首页 > 最新文献

The 2nd European Symposium on Computer and Communications最新文献

英文 中文
Strengthening the Security and Preserving User Anonymity of Remote User Authentication Scheme Using Smart Card 基于智能卡的远程用户认证方案的安全性增强与匿名性保护
Pub Date : 2021-04-16 DOI: 10.1145/3478301.3478302
Abdullah Hanifan, Ari Moesriami Barmawi
Smart card based user authentication offers security and convenience in the remote user authentication system. On the other hand, a strong and secure scheme is needed to provide user authentication based on a smart card. Several schemes have been proposed, one of them is Lee's scheme proposed in 2015 [1]. However, based on Jung et al. analysis 2015[2], Lee's scheme has several weaknesses against impersonation and off-line password guessing attack. Moreover, the scheme is also failed to preserve user anonymity. This research proposed an improvement scheme to strengthen Lee's scheme [1]. For strengthening Lee's scheme, the proposed scheme uses Zero Knowledge and keyed hash function. The proposed scheme introduces an additional phase for generating a session key for securing the communication between two parties each other. Based on the experiment, it can be concluded that the proposed scheme is stronger than the previous scheme because the probability for breaking the proposed scheme using the off-line password guessing and impersonation attack is less than probability for breaking Lee's scheme.
基于智能卡的用户认证为远程用户认证系统提供了安全性和便利性。另一方面,需要一个强大而安全的方案来提供基于智能卡的用户身份验证。已经提出了几种方案,其中之一是Lee在2015年提出的方案[1]。然而,根据Jung等人的分析2015[2],Lee的方案在抵御冒充和离线密码猜测攻击方面存在几个弱点。此外,该方案也不能保证用户的匿名性。本研究提出了一种改进方案来加强Lee的方案[1]。为了加强Lee的方案,该方案使用了零知识和键控哈希函数。该方案引入了一个额外的阶段,用于生成会话密钥,以确保双方之间的通信安全。实验结果表明,利用离线密码猜测和模拟攻击破解该方案的概率小于破解Lee方案的概率,因此该方案比之前的方案更强。
{"title":"Strengthening the Security and Preserving User Anonymity of Remote User Authentication Scheme Using Smart Card","authors":"Abdullah Hanifan, Ari Moesriami Barmawi","doi":"10.1145/3478301.3478302","DOIUrl":"https://doi.org/10.1145/3478301.3478302","url":null,"abstract":"Smart card based user authentication offers security and convenience in the remote user authentication system. On the other hand, a strong and secure scheme is needed to provide user authentication based on a smart card. Several schemes have been proposed, one of them is Lee's scheme proposed in 2015 [1]. However, based on Jung et al. analysis 2015[2], Lee's scheme has several weaknesses against impersonation and off-line password guessing attack. Moreover, the scheme is also failed to preserve user anonymity. This research proposed an improvement scheme to strengthen Lee's scheme [1]. For strengthening Lee's scheme, the proposed scheme uses Zero Knowledge and keyed hash function. The proposed scheme introduces an additional phase for generating a session key for securing the communication between two parties each other. Based on the experiment, it can be concluded that the proposed scheme is stronger than the previous scheme because the probability for breaking the proposed scheme using the off-line password guessing and impersonation attack is less than probability for breaking Lee's scheme.","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research Progress on Thermal Conductivity of Two-dimensional IV A Materials Based on Molecular Dynamics Simulation 基于分子动力学模拟的二维IV A材料热导率研究进展
Pub Date : 2021-04-16 DOI: 10.1145/3478301.3478309
Yucheng Yang
This paper introduces the research process of using molecular dynamics theory to simulate the thermal conductivity of two-dimensional IV A materials represented by graphene. The major works include using Materials Studio to construct the material model, importing the model into Lammps for simulation calculation, and using non-equilibrium molecular dynamics (NEMD) to calculate the thermal conductivity. The relationship between thermal conductivity and model size of several two-dimensional IV A materials is summarized. With the increase of size, the thermal conductivity increases. Moreover, the thermal conductivity increases approximately linearly with the increase of length and nonlinear with the increase of width, which shows that the first derivative of the function of thermal conductivity and width decreases gradually with the increase of width, but it is always positive. The relationship between thermal conductivity and temperature is summarized as well. The thermal conductivity increases with the increase of temperature, and the thermal conductivity has the maximum value with respect to the first derivative of the initial temperature around 330K, but some literatures have given the opposite experimental results: the thermal conductivity decreases with the increase of temperature. The molecular dynamics simulation process and influencing factors of thermal conductivity of two-dimensional IV A materials that are studied in this paper play a certain role in the field of low-dimensional thermal properties.
