首页 > 最新文献

2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
Anomaly Identification in A Liquid-Coffee Vending Machine Using Electrical Current Waveforms 基于电流波形的液体咖啡自动售货机异常识别
Y. Ishii, Eisuke Saneyoshi, Mitsuru Sendoda, Reishi Kondo
This paper proposes an anomaly identification method for a liquid-coffee vending machine using electrical current waveforms. The method consists of preprocessing of a series of current values collected from the machine, training of multiple classifiers corresponding to individual target anomalous operations, and anomaly detection by means of the classifiers. Preprocessing improves detection accuracy by excluding current values that represent non-target operations. Multiple classifiers corresponding to individual target operations are trained using pre-processed data and the ground truth. An operation with the maximum likelihood normalized by the total number of individual operations is identified as the current anomaly. Evaluations using electrical current values obtained from an actual coffee vending machine shows a false positive rate and a false negative rate of, respectively, 0% and 6.7%, for lack of beans and 2% and 0% for water leakage, both of which are major reasons for degraded coffee quality.
提出了一种基于电流波形的液体咖啡自动售货机异常识别方法。该方法包括对从机器采集的一系列电流值进行预处理,训练对应于单个目标异常操作的多个分类器,并利用分类器进行异常检测。预处理通过排除表示非目标操作的电流值来提高检测精度。使用预处理数据和地面真值训练对应于单个目标操作的多个分类器。由单个操作总数归一化的最大似然操作被标识为当前异常。使用从实际的咖啡自动售货机获得的电流值进行评估显示,缺少咖啡豆的假阳性率和假阴性率分别为0%和6.7%,漏水的假阳性率和假阴性率分别为2%和0%,这两个都是导致咖啡质量下降的主要原因。
{"title":"Anomaly Identification in A Liquid-Coffee Vending Machine Using Electrical Current Waveforms","authors":"Y. Ishii, Eisuke Saneyoshi, Mitsuru Sendoda, Reishi Kondo","doi":"10.1109/INFOCT.2019.8711414","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711414","url":null,"abstract":"This paper proposes an anomaly identification method for a liquid-coffee vending machine using electrical current waveforms. The method consists of preprocessing of a series of current values collected from the machine, training of multiple classifiers corresponding to individual target anomalous operations, and anomaly detection by means of the classifiers. Preprocessing improves detection accuracy by excluding current values that represent non-target operations. Multiple classifiers corresponding to individual target operations are trained using pre-processed data and the ground truth. An operation with the maximum likelihood normalized by the total number of individual operations is identified as the current anomaly. Evaluations using electrical current values obtained from an actual coffee vending machine shows a false positive rate and a false negative rate of, respectively, 0% and 6.7%, for lack of beans and 2% and 0% for water leakage, both of which are major reasons for degraded coffee quality.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124845054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Top Threats to Cyber Systems 网络系统面临的主要威胁
H. Kettani, Polly Wainwright
The technological innovation of cyber systems and increase dependence of individuals, societies and nations on them has brought new, real and everchanging threat landscapes. In fact, the threats evolving faster than they can be assessed. The technological innovation that brought ease and efficiency to our lives, has been met by similar innovation to take advantage of cyber systems for other gains. More threat actors are noted to be sponsored by nation-states and the skills and capabilities of organizations to defend against these attacks are lagging. This warrants an increase in automation of threat analysis and response as well as increased adoption of security measures by at-risk organizations. Thus, to properly prepare defenses and mitigations to the threats introduced by cyber, it is necessary to understand these threats. Accordingly, this paper provides an overview of top cyber security threats in together with current and emerging trends. The analyses include general trends in the complexity of attacks, actors, and the maturity of skills and capabilities of organizations to defend against attacks. Top threats are discussed with regard to instances of attacks and strategies for mitigation within the kill chain. A brief discussion of threat agents and attack vectors adds context to the threats.
