship. Parent-child relationship can cultivate children's interaction and trust with other people in social relations, so education systems all over the world encourage the establishment of parent-child relationships to learn together. This research attempted to use children's picture storybooks as study tools to examine parents' and children's attitudes toward an English as a Foreign Language (EFL) parent-child co-learning program. Several parents, and G1 and G2 children, were invited as experimental subjects to participate in a ten-week co-learning program. Experimental results show that parents and children generally have a positive attitude towards the process of joint learning plans.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly detection in time-series data environment 时序数据环境下的异常检测
Doyeon Kim, Taejin Lee
Typical label data detect anomaly due to the relationship between inputs and labels, but time-series data are more demanding in detecting anomalies because they detect anomaly based on time-varying values. To solve this problem, this paper proposed Stacked-Autoencoder based data detection technique with ICS dataset among time series data. The Loss value was calculated as CDF and determined to be a suspicious event if it was greater than the arbitrarily specified threshold value. The experiment was carried out by designating 0.5, 0.7, 0.9 and 0.98, and 0.98 showed the best result with an accuracy of about 96%.
典型的标签数据检测异常是基于输入与标签之间的关系,而时间序列数据检测异常是基于时变值的,对异常的检测要求更高。为了解决这一问题,本文提出了基于堆叠自编码器的时间序列数据检测技术。Loss值计算为CDF,如果Loss值大于任意指定的阈值,则确定为可疑事件。通过指定0.5、0.7、0.9和0.98进行实验,以0.98为最佳结果,准确率约为96%。
{"title":"Anomaly detection in time-series data environment","authors":"Doyeon Kim, Taejin Lee","doi":"10.1145/3440943.3444353","DOIUrl":"https://doi.org/10.1145/3440943.3444353","url":null,"abstract":"Typical label data detect anomaly due to the relationship between inputs and labels, but time-series data are more demanding in detecting anomalies because they detect anomaly based on time-varying values. To solve this problem, this paper proposed Stacked-Autoencoder based data detection technique with ICS dataset among time series data. The Loss value was calculated as CDF and determined to be a suspicious event if it was greater than the arbitrarily specified threshold value. The experiment was carried out by designating 0.5, 0.7, 0.9 and 0.98, and 0.98 showed the best result with an accuracy of about 96%.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132296001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1