首页 > 最新文献

2020 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Performance Analysis of Tor Website Fingerprinting over Time using Tree Ensemble Models 基于树集成模型的Tor网站指纹识别性能分析
Hyoung-Jin Oh, Donghoon Kim, Won-gyum Kim, Doosung Hwang
Tor (The Onion Router) ensures network anonymity by encrypting contents through multiple relay nodes. Recent studies on website fingerprinting (WF) showed that websites can be identified with high accuracy by analyzing traffic data. However, websites are changing over time by updating contents, which can significantly reduce the accuracy of WF attacks. This study analyzes the performance over time by using ensemble models with excellent WF attack performance. The experiment are conducted in two cases with the initial model. The not updated analyzes the accuracy of models made from initial data over time, whereas the updated adds data that has changed over time to update the model to analyzes the accuracy. The average accuracy of the initial ensemble models is over 90.0% and the Rotation Forest algorithm shows high performance of 93.5%. Comparing the models trained after 30 days with the initial model, the classification performance dropped in both cases; the not updated dropped by more than 30.0% and the updated dropped by about 10.0%. The experimental results suggest that WF using machine learning may require model learning on a regular basis.
Tor (The Onion Router)通过多个中继节点对内容进行加密,保证了网络的匿名性。近年来对网站指纹技术的研究表明,通过对流量数据的分析,可以较准确地识别出网站。然而,随着时间的推移,网站会不断更新内容,这大大降低了WF攻击的准确性。本研究通过使用具有优异WF攻击性能的集成模型来分析性能随时间的变化。用初始模型进行了两种情况下的实验。未更新的模型分析基于初始数据的模型随时间的准确性,而更新的模型添加随时间变化的数据来更新模型以分析准确性。初始集成模型的平均精度超过90.0%,旋转森林算法的性能达到93.5%。将30天后训练的模型与初始模型进行比较,两种情况下的分类性能都有所下降;未更新的降幅超过30.0%,更新的降幅约为10.0%。实验结果表明,使用机器学习的WF可能需要定期进行模型学习。
{"title":"Performance Analysis of Tor Website Fingerprinting over Time using Tree Ensemble Models","authors":"Hyoung-Jin Oh, Donghoon Kim, Won-gyum Kim, Doosung Hwang","doi":"10.1109/CSCI51800.2020.00097","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00097","url":null,"abstract":"Tor (The Onion Router) ensures network anonymity by encrypting contents through multiple relay nodes. Recent studies on website fingerprinting (WF) showed that websites can be identified with high accuracy by analyzing traffic data. However, websites are changing over time by updating contents, which can significantly reduce the accuracy of WF attacks. This study analyzes the performance over time by using ensemble models with excellent WF attack performance. The experiment are conducted in two cases with the initial model. The not updated analyzes the accuracy of models made from initial data over time, whereas the updated adds data that has changed over time to update the model to analyzes the accuracy. The average accuracy of the initial ensemble models is over 90.0% and the Rotation Forest algorithm shows high performance of 93.5%. Comparing the models trained after 30 days with the initial model, the classification performance dropped in both cases; the not updated dropped by more than 30.0% and the updated dropped by about 10.0%. The experimental results suggest that WF using machine learning may require model learning on a regular basis.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accuracy-aware Structured Filter Pruning for Deep Neural Networks 深度神经网络的精度感知结构化滤波器剪枝
Marina Villalba Carballo, Byeong Kil Lee
Deep neural networks (DNNs) have several technical issues on computational complexity, redundancy, and the parameter size – especially when applied in embedded devices. Among those issues, lots of parameters require high memory capacity which causes migration problem to embedded devices. Many pruning techniques are proposed to reduce the network size in deep neural networks, but there are still various issues that exist for applying pruning techniques to DNNs. In this paper, we propose a simple-yet-efficient scheme, accuracy-aware structured pruning based on the characterization of each convolutional layer. We investigate the accuracy and compression rate of individual layer with a fixed pruning ratio and re-order the pruning priority depending on the accuracy of each layer. To achieve a further compression rate, we also add quantization to the linear layers. Our results show that the order of the layers pruned does affect the final accuracy of the deep neural network. Based on our experiments, the pruned AlexNet and VGG16 models’ parameter size is compressed up to 47.28x and 35.21x with less than 1% accuracy drop with respect to the original model.