网络系统的技术创新,以及个人、社会和国家对网络的依赖日益增加,带来了新的、真实的、不断变化的威胁格局。事实上,威胁的发展速度比我们所能评估的要快。技术创新给我们的生活带来了便利和效率,但随之而来的是利用网络系统获取其他利益的类似创新。人们注意到,越来越多的威胁行为者是由民族国家赞助的,而组织抵御这些攻击的技能和能力却很落后。这保证了威胁分析和响应的自动化程度的提高,以及处于风险中的组织更多地采用安全措施。因此,为了正确地准备防御和缓解网络带来的威胁,有必要了解这些威胁。因此,本文概述了主要的网络安全威胁以及当前和新兴趋势。分析包括攻击复杂性的一般趋势、参与者,以及组织防御攻击的技能和能力的成熟度。根据攻击实例和杀伤链内的缓解战略,讨论了主要威胁。对威胁代理和攻击向量的简要讨论为威胁添加了上下文。
{"title":"On the Top Threats to Cyber Systems","authors":"H. Kettani, Polly Wainwright","doi":"10.1109/INFOCT.2019.8711324","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711324","url":null,"abstract":"The technological innovation of cyber systems and increase dependence of individuals, societies and nations on them has brought new, real and everchanging threat landscapes. In fact, the threats evolving faster than they can be assessed. The technological innovation that brought ease and efficiency to our lives, has been met by similar innovation to take advantage of cyber systems for other gains. More threat actors are noted to be sponsored by nation-states and the skills and capabilities of organizations to defend against these attacks are lagging. This warrants an increase in automation of threat analysis and response as well as increased adoption of security measures by at-risk organizations. Thus, to properly prepare defenses and mitigations to the threats introduced by cyber, it is necessary to understand these threats. Accordingly, this paper provides an overview of top cyber security threats in together with current and emerging trends. The analyses include general trends in the complexity of attacks, actors, and the maturity of skills and capabilities of organizations to defend against attacks. Top threats are discussed with regard to instances of attacks and strategies for mitigation within the kill chain. A brief discussion of threat agents and attack vectors adds context to the threats.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125280801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Two Adaptive Schemes for Image Sharpening 图像锐化的两种自适应方案
Jian-ao Lian
Two locally adaptive schemes for image sharpening are established. With appropriate selections of parameters, the schemes also smoothen the image in the area with flat-valued pixels, which leads to more pleasant-looking images. Demonstration by using standard images shows that the schemes are effective and comparable to some commonly used image-sharpening techniques in the literature.
提出了两种局部自适应图像锐化方案。通过适当的参数选择,该方案还可以使平面像素区域的图像平滑,从而产生更美观的图像。通过标准图像的验证表明,该方案是有效的,并可与文献中常用的图像锐化技术相媲美。
{"title":"Two Adaptive Schemes for Image Sharpening","authors":"Jian-ao Lian","doi":"10.1109/INFOCT.2019.8711269","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711269","url":null,"abstract":"Two locally adaptive schemes for image sharpening are established. With appropriate selections of parameters, the schemes also smoothen the image in the area with flat-valued pixels, which leads to more pleasant-looking images. Demonstration by using standard images shows that the schemes are effective and comparable to some commonly used image-sharpening techniques in the literature.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Personal Identity Verification Based on Convolutional Neural Network 基于卷积神经网络的个人身份验证研究
Jia Wu, Chao Liu, Qiyu Long, Weiyan Hou
In this paper, we propose a Personal Identity Verification (PIV) method based on 2-D convolutional neural network (CNN) by using electrocardiosignal (ECG singles). CNN shows outstanding performance in the field of image recognition nowadays, in order to make better use of this advantage, we innovatively convert electrocardiosignal into 2-D grayscale instead of traditional ECG. While ensuring that the image contains a complete cardiac cycle, it also enables the network to fully learn both the characteristics of the electrocardiosignal period and characteristics between each electrocardiosignal period. Optimization of the proposed CNN classifier includes various deep learning techniques such as batch normalization, data augmentation, Xavier initialization, and dropout. As a result, our classifier achieved 99.90% average accuracy. To precisely validate our CNN classifier, 10-fold cross-validation was performed at the evaluation which involves every ECG recording as a test data. Our experimental results have successfully validated that the proposed CNN classifier with the transformed ECG images can achieve excellent identification accuracy.