本文介绍了利用分子动力学理论模拟以石墨烯为代表的二维IV A材料导热性能的研究过程。主要工作包括使用Materials Studio构建材料模型,将模型导入Lammps进行模拟计算,使用非平衡分子动力学(NEMD)计算导热系数。总结了几种二维IV A材料的热导率与模型尺寸的关系。随着尺寸的增大,导热系数增大。导热系数随长度的增加近似线性增加,随宽度的增加呈非线性增加,表明导热系数与宽度的函数一阶导数随宽度的增加逐渐减小,但始终为正。总结了导热系数与温度的关系。导热系数随温度的升高而增大,导热系数相对于初始温度的一阶导数在330K左右达到最大值,但也有文献给出了相反的实验结果:导热系数随温度的升高而减小。本文所研究的二维IV A材料的分子动力学模拟过程及导热系数的影响因素在低维热物性研究领域具有一定的作用。
{"title":"Research Progress on Thermal Conductivity of Two-dimensional IV A Materials Based on Molecular Dynamics Simulation","authors":"Yucheng Yang","doi":"10.1145/3478301.3478309","DOIUrl":"https://doi.org/10.1145/3478301.3478309","url":null,"abstract":"This paper introduces the research process of using molecular dynamics theory to simulate the thermal conductivity of two-dimensional IV A materials represented by graphene. The major works include using Materials Studio to construct the material model, importing the model into Lammps for simulation calculation, and using non-equilibrium molecular dynamics (NEMD) to calculate the thermal conductivity. The relationship between thermal conductivity and model size of several two-dimensional IV A materials is summarized. With the increase of size, the thermal conductivity increases. Moreover, the thermal conductivity increases approximately linearly with the increase of length and nonlinear with the increase of width, which shows that the first derivative of the function of thermal conductivity and width decreases gradually with the increase of width, but it is always positive. The relationship between thermal conductivity and temperature is summarized as well. The thermal conductivity increases with the increase of temperature, and the thermal conductivity has the maximum value with respect to the first derivative of the initial temperature around 330K, but some literatures have given the opposite experimental results: the thermal conductivity decreases with the increase of temperature. The molecular dynamics simulation process and influencing factors of thermal conductivity of two-dimensional IV A materials that are studied in this paper play a certain role in the field of low-dimensional thermal properties.","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision Analysis and Prediction Based on Credit Card Fraud Data 基于信用卡欺诈数据的决策分析与预测
Pub Date : 2021-04-16 DOI: 10.1145/3478301.3478305
Deshan Huang, Yu Lin, Zhaoxing Weng, Jiajie Xiong
With the common use of credit cards in today's transactions, the related fraudulent behavior inevitably occurs and causes considerable loss of money. To solve this problem, our work used a dataset that contains legal credit card transactions as well as fraud transactions to find an effective solution. In this paper, through processing and analyzing the transaction data, the data was discovered to be unbalanced, so stratified sampling and oversampling were performed to achieve a more reliable analysis of the unbalanced dataset. Meanwhile, due to the randomness of sampling, the cross-validated were used for the final model selection. Further, we utilized five algorithms to build models which contains statistical machine learning model and deep learning model. To obtain optimal performance of the models, hyperparameter tuning was performed for the five classifiers. Finally, the results indicate that the optimal model was XGBoost, and its performance can be verified in a real-life scenario in the future.