深度神经网络(dnn)在计算复杂性、冗余度和参数大小等方面存在一些技术问题,特别是在嵌入式设备中应用时。在这些问题中,许多参数需要高内存容量,这导致了向嵌入式设备迁移的问题。为了减小深度神经网络的网络规模,人们提出了许多修剪技术,但是将修剪技术应用到深度神经网络中仍然存在各种问题。在本文中,我们提出了一种简单而高效的方案,即基于每个卷积层特征的精确感知结构化修剪。研究了固定剪枝比下各层的剪枝精度和压缩率,并根据各层的剪枝精度对剪枝优先级进行重新排序。为了获得更高的压缩率,我们还对线性层进行了量化。我们的研究结果表明,层的修剪顺序确实会影响深度神经网络的最终精度。实验结果表明,修剪后的AlexNet和VGG16模型的参数大小分别压缩到47.28倍和35.21倍,与原始模型相比精度下降不到1%。
{"title":"Accuracy-aware Structured Filter Pruning for Deep Neural Networks","authors":"Marina Villalba Carballo, Byeong Kil Lee","doi":"10.1109/CSCI51800.2020.00122","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00122","url":null,"abstract":"Deep neural networks (DNNs) have several technical issues on computational complexity, redundancy, and the parameter size – especially when applied in embedded devices. Among those issues, lots of parameters require high memory capacity which causes migration problem to embedded devices. Many pruning techniques are proposed to reduce the network size in deep neural networks, but there are still various issues that exist for applying pruning techniques to DNNs. In this paper, we propose a simple-yet-efficient scheme, accuracy-aware structured pruning based on the characterization of each convolutional layer. We investigate the accuracy and compression rate of individual layer with a fixed pruning ratio and re-order the pruning priority depending on the accuracy of each layer. To achieve a further compression rate, we also add quantization to the linear layers. Our results show that the order of the layers pruned does affect the final accuracy of the deep neural network. Based on our experiments, the pruned AlexNet and VGG16 models’ parameter size is compressed up to 47.28x and 35.21x with less than 1% accuracy drop with respect to the original model.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132858440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Analysis of Machine Learning Models for Diabetes Mellitus Type 2 Prediction 机器学习模型在2型糖尿病预测中的比较分析
L. Ismail, Huned Materwala
Diabetes is one of the top 10 causes of death worldwide. Health professionals are aiming for machine learning models to support the prognosis of diabetes for better healthcare and to put in place an effective prevention plan. In this paper, we conduct a comparative analysis of the most used machine learning models in the literature to predict the prevalence of diabetes mellitus type 2. We evaluate the models in terms of accuracy, F-measure and execution time with and without feature selection using a real-life diabetes dataset. The detailed analysis is in the paper.
糖尿病是全球十大死亡原因之一。卫生专业人员的目标是利用机器学习模型来支持糖尿病的预后,以提供更好的医疗保健,并制定有效的预防计划。在本文中,我们对文献中最常用的机器学习模型进行了比较分析,以预测2型糖尿病的患病率。我们使用现实生活中的糖尿病数据集,在有和没有特征选择的情况下,评估模型的准确性、F-measure和执行时间。本文对此进行了详细的分析。
{"title":"Comparative Analysis of Machine Learning Models for Diabetes Mellitus Type 2 Prediction","authors":"L. Ismail, Huned Materwala","doi":"10.1109/CSCI51800.2020.00095","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00095","url":null,"abstract":"Diabetes is one of the top 10 causes of death worldwide. Health professionals are aiming for machine learning models to support the prognosis of diabetes for better healthcare and to put in place an effective prevention plan. In this paper, we conduct a comparative analysis of the most used machine learning models in the literature to predict the prevalence of diabetes mellitus type 2. We evaluate the models in terms of accuracy, F-measure and execution time with and without feature selection using a real-life diabetes dataset. The detailed analysis is in the paper.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122426806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An attention-based deep learning method for text sentiment analysis 一种基于注意力的文本情感分析深度学习方法
Thanh-Huong Le
Text sentiment analysis is target-oriented, aiming to identify the opinion or attitude from a piece of natural language text toward topics or entities, whether it is negative, positive or neutral using natural language processing and computational methods. With the growth of the internet, numerous business websites have been deployed to support shopping products, booking services online as well as to allow online reviewing and commenting the services in forms of either business forums or social networks. Use of text sentiment analysis for automatically mining opinion from the feedbacks on such emerging internet platforms is not only useful for customers seeking for advice, but also necessary for business to study customers’ attitudes toward brands, products, services, or events, and has become an increasingly dominant trend in business strategic management. Current state-of-the-art approaches for text sentiment analysis include lexicon based and machine learning based methods. In this research, we proposed a method that utilizes deep learning with attention word embedding. We showed that our method outperformed popular lexicon and embedding based methods.