本文提出了一种基于二维卷积神经网络(CNN)的心电信号身份验证方法。CNN在当今的图像识别领域表现出色,为了更好地利用这一优势,我们创新性地将传统的心电信号转换为二维灰度。在保证图像包含完整心电周期的同时,也使网络能够充分学习心电信号周期的特征以及各心电信号周期之间的特征。所提出的CNN分类器的优化包括各种深度学习技术,如批处理归一化、数据增强、Xavier初始化和dropout。结果,我们的分类器达到了99.90%的平均准确率。为了精确地验证我们的CNN分类器,在评估时进行了10次交叉验证,其中包括每个ECG记录作为测试数据。我们的实验结果成功地验证了本文所提出的基于变换后心电图像的CNN分类器能够达到良好的识别精度。
{"title":"Research on Personal Identity Verification Based on Convolutional Neural Network","authors":"Jia Wu, Chao Liu, Qiyu Long, Weiyan Hou","doi":"10.1109/INFOCT.2019.8711104","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711104","url":null,"abstract":"In this paper, we propose a Personal Identity Verification (PIV) method based on 2-D convolutional neural network (CNN) by using electrocardiosignal (ECG singles). CNN shows outstanding performance in the field of image recognition nowadays, in order to make better use of this advantage, we innovatively convert electrocardiosignal into 2-D grayscale instead of traditional ECG. While ensuring that the image contains a complete cardiac cycle, it also enables the network to fully learn both the characteristics of the electrocardiosignal period and characteristics between each electrocardiosignal period. Optimization of the proposed CNN classifier includes various deep learning techniques such as batch normalization, data augmentation, Xavier initialization, and dropout. As a result, our classifier achieved 99.90% average accuracy. To precisely validate our CNN classifier, 10-fold cross-validation was performed at the evaluation which involves every ECG recording as a test data. Our experimental results have successfully validated that the proposed CNN classifier with the transformed ECG images can achieve excellent identification accuracy.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"os-39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127779478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Media Messages During Disasters in Japan : An Empirical Study of 2018 Osaka North Earthquake in Japan 日本灾害期间的社交媒体信息:2018年日本大阪北地震的实证研究
Kemachart Kemavuthanon, O. Uchida
Twitter is the most popular social media platform in Japan for social interactions and real-time information exchanges during disasters; however, almost all information is in Japanese. This paper describes the data collection and analysis process associated with the planned construction of a real-time disaster-related information providing system for foreign tourists. To this end, characteristics of the tweets during the 2018 Osaka North Earthquake were analyzed. Despite there being thousands of tweets during the earthquake, information was hardly transmitted to foreign tourists. In this study, a data set of more than 9,000,000 tweets was used to analyze the information being shared and identify the most frequently used terms.
Twitter是日本最受欢迎的社交媒体平台,用于灾难期间的社交互动和实时信息交流;然而,几乎所有的信息都是日语。本文描述了计划建设的外国游客实时灾害信息提供系统的数据收集和分析过程。为此,分析了2018年大阪北地震期间的推文特征。尽管地震期间有数千条推特,但信息几乎没有传递给外国游客。在本研究中,使用超过9,000,000条tweet的数据集来分析正在共享的信息,并确定最常用的术语。
{"title":"Social Media Messages During Disasters in Japan : An Empirical Study of 2018 Osaka North Earthquake in Japan","authors":"Kemachart Kemavuthanon, O. Uchida","doi":"10.1109/INFOCT.2019.8711036","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711036","url":null,"abstract":"Twitter is the most popular social media platform in Japan for social interactions and real-time information exchanges during disasters; however, almost all information is in Japanese. This paper describes the data collection and analysis process associated with the planned construction of a real-time disaster-related information providing system for foreign tourists. To this end, characteristics of the tweets during the 2018 Osaka North Earthquake were analyzed. Despite there being thousands of tweets during the earthquake, information was hardly transmitted to foreign tourists. In this study, a data set of more than 9,000,000 tweets was used to analyze the information being shared and identify the most frequently used terms.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Random Forest Approach for Predicting the Microwave Drying Process of Amaranth Seeds 用随机森林方法预测苋菜种子微波干燥过程
S. Bravo, Ángel H. Moreno
In this work, a model has been developed for the prediction of the fundamental variables of the microwave drying process of amaranth seeds, using the initial mass of seeds and the temperature of the process as input data. The model was developed by using the RandomForestRegressor classifier, which is found in the module sklearn.ensemble of the Python programming language. For the training and prediction of the model, the data of the measurements made of the drying time and energy consumption in the drying experiments carried out at three temperatures (35, 45, 55 ° C) in a domestic microwave oven were used, as well as the germination rate of the amaranth seeds obtained in the germination tests. The predictions made by the model have a precision of 99.6% for the drying time, 98.5% for energy consumption and 92.2% for the germination rate of the seeds.