随着信用卡在当今交易中的普遍使用,相关的欺诈行为不可避免地发生,并造成相当大的金钱损失。为了解决这个问题,我们的工作使用了一个包含合法信用卡交易和欺诈交易的数据集来找到一个有效的解决方案。本文通过对交易数据的处理和分析,发现数据不平衡,因此进行分层抽样和过抽样,以实现对不平衡数据集的更可靠的分析。同时,由于抽样的随机性,最终的模型选择采用交叉验证。在此基础上,利用五种算法构建了统计机器学习模型和深度学习模型。为了获得最优的模型性能,对五个分类器进行了超参数调优。最后,结果表明,最优模型为XGBoost,其性能可以在未来的实际场景中得到验证。
{"title":"Decision Analysis and Prediction Based on Credit Card Fraud Data","authors":"Deshan Huang, Yu Lin, Zhaoxing Weng, Jiajie Xiong","doi":"10.1145/3478301.3478305","DOIUrl":"https://doi.org/10.1145/3478301.3478305","url":null,"abstract":"With the common use of credit cards in today's transactions, the related fraudulent behavior inevitably occurs and causes considerable loss of money. To solve this problem, our work used a dataset that contains legal credit card transactions as well as fraud transactions to find an effective solution. In this paper, through processing and analyzing the transaction data, the data was discovered to be unbalanced, so stratified sampling and oversampling were performed to achieve a more reliable analysis of the unbalanced dataset. Meanwhile, due to the randomness of sampling, the cross-validated were used for the final model selection. Further, we utilized five algorithms to build models which contains statistical machine learning model and deep learning model. To obtain optimal performance of the models, hyperparameter tuning was performed for the five classifiers. Finally, the results indicate that the optimal model was XGBoost, and its performance can be verified in a real-life scenario in the future.","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Empirically Comparing the Test Suite Reduction Techniques in Continuous Integration Process: How Test Suite Reduction Impacts Fault Localization 持续集成过程中测试集缩减技术的经验比较:测试集缩减对故障定位的影响
Pub Date : 2021-04-16 DOI: 10.1145/3478301.3478304
Jutarporn Intasara, Chu-Ti Lin
In a continuous integration (CI) environment, software developers can frequently integrate the new or modified code to codebase and ensure the correctness of the modification by performing regression testing (RT). RT generally takes long time but the time period allocated for it is limited in practice. A CI environment can adopt test suite reduction (TSR) to improve RT and accelerate debugging by performing spectrum-based fault localization (SBFL). Yet, different TSR techniques will achieve different program test spectra and SBFL will operate based on these test spectra. Thus, the selection of TSR techniques has influence on both the effectiveness of the fault localization (FL) and the length of a CI period. If developers want to improve the CI by including TSR and SBFL, they have to choose a suitable TSR technique to maximize the FL effectiveness and minimize the CI period length. In this paper, we consider a TSR technique as the combination of the TSR strategy, the metric to evaluate test cases, and the coverage granularity level. We will analyze the impact caused by these three factors. Our study covers three TSR strategies, four metrics to evaluate test cases, and three coverage granularity levels, thus resulting in 36 TSR techniques. We investigate how each of the 36 TSR techniques affects the FL effectiveness and the CI period length by conducting the experiment based on seven subject programs that have been frequently adopted in the relevant studies. The experiment results indicate that performing TSR at branch coverage is recommended for optimizing the FL effectiveness while the HGS algorithm is suggested if the CI period length is developers’ main concern.
在持续集成(CI)环境中,软件开发人员可以频繁地将新的或修改的代码集成到代码库中,并通过执行回归测试(RT)来确保修改的正确性。RT通常耗时较长,但在实践中为其分配的时间有限。CI环境可以采用测试套件缩减(TSR),通过基于频谱的故障定位(SBFL)来提高RT和加快调试速度。然而,不同的TSR技术将获得不同的程序测试谱,SBFL将基于这些测试谱运行。因此,TSR技术的选择既影响故障定位的有效性,也影响故障定位周期的长度。如果开发人员希望通过包括TSR和SBFL来改善CI,他们必须选择合适的TSR技术来最大化FL有效性并最小化CI周期长度。在本文中,我们将TSR技术视为TSR策略、评估测试用例的度量和覆盖粒度级别的组合。我们将分析这三个因素造成的影响。我们的研究涵盖了三种TSR策略,四种评估测试用例的度量,以及三种覆盖粒度级别,从而产生了36种TSR技术。我们通过在相关研究中经常采用的七个主题项目进行实验,研究了36种TSR技术中每一种技术如何影响FL有效性和CI周期长度。实验结果表明,建议在分支覆盖上执行TSR来优化FL的有效性,而如果开发人员主要关注CI周期长度,则建议使用HGS算法。
{"title":"Empirically Comparing the Test Suite Reduction Techniques in Continuous Integration Process: How Test Suite Reduction Impacts Fault Localization","authors":"Jutarporn Intasara, Chu-Ti Lin","doi":"10.1145/3478301.3478304","DOIUrl":"https://doi.org/10.1145/3478301.3478304","url":null,"abstract":"In a continuous integration (CI) environment, software developers can frequently integrate the new or modified code to codebase and ensure the correctness of the modification by performing regression testing (RT). RT generally takes long time but the time period allocated for it is limited in practice. A CI environment can adopt test suite reduction (TSR) to improve RT and accelerate debugging by performing spectrum-based fault localization (SBFL). Yet, different TSR techniques will achieve different program test spectra and SBFL will operate based on these test spectra. Thus, the selection