文本情感分析是一种目标导向的分析,旨在通过自然语言处理和计算方法,识别一段自然语言文本对主题或实体的观点或态度,无论是消极的、积极的还是中立的。随着互联网的发展,已经部署了许多商业网站来支持在线购物产品,在线预订服务,以及允许在线评论和评论服务,无论是商业论坛还是社交网络的形式。利用文本情感分析从这些新兴的互联网平台的反馈中自动挖掘意见,不仅对客户寻求建议有用,而且对于企业研究客户对品牌、产品、服务或事件的态度也是必要的,并且已经成为企业战略管理中日益占主导地位的趋势。当前最先进的文本情感分析方法包括基于词典和基于机器学习的方法。在本研究中,我们提出了一种利用深度学习和注意词嵌入的方法。结果表明,该方法优于流行的基于词典和嵌入的方法。
{"title":"An attention-based deep learning method for text sentiment analysis","authors":"Thanh-Huong Le","doi":"10.1109/CSCI51800.2020.00054","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00054","url":null,"abstract":"Text sentiment analysis is target-oriented, aiming to identify the opinion or attitude from a piece of natural language text toward topics or entities, whether it is negative, positive or neutral using natural language processing and computational methods. With the growth of the internet, numerous business websites have been deployed to support shopping products, booking services online as well as to allow online reviewing and commenting the services in forms of either business forums or social networks. Use of text sentiment analysis for automatically mining opinion from the feedbacks on such emerging internet platforms is not only useful for customers seeking for advice, but also necessary for business to study customers’ attitudes toward brands, products, services, or events, and has become an increasingly dominant trend in business strategic management. Current state-of-the-art approaches for text sentiment analysis include lexicon based and machine learning based methods. In this research, we proposed a method that utilizes deep learning with attention word embedding. We showed that our method outperformed popular lexicon and embedding based methods.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiple Attention Mechanism Neural Network in Garment Image Segmentation 多注意机制神经网络在服装图像分割中的应用
XU Yingheng, Zhong Yueqi
Instance segmentation of clothing images is a task that fashion analysts are paying more and more attention to in recent years. The segmentation of different clothing components allows designers to better design new fashion items and allows consumers to better understand design concepts. Most of the current methods are based on deep convolutional neural networks (DCNN). However, most of the current instance segmentation neural networks are limited by the size of the receptive field and cannot capture the global dependence. For clothing images, the use of contextual information between different clothing and collocations can obtain fine-grained and higher clothing segmentation images. Previous studies have shown that attention-based methods can obtain non-local dependencies of the whole image and are mostly used for panoramic segmentation of aerial images. For instance segmentation of clothing images, we propose a new dual-branch attention module based on the Non-local attention mechanism, called Multiple Attention MaskRCNN (HAMaskRCNN). Specifically, for the attention module, we use two branches: position attention and channel attention. After feature fusion, the FPN module and the attention module are connected in parallel to form a multiple attention module. We use the Imaterialist-fashion (2019) dataset to conduct experiments and compare with the benchmark to prove the effectiveness of our HAMaskRCNN.
