首页 > 最新文献

2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Toward Compact Data from Big Data 从大数据走向紧凑数据
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351315
S. Kim
Bigdata is a dataset of which size is beyond the ability of handling a valuable raw material that can be refined and distilled into valuable specific insights. Compact data is a method that optimizes the big dataset that gives best assets without handling complex bigdata. The compact dataset contains the maximum knowledge patterns at fine grained level for effective and personalized utilization of bigdata systems without big data. The compact data method is a tailor-made design which depends on problem situations. Various compact data techniques have been demonstrated into various data-driven research area in the paper.
大数据是一个数据集,其规模超出了处理有价值的原材料的能力,而这些原材料可以被提炼和提炼成有价值的具体见解。Compact data是一种在不处理复杂大数据的情况下优化大数据集,提供最佳资产的方法。紧凑的数据集包含了细粒度级别的最大知识模式,以便在没有大数据的情况下有效和个性化地利用大数据系统。紧凑数据法是一种根据问题情况量身定制的设计。本文将各种紧凑数据技术应用于各种数据驱动的研究领域。
{"title":"Toward Compact Data from Big Data","authors":"S. Kim","doi":"10.23919/ICITST51030.2020.9351315","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351315","url":null,"abstract":"Bigdata is a dataset of which size is beyond the ability of handling a valuable raw material that can be refined and distilled into valuable specific insights. Compact data is a method that optimizes the big dataset that gives best assets without handling complex bigdata. The compact dataset contains the maximum knowledge patterns at fine grained level for effective and personalized utilization of bigdata systems without big data. The compact data method is a tailor-made design which depends on problem situations. Various compact data techniques have been demonstrated into various data-driven research area in the paper.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122170164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session 4: Internet Application and Technology 第四部分:互联网应用与技术
Pub Date : 2020-12-08 DOI: 10.23919/icitst51030.2020.9351323
{"title":"Session 4: Internet Application and Technology","authors":"","doi":"10.23919/icitst51030.2020.9351323","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351323","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121809512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session 8: Digital Forensics and Cyber Security 第八部分:数字取证和网络安全
Pub Date : 2020-12-08 DOI: 10.23919/icitst51030.2020.9351344
{"title":"Session 8: Digital Forensics and Cyber Security","authors":"","doi":"10.23919/icitst51030.2020.9351344","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351344","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards robust classification detection for adversarial examples 面向对抗样本的鲁棒分类检测
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351309
Huangxiaolie Liu, Dong Zhang, Hui-Bing Chen
In the field of computer vision, machine learning (ML) models have been widely used in various tasks to achieve better performance. ML models, however, do a poor job of identifying malicious inputs such as adversarial examples. Abuse adversarial examples can cause security threats in ML-based products or applications. According to the definition of adversarial examples, the feature distribution of adversarial examples and normal examples are different. Besides, classification results of adversarial examples are sensitive to additive perturbance while normal examples are robust. This provides a theoretical basis for detecting adversarial examples from its own distribution. In this paper, we summarized some adversarial attack methods and defense methods, and a detection method based on the robustness of the classification result is proposed. This detection method has relatively good performance on gradient-based adversarial attack methods and does not rely on the structure or other information of ML model, so the structure of ML models need not be modified, which has a certain significance in practical engineering.
在计算机视觉领域,机器学习(ML)模型已被广泛应用于各种任务中,以获得更好的性能。然而,ML模型在识别恶意输入(如对抗性示例)方面做得很差。滥用对抗性示例可能会在基于ml的产品或应用程序中造成安全威胁。根据对抗性样例的定义,对抗性样例与正常样例的特征分布是不同的。此外,对抗样例的分类结果对加性扰动敏感,而正常样例的分类结果具有鲁棒性。这为从自身分布中检测对抗样本提供了理论基础。本文总结了一些对抗性攻击方法和防御方法,提出了一种基于分类结果鲁棒性的检测方法。该检测方法在基于梯度的对抗性攻击方法中具有相对较好的性能,并且不依赖于ML模型的结构或其他信息,因此不需要修改ML模型的结构,在实际工程中具有一定的意义。
{"title":"Towards robust classification detection for adversarial examples","authors":"Huangxiaolie Liu, Dong Zhang, Hui-Bing Chen","doi":"10.23919/ICITST51030.2020.9351309","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351309","url":null,"abstract":"In the field of computer vision, machine learning (ML) models have been widely used in various tasks to achieve better performance. ML models, however, do a poor job of identifying malicious inputs such as adversarial examples. Abuse adversarial examples can cause security threats in ML-based products or applications. According to the definition of adversarial examples, the feature distribution of adversarial examples and normal examples are different. Besides, classification results of adversarial examples are sensitive to additive perturbance while normal examples are robust. This provides a theoretical basis for detecting adversarial examples from its own distribution. In this paper, we summarized some adversarial attack methods and defense methods, and a detection method based on the robustness of the classification result is proposed. This detection method has relatively good performance on gradient-based adversarial attack methods and does not rely on the structure or other information of ML model, so the structure of ML models need not be modified, which has a certain significance in practical engineering.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Security Evaluation Using Deep Neural Network 基于深度神经网络的网络安全评估
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351326
Loreen Mahmoud, R. Praveen
One of the most significant systems in computer network security assurance is the assessment of computer network security. With the goal of finding an effective method for performing the process of security evaluation in a computer network, this paper uses a deep neural network to be responsible for the task of security evaluating. The DNN will be built with python on Spyder IDE, it will be trained and tested by 17 network security indicators then the output that we get represents one of the security levels that have been already defined. The maj or purpose is to enhance the ability to determine the security level of a computer network accurately based on its selected security indicators. The method that we intend to use in this paper in order to evaluate network security is simple, reduces the human factors interferences, and can obtain the correct results of the evaluation rapidly. We will analyze the results to decide if this method will enhance the process of evaluating the security of the network in terms of accuracy.