of TSR techniques has influence on both the effectiveness of the fault localization (FL) and the length of a CI period. If developers want to improve the CI by including TSR and SBFL, they have to choose a suitable TSR technique to maximize the FL effectiveness and minimize the CI period length. In this paper, we consider a TSR technique as the combination of the TSR strategy, the metric to evaluate test cases, and the coverage granularity level. We will analyze the impact caused by these three factors. Our study covers three TSR strategies, four metrics to evaluate test cases, and three coverage granularity levels, thus resulting in 36 TSR techniques. We investigate how each of the 36 TSR techniques affects the FL effectiveness and the CI period length by conducting the experiment based on seven subject programs that have been frequently adopted in the relevant studies. The experiment results indicate that performing TSR at branch coverage is recommended for optimizing the FL effectiveness while the HGS algorithm is suggested if the CI period length is developers’ main concern.","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133413495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Gaming Habits on Achievement Motivation, Social Support, and Personal Achievements: A Structural Equation Modeling Approach 游戏习惯对成就动机、社会支持和个人成就的影响:一个结构方程模型方法
Pub Date : 2021-04-16 DOI: 10.1145/3478301.3478310
Yogi Tri Prasetyo, Patrick Viquiera, Christine M. Pudadera, Myka M. Sobremonte
Mobile gaming is part and parcel of almost every student's life. The purpose of this study was to investigate the effects of online mobile games on achievement motivation, social support, and personal achievements by utilizing a structural equation modeling (SEM) approach. 254 participants were voluntary answered an online questionnaire which consist of 23 questions. SEM showed that gaming habits had a significant effect on perceived stress which subsequently affected achievement motivation, social support, and personal achievements. The SEM construct can be a theoretical foundation which would be very beneficial for psychologists, academicians, and even educators.
手机游戏几乎是每个学生生活中不可或缺的一部分。本研究利用结构方程模型(SEM)探讨了网络手机游戏对成就动机、社会支持和个人成就的影响。254名参与者自愿回答了一份包含23个问题的在线问卷。SEM显示,游戏习惯对感知压力有显著影响,进而影响成就动机、社会支持和个人成就。扫描电镜结构可以作为一个理论基础,这对心理学家、学者甚至教育家都是非常有益的。
{"title":"The Effect of Gaming Habits on Achievement Motivation, Social Support, and Personal Achievements: A Structural Equation Modeling Approach","authors":"Yogi Tri Prasetyo, Patrick Viquiera, Christine M. Pudadera, Myka M. Sobremonte","doi":"10.1145/3478301.3478310","DOIUrl":"https://doi.org/10.1145/3478301.3478310","url":null,"abstract":"Mobile gaming is part and parcel of almost every student's life. The purpose of this study was to investigate the effects of online mobile games on achievement motivation, social support, and personal achievements by utilizing a structural equation modeling (SEM) approach. 254 participants were voluntary answered an online questionnaire which consist of 23 questions. SEM showed that gaming habits had a significant effect on perceived stress which subsequently affected achievement motivation, social support, and personal achievements. The SEM construct can be a theoretical foundation which would be very beneficial for psychologists, academicians, and even educators.","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"459 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116773313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved adaptive particle swarm for BP neural network optimization in hospital outpatient volume prediction 改进的自适应粒子群BP神经网络优化在医院门诊量预测中的应用
Pub Date : 2021-04-16 DOI: 10.1145/3478301.3478307
Yan-Bo Yang, Qin Zhang, Biaobiao Zhang
Real-time and accurate prediction of hospital outpatients is an important basis for the hospital to resolve the current contradiction between doctors and patients. However, the traditional hospital outpatients cannot accurately predict the data and reveal the internal laws of its time series, which cannot effectively adjust the treatment resources. This paper proposes the new particle swarm optimization (PSO) algorithm to optimize the BP neural network to predict outpatient timing. Specifically, it uses improved adaptive acceleration factor and inertia weight to iteratively optimize weight values and threshold values of the BP neural network, trains the BP neural network model, and then conducts calculation work. Its results are compared with those of the BP neural network optimized by the standard particle swarm optimization algorithm and the traditional BP neural network model respectively. The data comparison results show that new prediction accuracy is significantly improved and iterative calculation is very stable, therefore the improved particle swarm optimization BP neural network model can better predict the trend of hospital outpatient flow over time.