服装图像的实例分割是近年来越来越受到时尚分析人士关注的课题。不同服装成分的细分可以让设计师更好地设计新的时尚单品,也可以让消费者更好地理解设计理念。目前大多数方法都是基于深度卷积神经网络(DCNN)。然而,目前大多数的实例分割神经网络都受到接收野大小的限制,无法捕捉到全局依赖关系。对于服装图像,利用不同服装和搭配之间的语境信息,可以得到粒度更细、层次更高的服装分割图像。以往的研究表明,基于注意力的方法可以获得整个图像的非局部依赖关系,多用于航拍图像的全景分割。以服装图像分割为例,我们提出了一种新的基于非局部注意机制的双分支注意模块,称为多注意MaskRCNN (HAMaskRCNN)。具体来说,对于注意模块,我们使用了两个分支:位置注意和通道注意。特征融合后,将FPN模块与注意模块并联连接,形成多注意模块。我们使用materialist-fashion(2019)数据集进行实验,并与基准进行比较,以证明我们的HAMaskRCNN的有效性。
{"title":"Multiple Attention Mechanism Neural Network in Garment Image Segmentation","authors":"XU Yingheng, Zhong Yueqi","doi":"10.1109/CSCI51800.2020.00309","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00309","url":null,"abstract":"Instance segmentation of clothing images is a task that fashion analysts are paying more and more attention to in recent years. The segmentation of different clothing components allows designers to better design new fashion items and allows consumers to better understand design concepts. Most of the current methods are based on deep convolutional neural networks (DCNN). However, most of the current instance segmentation neural networks are limited by the size of the receptive field and cannot capture the global dependence. For clothing images, the use of contextual information between different clothing and collocations can obtain fine-grained and higher clothing segmentation images. Previous studies have shown that attention-based methods can obtain non-local dependencies of the whole image and are mostly used for panoramic segmentation of aerial images. For instance segmentation of clothing images, we propose a new dual-branch attention module based on the Non-local attention mechanism, called Multiple Attention MaskRCNN (HAMaskRCNN). Specifically, for the attention module, we use two branches: position attention and channel attention. After feature fusion, the FPN module and the attention module are connected in parallel to form a multiple attention module. We use the Imaterialist-fashion (2019) dataset to conduct experiments and compare with the benchmark to prove the effectiveness of our HAMaskRCNN.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114932811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Hate Speech in Videos Using Machine Learning 使用机器学习检测视频中的仇恨言论
Sjsu Scholarworks, Unnathi Bhandary, Mike Wu, Samuel Chen
With the progression of the Internet and social media, people are given multiple platforms to share their thoughts and opinions about various subject matters freely. However, this freedom of speech is misused to direct hate towards individuals or group of people due to their race, religion, gender etc. The rise of hate speech has led to conflicts and cases of cyber bullying, causing many organizations to look for optimal solutions to solve this problem. Developments in the field of machine learning and deep learning have piqued the interest of researchers, leading them to research and implement solutions to solve the problem of hate speech. Currently, machine learning techniques are applied to textual data to detect hate speech. With the ample use of video sharing sites, there is a need to find a way to detect hate speech in videos. This research deals with classification of videos into normal or hateful categories based on the spoken content of the videos. The video dataset is built using a crawler to search and download videos based on offensive words that are specified as keywords. The audio is extracted from the videos and is converted into textual format using a Speech-to-Text converter to obtain a transcript of the videos. Experiments are conducted by training four models with three different feature sets extracted from the dataset. The models are evaluated by computing the specified evaluation metrics. The evaluated metrics indicate that Random Forrest Classifier model delivers the best results in classifying videos.
随着互联网和社交媒体的发展,人们有了多个平台来自由地分享他们对各种主题的想法和观点。然而,由于种族、宗教、性别等原因,这种言论自由被滥用来直接仇恨个人或群体。仇恨言论的兴起导致了冲突和网络欺凌的案例,导致许多组织寻找解决这一问题的最佳解决方案。机器学习和深度学习领域的发展激发了研究人员的兴趣,引导他们研究和实施解决仇恨言论问题的解决方案。目前,机器学习技术被应用于文本数据来检测仇恨言论。随着视频分享网站的大量使用,有必要找到一种方法来检测视频中的仇恨言论。这项研究是根据视频的口语内容将视频分为正常或讨厌的类别。视频数据集使用爬虫来搜索和下载视频,这些视频基于被指定为关键字的冒犯性词语。从视频中提取音频,并使用语音到文本转换器将其转换为文本格式,以获得视频的转录本。实验通过从数据集中提取三个不同的特征集训练四个模型来进行。通过计算指定的评价指标对模型进行评价。评价指标表明,随机福雷斯特分类器模型在视频分类中具有最好的效果。
{"title":"Detection of Hate Speech in Videos Using Machine Learning","authors":"Sjsu Scholarworks, Unnathi Bhandary, Mike Wu, Samuel Chen","doi":"10.1109/CSCI51800.2020.00104","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00104","url":null,"abstract":"With the progression of the Internet and social media, people are given multiple platforms to share their thoughts and opinions about various subject matters freely. However, this freedom of speech is misused to direct hate towards individuals or group of people due to their race, religion, gender etc. The rise of hate speech has led to conflicts and cases of cyber bullying, causing many organizations to look for optimal solutions to solve this problem. Developments in the field of machine learning and deep learning have piqued the interest of researchers, leading them to research and implement solutions to solve the problem of hate speech. Currently, machine learning techniques are applied to textual data to detect hate speech. With the ample use of video sharing sites, there is a need to find a way to detect hate speech in videos. This research deals with classification of videos into normal or hateful categories based on the spoken content of the videos. The video dataset is built using a crawler to search and download videos based on offensive words that are specified as keywords. The audio is extracted from the videos and is converted into textual format using a Speech-to-Text converter to obtain a transcript of the videos. Experiments are conducted by training four models with three different feature sets extracted from the dataset. The models are evaluated by computing the specified evaluation metrics. The evaluated metrics indicate that Random Forrest Classifier model delivers the best results in classifying videos.