Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725645
Phai Vu Dinh, Thanh Nguyen Nguyen, Quang Uy Nguyen
In data mining, anomaly detection aims to identify the data samples that do not conform to an expected behavior. Anomaly detection has successfully been applied to many real world applications such as fraud detection for credit cards and intrusion detection in security. However, there are very little research on using anomaly detection techniques to detect cheating in online games. In this paper, we present an empirical study of anomaly detection in online games. Four unsupervised anomaly detection techniques were used to detect abnormal players. A method for evaluating the performance these detection techniques was introduced and analysed. The experiments were conducted on one artificial dataset and two real online games at VNG company. The results show the good capability of detection techniques used in this paper in detecting abnormal players in online games.
{"title":"An empirical study of anomaly detection in online games","authors":"Phai Vu Dinh, Thanh Nguyen Nguyen, Quang Uy Nguyen","doi":"10.1109/NICS.2016.7725645","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725645","url":null,"abstract":"In data mining, anomaly detection aims to identify the data samples that do not conform to an expected behavior. Anomaly detection has successfully been applied to many real world applications such as fraud detection for credit cards and intrusion detection in security. However, there are very little research on using anomaly detection techniques to detect cheating in online games. In this paper, we present an empirical study of anomaly detection in online games. Four unsupervised anomaly detection techniques were used to detect abnormal players. A method for evaluating the performance these detection techniques was introduced and analysed. The experiments were conducted on one artificial dataset and two real online games at VNG company. The results show the good capability of detection techniques used in this paper in detecting abnormal players in online games.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725669
A. D. Quang, Trương Hà Hải
In this paper we consider a boundary value problem for a fourth order nonlinear elliptic equation, which models a bending plate on nonlinear elastic foundation. Differently from other authors, here we propose a novel approach to investigation of solvability and numerical solution of the problem. Namely, we reduce it to an operator equation for the right hand side function and under some easily verified conditions we have established the existence and uniqueness of a solution. We have also constructed an iterative method for the solution of the problem. The theoretical results are illustrated on several examples, where the advantages in convergence rate of the method over other methods are shown.
{"title":"Computational method for a fourth order nonlinear elliptic boundary value problem","authors":"A. D. Quang, Trương Hà Hải","doi":"10.1109/NICS.2016.7725669","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725669","url":null,"abstract":"In this paper we consider a boundary value problem for a fourth order nonlinear elliptic equation, which models a bending plate on nonlinear elastic foundation. Differently from other authors, here we propose a novel approach to investigation of solvability and numerical solution of the problem. Namely, we reduce it to an operator equation for the right hand side function and under some easily verified conditions we have established the existence and uniqueness of a solution. We have also constructed an iterative method for the solution of the problem. The theoretical results are illustrated on several examples, where the advantages in convergence rate of the method over other methods are shown.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130452622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725672
Duc Minh Vo, T. Le
Motivated by the newly recent trend in pattern recognition - convolutional neural network (CNN), we introduce a new fusion method based on CNN and support vector machines (SVM) for facial expression recognition problem. Our study puts the deep generic features from CNN and SVM together which is more efficient than CNN only. We investigate our proposed method on Cohn-Kanade dataset and achieve 96.04% in accuracy rate which is better than other state-of-the-art methods.
{"title":"Deep generic features and SVM for facial expression recognition","authors":"Duc Minh Vo, T. Le","doi":"10.1109/NICS.2016.7725672","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725672","url":null,"abstract":"Motivated by the newly recent trend in pattern recognition - convolutional neural network (CNN), we introduce a new fusion method based on CNN and support vector machines (SVM) for facial expression recognition problem. Our study puts the deep generic features from CNN and SVM together which is more efficient than CNN only. We investigate our proposed method on Cohn-Kanade dataset and achieve 96.04% in accuracy rate which is better than other state-of-the-art methods.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725632
Tien-Vu Truong, Nhan-Van Vo, Dac-Binh Ha, Duc-Dung Tran
Nowadays, physical layer secrecy has become the new approach to enhance information security of wireless networks and have attracted the attention of lot of researchers in the world. This paper investigates the physical layer secrecy performance of radio frequency energy harvesting (RF-EH) networks over Rayleigh fading channels. The considered RF-EH system consists of multiple power transfer stations, one source and multiple destinations in the presence of multiple passive eavesdroppers. The best power transfer station and the best received signal at destination is selected among multiple power transfer stations and among multiple destinations respectively. By using statistical characteristics of the signal-to-noise ratio (SNR), the exact closed-form expressions of existence probability of secrecy capacity and secrecy outage probability are derived. Finally, simulation results confirm an agreement between our analysis and equivalent Monte-Carlo simulations.