医院门诊患者实时、准确的预测是医院解决当前医患矛盾的重要依据。然而,传统医院门诊无法准确预测数据,揭示其时间序列的内在规律,无法有效调整治疗资源。本文提出了一种新的粒子群优化算法来优化BP神经网络来预测门诊时间。具体来说,利用改进的自适应加速度因子和惯性权值对BP神经网络的权值和阈值进行迭代优化,训练BP神经网络模型,然后进行计算工作。将其结果分别与标准粒子群算法和传统BP神经网络模型优化的BP神经网络结果进行了比较。数据对比结果表明,改进后的粒子群优化BP神经网络模型预测准确率显著提高,迭代计算非常稳定,可以较好地预测医院门诊流量随时间的变化趋势。
{"title":"Improved adaptive particle swarm for BP neural network optimization in hospital outpatient volume prediction","authors":"Yan-Bo Yang, Qin Zhang, Biaobiao Zhang","doi":"10.1145/3478301.3478307","DOIUrl":"https://doi.org/10.1145/3478301.3478307","url":null,"abstract":"Real-time and accurate prediction of hospital outpatients is an important basis for the hospital to resolve the current contradiction between doctors and patients. However, the traditional hospital outpatients cannot accurately predict the data and reveal the internal laws of its time series, which cannot effectively adjust the treatment resources. This paper proposes the new particle swarm optimization (PSO) algorithm to optimize the BP neural network to predict outpatient timing. Specifically, it uses improved adaptive acceleration factor and inertia weight to iteratively optimize weight values and threshold values of the BP neural network, trains the BP neural network model, and then conducts calculation work. Its results are compared with those of the BP neural network optimized by the standard particle swarm optimization algorithm and the traditional BP neural network model respectively. The data comparison results show that new prediction accuracy is significantly improved and iterative calculation is very stable, therefore the improved particle swarm optimization BP neural network model can better predict the trend of hospital outpatient flow over time.","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131182786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Domain Guidance Positioning Method Based on Multi-Layer Network Structure 基于多层网络结构的跨域制导定位方法
Pub Date : 2021-04-16 DOI: 10.1145/3478301.3478306
C. Wu, Xiaoyun Guo, Cheng Xu, H. Qi, Yanxu Liu, Jianmin Zhao, Enwen Hu
Oriented towards the requirements for reliable positioning and navigation of aircraft under the condition of rejection of navigation satellite, we proposed cross-domain guide positioning methods based on multi-layer network coverage, and designed the relative positioning network construction methods between ground nodes, aircrafts and ground nodes, aircrafts and target nodes. Combined with the relative positioning network characteristics of each layer, at the same time, considered the computational complexity and location accuracy, the self-established multi-point coordinate system method and the robust location method are proposed.
针对导航卫星拒绝条件下飞行器的可靠定位导航需求,提出了基于多层网络覆盖的跨域制导定位方法,设计了地面节点、飞行器与地面节点、飞行器与目标节点之间的相对定位网络构建方法。结合各层相对定位网络的特点,同时考虑计算复杂度和定位精度,提出了自建立多点坐标系法和鲁棒定位法。
{"title":"Cross-Domain Guidance Positioning Method Based on Multi-Layer Network Structure","authors":"C. Wu, Xiaoyun Guo, Cheng Xu, H. Qi, Yanxu Liu, Jianmin Zhao, Enwen Hu","doi":"10.1145/3478301.3478306","DOIUrl":"https://doi.org/10.1145/3478301.3478306","url":null,"abstract":"Oriented towards the requirements for reliable positioning and navigation of aircraft under the condition of rejection of navigation satellite, we proposed cross-domain guide positioning methods based on multi-layer network coverage, and designed the relative positioning network construction methods between ground nodes, aircrafts and ground nodes, aircrafts and target nodes. Combined with the relative positioning network characteristics of each layer, at the same time, considered the computational complexity and location accuracy, the self-established multi-point coordinate system method and the robust location method are proposed.","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115621879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Mobile App Encrypted Activity Detection 用户移动应用加密活动检测
Pub Date : 2021-04-16 DOI: 10.1145/3478301.3478303
Madushi Hasara Pathmaperuma, Y. Rahulamathavan, Safak Dogan, Ahmet M. Kondoz
Mobile users install different types of applications on their mobile devices based on their interests and needs and perform various activities on them (known as in-app activities). In this paper, we demonstrate that a passive eavesdropper can identify fine grained in-app activities by analysing encrypted network traffic information obtained by sniffing a Wireless Local Area Network (WLAN). Even though encryption protocols are used to provide security over Internet communications, side channel data is still leaked from encrypted traffic. We utilise this data (frame length, inter arrival time and direction) to identify the in-app activities. Further as a first study of its kind, we show that it is possible to identify in-app activities accurately by observing a very small subset of traffic, rather than observing the entire transaction of an activity as presented in existing literature. To reach these observations, we evaluated 51 in-app activities from three popular social networking apps and identified more than 85% of them correctly using the Bayes Net machine learning algorithm.