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115980333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Generating Indoor Navigation Routes Using Beacons 使用信标生成室内导航路线
A. Martínez-Rebollar, Hugo Estrada-Esquivel, L. López-García, Leon Torres-Restrepo, J. Ortiz-Hernandez
The Internet of Things is promoting the generation of smart buildings. These buildings have as main requirement the navigation of interiors. However, GPS technology, which is used to carry out positioning, cannot be used within a building because satellite signals do not travel well through solid materials. In this paper, we present an indoor navigation proposal, which uses beacons technology and smartphones. Our software application obtains information from the context and generates the best route to reach the destination within an intelligent building. The Dijkstra algorithm was used to process all the information. Hence, our proposal aims to combine different technologies, and adapt developed algorithms to indoor navigation. The results obtained are encouraging and show that it is possible to obtain good results using this type of technology.
物联网正在推动智能建筑的产生。这些建筑的主要要求是室内导航。然而,用于定位的GPS技术不能在建筑物内使用,因为卫星信号不能很好地穿过固体材料。在本文中,我们提出了一种利用信标技术和智能手机的室内导航方案。我们的软件应用程序从环境中获取信息,并在智能建筑中生成到达目的地的最佳路线。采用Dijkstra算法对所有信息进行处理。因此,我们的提案旨在结合不同的技术,并将开发的算法应用于室内导航。实验结果令人鼓舞,表明采用这种技术可以获得良好的效果。
{"title":"Generating Indoor Navigation Routes Using Beacons","authors":"A. Martínez-Rebollar, Hugo Estrada-Esquivel, L. López-García, Leon Torres-Restrepo, J. Ortiz-Hernandez","doi":"10.1109/CSCI51800.2020.00220","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00220","url":null,"abstract":"The Internet of Things is promoting the generation of smart buildings. These buildings have as main requirement the navigation of interiors. However, GPS technology, which is used to carry out positioning, cannot be used within a building because satellite signals do not travel well through solid materials. In this paper, we present an indoor navigation proposal, which uses beacons technology and smartphones. Our software application obtains information from the context and generates the best route to reach the destination within an intelligent building. The Dijkstra algorithm was used to process all the information. Hence, our proposal aims to combine different technologies, and adapt developed algorithms to indoor navigation. The results obtained are encouraging and show that it is possible to obtain good results using this type of technology.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114789522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Edge Computing Based Situation Enabled Crowdsourcing Blacklisting System for Efficient Identification of Scammer Phone Numbers 基于边缘计算的众包黑名单系统高效识别诈骗电话号码
Chen-Yeou Yu, Carl K. Chang, Wensheng Zhang
The growth of telecommunication fraud has caused tremendous loss to end users. In particular, new technologies such as robocalling systems have been a new resource of harassment. Traditional approaches in detecting such activities simply rely on the construction of blacklisting number systems. However, criminals can easily masquerade their phone numbers simply by changing their numbers through VoIP (Voice over IP) or use virtual mobile numbers (VMN) with relatively low pricing, laxed ID checks and high-level API automation. In this paper, we present a novel situation-enabled approach to blacklist unwanted phone numbers while keeping high detection rate through distributed crowd sourcing. The system consists of two parts. First, we collect a user’s daily schedule in time series as situational data and use the data to train Long Short Term Memory (LSTM) deep learning model. This model is used to predict the user’s situation in the future. Then, we implement a semi-automatic tagging application to tag each incoming call by reading the call history against the predicted situation. An incoming phone number can be automatically tagged as malicious if it is in a wrong situation or could be benign otherwise. A user is also allowed to manually change the tagging afterwards if it is necessary. Second, a distributed crowdsourcing is used to aggregate highly ranked calling numbers from different devices in the same area. When a higher-level blacklist has been built, it can be used to update local ones by propagating back to end user devices with edge local blacklist and edge foreign blacklist. A simple evaluation has been made against real incoming calls on Android phones. The results show that our system design can attain decent detection rates.