{"title":"Secrecy performance analysis of energy harvesting wireless networks with multiple power transfer stations and destinations in the presence of multiple eavesdroppers","authors":"Tien-Vu Truong, Nhan-Van Vo, Dac-Binh Ha, Duc-Dung Tran","doi":"10.1109/NICS.2016.7725632","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725632","url":null,"abstract":"Nowadays, physical layer secrecy has become the new approach to enhance information security of wireless networks and have attracted the attention of lot of researchers in the world. This paper investigates the physical layer secrecy performance of radio frequency energy harvesting (RF-EH) networks over Rayleigh fading channels. The considered RF-EH system consists of multiple power transfer stations, one source and multiple destinations in the presence of multiple passive eavesdroppers. The best power transfer station and the best received signal at destination is selected among multiple power transfer stations and among multiple destinations respectively. By using statistical characteristics of the signal-to-noise ratio (SNR), the exact closed-form expressions of existence probability of secrecy capacity and secrecy outage probability are derived. Finally, simulation results confirm an agreement between our analysis and equivalent Monte-Carlo simulations.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131100698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725671
X. Nguyen, Dai Tho Nguyen, Long H. Vu
In this paper, we propose a novel Payload-based One-class Classifier for Anomaly Detection called POCAD, which combines a generalized 2v-gram feature extractor and a one-class SVM classifier to effectively detect network intrusion attacks. We extensively evaluate POCAD with real-world datasets of HTTP-based attacks. Our experiment results show that POCAD can quickly detect malicious payload and achieves a high detection rate as well as a low false positive rate. The experiment results also show that POCAD outperforms state of the art payload-based detection schemes such as McPAD [4] and PAYL [8].
{"title":"POCAD: A novel pay load-based one-class classifier for anomaly detection","authors":"X. Nguyen, Dai Tho Nguyen, Long H. Vu","doi":"10.1109/NICS.2016.7725671","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725671","url":null,"abstract":"In this paper, we propose a novel Payload-based One-class Classifier for Anomaly Detection called POCAD, which combines a generalized 2v-gram feature extractor and a one-class SVM classifier to effectively detect network intrusion attacks. We extensively evaluate POCAD with real-world datasets of HTTP-based attacks. Our experiment results show that POCAD can quickly detect malicious payload and achieves a high detection rate as well as a low false positive rate. The experiment results also show that POCAD outperforms state of the art payload-based detection schemes such as McPAD [4] and PAYL [8].","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"20 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132721136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/NICS.2016.7725665
Dinh Thanh Le, Thi Nhu Thuong Huynh, T. Nguyen
In this paper, we design two wideband compact MIMO antennas, and utilize them for experiments on indoor channel characteristic measurements. One of the antennas is a three-port orthogonally polarized, and the other is a six-port formed into a cube. The antennas operate at center frequency of 2.6 GHz and support a bandwidth of over 400 MHz. Isolation between the ports of the antennas are kept under -18 dB. Using these antennas, we measure the channel characteristics of the indoor environment, and analyze the performance of the antennas. As a result, high data rate capacity can be achieved with the proposed compact antennas, making them applicable in MIMO wireless communications.
{"title":"Measurements on indoor channel characteristics using wideband MIMO antennas","authors":"Dinh Thanh Le, Thi Nhu Thuong Huynh, T. Nguyen","doi":"10.1109/NICS.2016.7725665","DOIUrl":"https://doi.org/10.1109/NICS.2016.7725665","url":null,"abstract":"In this paper, we design two wideband compact MIMO antennas, and utilize them for experiments on indoor channel characteristic measurements. One of the antennas is a three-port orthogonally polarized, and the other is a six-port formed into a cube. The antennas operate at center frequency of 2.6 GHz and support a bandwidth of over 400 MHz. Isolation between the ports of the antennas are kept under -18 dB. Using these antennas, we measure the channel characteristics of the indoor environment, and analyze the performance of the antennas. As a result, high data rate capacity can be achieved with the proposed compact antennas, making them applicable in MIMO wireless communications.","PeriodicalId":347057,"journal":{"name":"2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117183304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}