移动用户根据自己的兴趣和需求在移动设备上安装不同类型的应用程序,并在其上执行各种活动(称为应用内活动)。在本文中,我们证明了被动窃听器可以通过分析嗅探无线局域网(WLAN)获得的加密网络流量信息来识别细粒度的应用程序内活动。尽管加密协议用于提供互联网通信的安全性,但侧信道数据仍然会从加密流量中泄露。我们利用这些数据(帧长度、内部到达时间和方向)来识别应用内活动。此外,作为同类的首次研究,我们表明,可以通过观察非常小的流量子集来准确识别应用内活动,而不是像现有文献中那样观察活动的整个交易。为了得出这些观察结果,我们评估了来自三个流行社交网络应用程序的51个应用内活动,并使用贝叶斯网络机器学习算法正确识别了其中85%以上的活动。
{"title":"User Mobile App Encrypted Activity Detection","authors":"Madushi Hasara Pathmaperuma, Y. Rahulamathavan, Safak Dogan, Ahmet M. Kondoz","doi":"10.1145/3478301.3478303","DOIUrl":"https://doi.org/10.1145/3478301.3478303","url":null,"abstract":"Mobile users install different types of applications on their mobile devices based on their interests and needs and perform various activities on them (known as in-app activities). In this paper, we demonstrate that a passive eavesdropper can identify fine grained in-app activities by analysing encrypted network traffic information obtained by sniffing a Wireless Local Area Network (WLAN). Even though encryption protocols are used to provide security over Internet communications, side channel data is still leaked from encrypted traffic. We utilise this data (frame length, inter arrival time and direction) to identify the in-app activities. Further as a first study of its kind, we show that it is possible to identify in-app activities accurately by observing a very small subset of traffic, rather than observing the entire transaction of an activity as presented in existing literature. To reach these observations, we evaluated 51 in-app activities from three popular social networking apps and identified more than 85% of them correctly using the Bayes Net machine learning algorithm.","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128363614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The 2nd European Symposium on Computer and Communications 第二届欧洲计算机与通信专题讨论会
Pub Date : 2021-04-16 DOI: 10.1145/3478301
{"title":"The 2nd European Symposium on Computer and Communications","authors":"","doi":"10.1145/3478301","DOIUrl":"https://doi.org/10.1145/3478301","url":null,"abstract":"","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123302316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Techniques for Data Mining 数据挖掘技术分析
Pub Date : 2021-04-16 DOI: 10.1145/3478301.3478308
Ke Zhu
Data mining has been a popular branch of computer science in recent years with great impact in different areas. It is a technique to find the inner connection, the unexpected pattern from a large amount of data and to obtain certain broad conclusions from it. Currently, many data mining techniques are developed and used in order to process data from various aspects and to improve the speed and accuracy of data analysis. Considering that data mining techniques combine knowledge from multiple domains, this article will present an overview of temporal techniques for data mining.
数据挖掘是近年来计算机科学的一个热门分支,在各个领域产生了巨大的影响。它是一种从大量数据中发现内在联系和意想不到的模式并从中获得某些广泛结论的技术。目前,为了从各个方面处理数据,提高数据分析的速度和准确性,开发和使用了许多数据挖掘技术。考虑到数据挖掘技术结合了来自多个领域的知识,本文将概述用于数据挖掘的时态技术。
{"title":"Analysis of Techniques for Data Mining","authors":"Ke Zhu","doi":"10.1145/3478301.3478308","DOIUrl":"https://doi.org/10.1145/3478301.3478308","url":null,"abstract":"Data mining has been a popular branch of computer science in recent years with great impact in different areas. It is a technique to find the inner connection, the unexpected pattern from a large amount of data and to obtain certain broad conclusions from it. Currently, many data mining techniques are developed and used in order to process data from various aspects and to improve the speed and accuracy of data analysis. Considering that data mining techniques combine knowledge from multiple domains, this article will present an overview of temporal techniques for data mining.","PeriodicalId":338866,"journal":{"name":"The 2nd European Symposium on Computer and Communications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114752234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
The 2nd European Symposium on Computer and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1