计算机网络安全评估是计算机网络安全保障中最重要的系统之一。为了寻找在计算机网络中进行安全评估过程的有效方法,本文使用深度神经网络来负责安全评估任务。DNN将在Spyder IDE上用python构建,它将通过17个网络安全指标进行训练和测试,然后我们得到的输出代表了已经定义的安全级别之一。其主要目的是增强根据所选安全指标准确判断计算机网络安全等级的能力。本文拟采用的网络安全评估方法简单,减少了人为因素的干扰,能够快速得到正确的评估结果。我们将对结果进行分析,以确定该方法是否会在准确性方面提高评估网络安全性的过程。
{"title":"Network Security Evaluation Using Deep Neural Network","authors":"Loreen Mahmoud, R. Praveen","doi":"10.23919/ICITST51030.2020.9351326","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351326","url":null,"abstract":"One of the most significant systems in computer network security assurance is the assessment of computer network security. With the goal of finding an effective method for performing the process of security evaluation in a computer network, this paper uses a deep neural network to be responsible for the task of security evaluating. The DNN will be built with python on Spyder IDE, it will be trained and tested by 17 network security indicators then the output that we get represents one of the security levels that have been already defined. The maj or purpose is to enhance the ability to determine the security level of a computer network accurately based on its selected security indicators. The method that we intend to use in this paper in order to evaluate network security is simple, reduces the human factors interferences, and can obtain the correct results of the evaluation rapidly. We will analyze the results to decide if this method will enhance the process of evaluating the security of the network in terms of accuracy.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124592489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Partitioned Private User Storages in End-to-End Encrypted Online Social Networks 端到端加密在线社交网络中的分区私有用户存储
Pub Date : 2020-10-08 DOI: 10.23919/ICITST51030.2020.9351335
Fabian Schillinger, C. Schindelhauer
In secure Online Social Networks (OSN), often end-to-end encryption is used to ensure the privacy of the communication. To manage, store, or transfer cryptographic keys from one device to another, encrypted private storages can be used. To gain access to such storages, login credentials, only known to the user, are needed. Losing these credentials results in a permanent loss of cryptographic keys and messages because the storage is encrypted. We present a scheme to split encrypted user storages into multiple storages. Each one can be reconstructed with the help of other participants of the OSN. The more of the storages can be reconstructed, the higher the chance of successfully reconstructing the complete private storage is. Therefore, regaining possession of the cryptographic keys used for communication is increased. We achieve high rates of successful reconstructions, even if a large fraction of the distributed shares is not accessible anymore because the shareholders are inactive or malicious.
在安全的在线社交网络(Online Social Networks, OSN)中,通常使用端到端加密来确保通信的私密性。要管理、存储或将加密密钥从一个设备传输到另一个设备,可以使用加密的私有存储。要访问这些存储,需要只有用户知道的登录凭据。丢失这些凭证将导致加密密钥和消息的永久丢失,因为存储是加密的。提出了一种将加密用户存储拆分为多个存储的方案。每个节点都可以在OSN的其他参与者的帮助下进行重构。可以重构的存储越多,成功重构完整私有存储的机会就越高。因此,重新获得用于通信的加密密钥的所有权增加了。我们实现了很高的成功重建率,即使由于股东不活跃或恶意,很大一部分分布的股票不再可访问。
{"title":"Partitioned Private User Storages in End-to-End Encrypted Online Social Networks","authors":"Fabian Schillinger, C. Schindelhauer","doi":"10.23919/ICITST51030.2020.9351335","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351335","url":null,"abstract":"In secure Online Social Networks (OSN), often end-to-end encryption is used to ensure the privacy of the communication. To manage, store, or transfer cryptographic keys from one device to another, encrypted private storages can be used. To gain access to such storages, login credentials, only known to the user, are needed. Losing these credentials results in a permanent loss of cryptographic keys and messages because the storage is encrypted. We present a scheme to split encrypted user storages into multiple storages. Each one can be reconstructed with the help of other participants of the OSN. The more of the storages can be reconstructed, the higher the chance of successfully reconstructing the complete private storage is. Therefore, regaining possession of the cryptographic keys used for communication is increased. We achieve high rates of successful reconstructions, even if a large fraction of the distributed shares is not accessible anymore because the shareholders are inactive or malicious.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129710383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1