电信诈骗的增长给终端用户造成了巨大的损失。特别是,像自动电话系统这样的新技术已经成为骚扰的新来源。检测此类活动的传统方法仅仅依赖于黑名单号码系统的构建。然而,犯罪分子可以很容易地通过VoIP (IP语音)或使用价格相对较低、ID检查宽松和高级API自动化的虚拟移动号码(VMN)来改变他们的电话号码,从而伪装他们的电话号码。在本文中,我们提出了一种新的基于情境的方法,通过分布式众包将不需要的电话号码列入黑名单,同时保持较高的检出率。该系统由两部分组成。首先,我们以时间序列的形式收集用户的日常日程作为情景数据,并使用这些数据来训练长短期记忆(LSTM)深度学习模型。该模型用于预测用户未来的情况。然后,我们实现一个半自动标记应用程序,通过根据预测的情况读取呼叫历史记录来标记每个传入呼叫。如果输入的电话号码处于错误的情况,则可以自动标记为恶意电话号码,否则可能是良性电话号码。如果有必要,用户还可以在之后手动更改标签。其次,采用分布式众包的方式,将同一地区不同设备的高排名呼叫号码聚合在一起。当建立了更高级别的黑名单后,可以通过将其传播回具有边缘本地黑名单和边缘外部黑名单的终端用户设备来更新本地黑名单。针对Android手机上的真实来电进行了一个简单的评估。结果表明,我们的系统设计可以达到良好的检测率。
{"title":"An Edge Computing Based Situation Enabled Crowdsourcing Blacklisting System for Efficient Identification of Scammer Phone Numbers","authors":"Chen-Yeou Yu, Carl K. Chang, Wensheng Zhang","doi":"10.1109/CSCI51800.2020.00146","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00146","url":null,"abstract":"The growth of telecommunication fraud has caused tremendous loss to end users. In particular, new technologies such as robocalling systems have been a new resource of harassment. Traditional approaches in detecting such activities simply rely on the construction of blacklisting number systems. However, criminals can easily masquerade their phone numbers simply by changing their numbers through VoIP (Voice over IP) or use virtual mobile numbers (VMN) with relatively low pricing, laxed ID checks and high-level API automation. In this paper, we present a novel situation-enabled approach to blacklist unwanted phone numbers while keeping high detection rate through distributed crowd sourcing. The system consists of two parts. First, we collect a user’s daily schedule in time series as situational data and use the data to train Long Short Term Memory (LSTM) deep learning model. This model is used to predict the user’s situation in the future. Then, we implement a semi-automatic tagging application to tag each incoming call by reading the call history against the predicted situation. An incoming phone number can be automatically tagged as malicious if it is in a wrong situation or could be benign otherwise. A user is also allowed to manually change the tagging afterwards if it is necessary. Second, a distributed crowdsourcing is used to aggregate highly ranked calling numbers from different devices in the same area. When a higher-level blacklist has been built, it can be used to update local ones by propagating back to end user devices with edge local blacklist and edge foreign blacklist. A simple evaluation has been made against real incoming calls on Android phones. The results show that our system design can attain decent detection rates.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116793455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information Security Attacks on Mobile Messaging Applications: Procedural and Technological Responses 移动通讯应用的信息安全攻击:程序和技术响应
L. Ramamoorthi, Gabrielle Peko, D. Sundaram
In today’s digital world mobile phones have a significant impact on our day-to-day lives including the use of internet chat applications designed for smartphone users. Generally, these mobile messaging apps claim they protect the user’s information using encryption techniques. Yet, information security attacks that exploit the apps’ vulnerabilities are increasingly common. These vulnerabilities are the main gateway for hackers to access information. Considering the four most popular messaging apps, a taxonomy of attack targets of messaging applications is introduced that consists of three broad categories of attacks. Each of these categories is discussed and analyzed in order to propose several combinations of technological and procedural solutions to mitigate the vulnerabilities. Further, it is envisioned that these solutions provide the foundation for building prevention and protection mechanisms against such attacks.