本文以微波干燥过程中的种子初始质量和温度为输入数据,建立了一种预测苋菜种子微波干燥过程基本变量的模型。该模型是使用在模块sklearn中找到的RandomForestRegressor分类器开发的。Python编程语言的集成。为了对模型进行训练和预测,使用了在家用微波炉中进行的3种温度(35℃、45℃、55℃)下的干燥时间和能量消耗的测量数据,以及在萌发试验中获得的苋菜种子的发芽率。该模型对干燥时间的预测精度为99.6%,能量消耗的预测精度为98.5%,种子发芽率的预测精度为92.2%。
{"title":"A Random Forest Approach for Predicting the Microwave Drying Process of Amaranth Seeds","authors":"S. Bravo, Ángel H. Moreno","doi":"10.1109/INFOCT.2019.8711122","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711122","url":null,"abstract":"In this work, a model has been developed for the prediction of the fundamental variables of the microwave drying process of amaranth seeds, using the initial mass of seeds and the temperature of the process as input data. The model was developed by using the RandomForestRegressor classifier, which is found in the module sklearn.ensemble of the Python programming language. For the training and prediction of the model, the data of the measurements made of the drying time and energy consumption in the drying experiments carried out at three temperatures (35, 45, 55 ° C) in a domestic microwave oven were used, as well as the germination rate of the amaranth seeds obtained in the germination tests. The predictions made by the model have a precision of 99.6% for the drying time, 98.5% for energy consumption and 92.2% for the germination rate of the seeds.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132003949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey of Formal Specification Application to Safety Critical Systems 形式规范在安全关键系统中的应用综述
S. P. Nanda, Emanuel S. Grant
Safety critical systems are systems where a failure to find a fault can cause serious harm to the environment and people or even can lead to loss of life. The most important requirement of the system is to keep it fault free. This will be possible if the system is subject to development and verification in a systematic approach. Formal specification methods, as the name suggests, are truly formal with a strong mathematical background that can be trusted to facilitate the development of fault-free systems. The paper will discuss examples of safety-critical systems and some common type of errors that are found in the development of such systems will be discussed. The paper will examine how different domains affect the standards of formal specification methods in different applications. The approach will be to survey various papers in the related fields.
安全关键系统是指不能发现故障会对环境和人员造成严重危害,甚至可能导致生命损失的系统。对系统最重要的要求是保持无故障。如果以系统的方法开发和核查该系统,这将是可能的。形式化规范方法,顾名思义,是真正形式化的,具有强大的数学背景,可以信任以促进无故障系统的开发。本文将讨论安全关键系统的例子,并讨论在此类系统的开发中发现的一些常见类型的错误。本文将探讨在不同的应用中,不同的领域如何影响形式化规范方法的标准。方法将是调查相关领域的各种论文。
{"title":"A Survey of Formal Specification Application to Safety Critical Systems","authors":"S. P. Nanda, Emanuel S. Grant","doi":"10.1109/INFOCT.2019.8711369","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711369","url":null,"abstract":"Safety critical systems are systems where a failure to find a fault can cause serious harm to the environment and people or even can lead to loss of life. The most important requirement of the system is to keep it fault free. This will be possible if the system is subject to development and verification in a systematic approach. Formal specification methods, as the name suggests, are truly formal with a strong mathematical background that can be trusted to facilitate the development of fault-free systems. The paper will discuss examples of safety-critical systems and some common type of errors that are found in the development of such systems will be discussed. The paper will examine how different domains affect the standards of formal specification methods in different applications. The approach will be to survey various papers in the related fields.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134234453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
TFDroid: Android Malware Detection by Topics and Sensitive Data Flows Using Machine Learning Techniques TFDroid: Android恶意软件检测的主题和敏感数据流使用机器学习技术
Songhao Lou, Shaoyin Cheng, J. Huang, Fan Jiang
With explosive growth of Android malware and due to the severity of its damages to smart phone users, efficient Android malware detection methods are urgently needed. As is known to us, different categories of applications divided by their functions use sensitive data in distinct ways. Besides, in each category, malicious applications treat sensitive data differently from benign applications. We thus propose TFDroid, a novel machine learning-based approach to detect malware using the related topics and data flows of Android applications. We test TFDroid on thousands of benign and malicious applications. The results show that TFDroid can correctly identify 93.7% of all malware.