在当今的数字世界中,手机对我们的日常生活产生了重大影响,包括为智能手机用户设计的互联网聊天应用程序的使用。一般来说,这些移动通讯应用程序声称他们使用加密技术保护用户的信息。然而,利用应用程序漏洞的信息安全攻击越来越普遍。这些漏洞是黑客获取信息的主要途径。考虑到四种最流行的消息传递应用程序,介绍了消息传递应用程序的攻击目标分类,包括三大类攻击。每一个类别都进行了讨论和分析,以便提出几种技术和程序解决方案的组合来减轻漏洞。此外,预计这些解决方案将为构建针对此类攻击的预防和保护机制提供基础。
{"title":"Information Security Attacks on Mobile Messaging Applications: Procedural and Technological Responses","authors":"L. Ramamoorthi, Gabrielle Peko, D. Sundaram","doi":"10.1109/CSCI51800.2020.00053","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00053","url":null,"abstract":"In today’s digital world mobile phones have a significant impact on our day-to-day lives including the use of internet chat applications designed for smartphone users. Generally, these mobile messaging apps claim they protect the user’s information using encryption techniques. Yet, information security attacks that exploit the apps’ vulnerabilities are increasingly common. These vulnerabilities are the main gateway for hackers to access information. Considering the four most popular messaging apps, a taxonomy of attack targets of messaging applications is introduced that consists of three broad categories of attacks. Each of these categories is discussed and analyzed in order to propose several combinations of technological and procedural solutions to mitigate the vulnerabilities. Further, it is envisioned that these solutions provide the foundation for building prevention and protection mechanisms against such attacks.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116370442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Conceptual Model for real-time Binaural-Room Impulse Responses generation using ANNs in Virtual Environments: State of the Art 虚拟环境中使用人工神经网络生成实时双耳-房间脉冲响应的概念模型:最新进展
Daniel A. Sanaguano, José Lucio-Naranjo, R. Tenenbaum
This work aims to give an overview of Artificial Neural Networks (ANN) approaches applied for BIRs generation published in the literature and to expose gaps in the academic research. The literature review shows that several successful studies are using ANNs approaches for BIRs generation with a reduction in the computational effort by up to 90% with respect to the Traditional Method. Nevertheless, these approaches are bounded by a fixed pair of a sound-source and binaural-receptor, meaning that they do not take into account dynamic variations in the position of the receptor. In this sense, this work also introduces a conceptual model for a real-time BIRs generator that considers a moving binaural-receptor using a set of Artificial Neural Networks.
本工作旨在概述在文献中发表的用于BIRs生成的人工神经网络(ANN)方法,并揭示学术研究中的差距。文献综述表明,一些成功的研究使用人工神经网络方法生成BIRs,与传统方法相比,计算工作量减少了90%。然而,这些方法受到声源和双耳受体的固定对的限制,这意味着它们不考虑受体位置的动态变化。从这个意义上说,这项工作还引入了一个实时BIRs生成器的概念模型,该生成器使用一组人工神经网络来考虑移动的双耳受体。
{"title":"A Conceptual Model for real-time Binaural-Room Impulse Responses generation using ANNs in Virtual Environments: State of the Art","authors":"Daniel A. Sanaguano, José Lucio-Naranjo, R. Tenenbaum","doi":"10.1109/CSCI51800.2020.00102","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00102","url":null,"abstract":"This work aims to give an overview of Artificial Neural Networks (ANN) approaches applied for BIRs generation published in the literature and to expose gaps in the academic research. The literature review shows that several successful studies are using ANNs approaches for BIRs generation with a reduction in the computational effort by up to 90% with respect to the Traditional Method. Nevertheless, these approaches are bounded by a fixed pair of a sound-source and binaural-receptor, meaning that they do not take into account dynamic variations in the position of the receptor. In this sense, this work also introduces a conceptual model for a real-time BIRs generator that considers a moving binaural-receptor using a set of Artificial Neural Networks.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1