随着Android恶意软件的爆炸性增长,以及其对智能手机用户造成的严重危害,迫切需要高效的Android恶意软件检测方法。众所周知,按功能划分的不同类别的应用程序以不同的方式使用敏感数据。此外,在每个类别中,恶意应用程序对敏感数据的处理方式与良性应用程序不同。因此,我们提出了TFDroid,这是一种基于机器学习的新方法,可以使用Android应用程序的相关主题和数据流来检测恶意软件。我们在数千种良性和恶意应用程序上测试了TFDroid。结果表明,TFDroid能够正确识别93.7%的恶意软件。
{"title":"TFDroid: Android Malware Detection by Topics and Sensitive Data Flows Using Machine Learning Techniques","authors":"Songhao Lou, Shaoyin Cheng, J. Huang, Fan Jiang","doi":"10.1109/INFOCT.2019.8711179","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711179","url":null,"abstract":"With explosive growth of Android malware and due to the severity of its damages to smart phone users, efficient Android malware detection methods are urgently needed. As is known to us, different categories of applications divided by their functions use sensitive data in distinct ways. Besides, in each category, malicious applications treat sensitive data differently from benign applications. We thus propose TFDroid, a novel machine learning-based approach to detect malware using the related topics and data flows of Android applications. We test TFDroid on thousands of benign and malicious applications. The results show that TFDroid can correctly identify 93.7% of all malware.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117230037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Creation of Adversarial Examples with Keeping High Visual Performance 创造具有高视觉表现的对抗性示例
Tomoka Azakami, Chihiro Shibata, R. Uda, T. Kinoshita
The accuracy of the image classification by the convolutional neural network is exceeding the ability of human being and contributes to various fields. However, the improvement of the image recognition technology gives a great blow to security system with an image such as CAPTCHA. In particular, since the character string CAPTCHA has already added distortion and noise in order not to be read by the computer, it becomes a problem that the human readability is lowered. Adversarial examples is a technique to produce an image letting an image classification by the machine learning be wrong intentionally. The best feature of this technique is that when human beings compare the original image with the adversarial examples, they cannot understand the difference on appearance. However, Adversarial examples that is created with conventional FGSM cannot completely misclassify strong nonlinear networks like CNN. Osadchy et al. have researched to apply this adversarial examples to CAPTCHA and attempted to let CNN misclassify them. However, they could not let CNN misclassify character images. In this research, we propose a method to apply FGSM to the character string CAPTCHAs and to let CNN misclassified them.
卷积神经网络在图像分类方面的精度已经超过了人类的能力,在很多领域都有应用。然而,图像识别技术的进步给像CAPTCHA这样的图像安防系统带来了巨大的冲击。特别是,由于字符串CAPTCHA已经添加了失真和噪声,以便不被计算机读取,这就成为降低人类可读性的问题。对抗性示例是一种产生图像的技术,它让机器学习的图像分类故意出错。该技术的最大特点是,当人类将原始图像与对抗样本进行比较时,他们无法理解外观上的差异。然而,使用传统FGSM创建的对抗性示例不能完全错误地分类像CNN这样的强非线性网络。Osadchy等人研究了将这种对抗性示例应用于CAPTCHA,并试图让CNN对它们进行错误分类。然而,他们不能让CNN对人物图像进行错误分类。在本研究中,我们提出了一种将FGSM应用于字符串验证码并让CNN误分类的方法。
{"title":"Creation of Adversarial Examples with Keeping High Visual Performance","authors":"Tomoka Azakami, Chihiro Shibata, R. Uda, T. Kinoshita","doi":"10.1109/INFOCT.2019.8710918","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710918","url":null,"abstract":"The accuracy of the image classification by the convolutional neural network is exceeding the ability of human being and contributes to various fields. However, the improvement of the image recognition technology gives a great blow to security system with an image such as CAPTCHA. In particular, since the character string CAPTCHA has already added distortion and noise in order not to be read by the computer, it becomes a problem that the human readability is lowered. Adversarial examples is a technique to produce an image letting an image classification by the machine learning be wrong intentionally. The best feature of this technique is that when human beings compare the original image with the adversarial examples, they cannot understand the difference on appearance. However, Adversarial examples that is created with conventional FGSM cannot completely misclassify strong nonlinear networks like CNN. Osadchy et al. have researched to apply this adversarial examples to CAPTCHA and attempted to let CNN misclassify them. However, they could not let CNN misclassify character images. In this research, we propose a method to apply FGSM to the character string CAPTCHAs and to let CNN misclassified them.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132431152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ITIKI Plus: A Mobile Based Application for Integrating Indigenous Knowledge and Scientific Agro-Climate Decision Support for Africa’s Small-Scale Farmers ITIKI Plus:为非洲小农整合本土知识和科学农业气候决策支持的移动应用程序
M. Masinde, Portia Naledi Thothela
Information and communication technologies (ICTs), especially mobile phone technology, have great potential in improving livelihoods and alleviating poverty among Africa’s small-scale farmers. In particular, an effective decision support system that can aid farmers’ tactical and routine level decisions has been proven to lead to increased agricultural production. In this paper, we present such a tool – ITIKI Plus intelligently integrates indigenous and scientific data and information to provide contextualised micro-level drought forecast and cropping decision information to small-scale farmers in Kenya, Mozambique and South Africa. By providing the farmers, especially women, with both tactical-level and day-to-day decision support, the farmers have been able to make decisions that are up to 98% accurate. They have also been able to increase their food production by up to 10%.
信息和通信技术(ict),特别是移动电话技术,在改善非洲小农生计和减轻贫困方面具有巨大潜力。特别是,一个有效的决策支持系统,可以帮助农民的战术和日常决策,已被证明可以增加农业生产。在本文中,我们提出了这样一个工具——ITIKI Plus,它智能地整合了当地和科学的数据和信息,为肯尼亚、莫桑比克和南非的小农提供情境化的微观干旱预测和种植决策信息。通过向农民,特别是妇女,提供战术层面和日常决策支持,农民能够做出准确率高达98%的决策。他们还能够将粮食产量提高10%。
{"title":"ITIKI Plus: A Mobile Based Application for Integrating Indigenous Knowledge and Scientific Agro-Climate Decision Support for Africa’s Small-Scale Farmers","authors":"M. Masinde, Portia Naledi Thothela","doi":"10.1109/INFOCT.2019.8711059","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711059","url":null,"abstract":"Information and communication technologies (ICTs), especially mobile phone technology, have great potential in improving livelihoods and alleviating poverty among Africa’s small-scale farmers. In particular, an effective decision support system that can aid farmers’ tactical and routine level decisions has been proven to lead to increased agricultural production. In this paper, we present such a tool – ITIKI Plus intelligently integrates indigenous and scientific data and information to provide contextualised micro-level drought forecast and cropping decision information to small-scale farmers in Kenya, Mozambique and South Africa. By providing the farmers, especially women, with both tactical-level and day-to-day decision support, the farmers have been able to make decisions that are up to 98% accurate. They have also been able to increase their food production by up to 10%.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116572506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1