首页 > 最新文献

2017 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
X-band ubiquitous radar system: First experimental results x波段泛在雷达系统:首次实验结果
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167851
Alvaro Duque de Quevedo, Fernando Ibanez Urzaiz, J. Gismero-Menoyo, A. Asensio-López
This paper presents the first experimental results of an ubiquitous frequency modulated continuous wave (FMCW) radar system demonstrator, working in the 8.75 GHz (X band). This system, which main application is in the area of surface surveillance radars, has been developed within the framework of the project numbered as TEC2014-53815-R (RAD-DAR), and is currently under its field-testing phase. This article presents the demonstrator and describes its main blocks. Subsequently, it focuses on signal acquisition and digitization, to later explain the offline coherent signal processing carried out with the captured data. After this, the document introduces the chosen scenario for the first field tests, and shows the first results of the offline processing, illustrated with Range-Doppler matrices and detection figures. Finally, the paper introduces future work lines, including the development of a radar data processor taking advantage of the achieved strong range-speed association.
本文介绍了工作在8.75 GHz (X波段)的泛在调频连续波(FMCW)雷达系统演示器的首次实验结果。该系统主要应用于地面监视雷达领域,已在编号为TEC2014-53815-R (RAD-DAR)的项目框架内开发,目前处于现场测试阶段。本文介绍了该演示器并描述了其主要模块。随后,重点介绍了信号采集和数字化,随后解释了使用捕获数据进行的离线相干信号处理。在此之后,该文档介绍了第一次现场测试所选择的场景,并显示了离线处理的第一次结果,并用距离-多普勒矩阵和检测图进行说明。最后,本文介绍了未来的工作方向,包括利用已实现的强距离-速度关联的雷达数据处理器的开发。
{"title":"X-band ubiquitous radar system: First experimental results","authors":"Alvaro Duque de Quevedo, Fernando Ibanez Urzaiz, J. Gismero-Menoyo, A. Asensio-López","doi":"10.1109/CCST.2017.8167851","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167851","url":null,"abstract":"This paper presents the first experimental results of an ubiquitous frequency modulated continuous wave (FMCW) radar system demonstrator, working in the 8.75 GHz (X band). This system, which main application is in the area of surface surveillance radars, has been developed within the framework of the project numbered as TEC2014-53815-R (RAD-DAR), and is currently under its field-testing phase. This article presents the demonstrator and describes its main blocks. Subsequently, it focuses on signal acquisition and digitization, to later explain the offline coherent signal processing carried out with the captured data. After this, the document introduces the chosen scenario for the first field tests, and shows the first results of the offline processing, illustrated with Range-Doppler matrices and detection figures. Finally, the paper introduces future work lines, including the development of a radar data processor taking advantage of the achieved strong range-speed association.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125795846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
How to implement EU data protection regulation for R&D on personal data 如何实施欧盟研发个人数据保护条例
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167797
R. Sánchez-Reillo, Ines Ortega-Fernandez, Wendy Ponce-Hernandez, Helga C. Quiros-Sandoval
Biometric R&D has to deal with personal data. From the Universal Declaration of Human Rights, privacy of a human being shall be protected, and this is addressed in different forms in each region of the world. In the case of the European Union, Data Protection Directives, Laws and Regulation have been established, and interpreted in different ways by each European Member State. Such a diversity has pushed the European Union to generate an improved regulation that will be mandatory in 2018. Biometric R&D shall not only comply with the current Directive, but also has to adapt its work to the new Regulation. This work is intended to describe the situation and provide a recommended procedure when having to acquire personal data.
生物识别技术研发必须处理个人数据。根据《世界人权宣言》,人的隐私应受到保护,这在世界各地以不同的形式得到解决。就欧盟而言,数据保护指令、法律和法规已经建立,并由每个欧洲成员国以不同的方式解释。这种多样性促使欧盟制定了一项改进的法规,将于2018年强制实施。生物识别技术研发不仅要遵守现行指令,还必须使其工作适应新法规。这项工作的目的是描述的情况,并提供一个建议的程序,当必须获得个人资料。
{"title":"How to implement EU data protection regulation for R&D on personal data","authors":"R. Sánchez-Reillo, Ines Ortega-Fernandez, Wendy Ponce-Hernandez, Helga C. Quiros-Sandoval","doi":"10.1109/CCST.2017.8167797","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167797","url":null,"abstract":"Biometric R&D has to deal with personal data. From the Universal Declaration of Human Rights, privacy of a human being shall be protected, and this is addressed in different forms in each region of the world. In the case of the European Union, Data Protection Directives, Laws and Regulation have been established, and interpreted in different ways by each European Member State. Such a diversity has pushed the European Union to generate an improved regulation that will be mandatory in 2018. Biometric R&D shall not only comply with the current Directive, but also has to adapt its work to the new Regulation. This work is intended to describe the situation and provide a recommended procedure when having to acquire personal data.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128494828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Language dependent challenge-based keystroke dynamics 基于语言挑战的击键动力学
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167838
Patrick A. H. Bours, Sukanya Brahmanpally
Keystroke Dynamics can be used as an unobtrusive method to enhance password authentication, by checking the typing rhythm of the user. Fixed passwords will give an attacker the possibility to try to learn to mimic the typing behaviour of a victim. In this paper we will investigate the performance of a keystroke dynamic (KD) system when the users have to type given (English) words. Under the assumption that it is easy to type words in your native language and difficult in a foreign language will we also test the performance of such a challenge-based KD system when the challenges are not common English words, but words in the native language of the user. We collected data from participants with 6 different native language backgrounds and had them type random 8–12 character words in each of the 6 languages. The participants also typed random English words and random French words. English was assumed to be a language familiar to all participants, while French was not a native language to any participant and most likely most participants were not fluent in French. Analysis showed that using language dependent words gave a better performance of the challenge-based KD compared to an all English challenge-based system. When using words in a native language, then the performance of the participants with their mother-tongue equal to that native language had a similar performance compared to the all English challenge-based system, but the non-native speakers had an FMR that was significantly lower than the native language speakers. We found that native Telugu speakers had an FMR of less than 1% when writing Spanish or Slovak words. We also found that duration features were best to recognize genuine users, but latency features performed best to recognize non-native impostor users.
通过检查用户的打字节奏,击键动力学可以作为一种不显眼的方法来增强密码身份验证。固定的密码会让攻击者有可能模仿受害者的打字行为。在本文中,我们将研究当用户必须键入给定的(英语)单词时,击键动态(KD)系统的性能。假设在母语中键入单词很容易,而在外语中键入单词很困难,那么当挑战不是常见的英语单词,而是用户的母语单词时,我们还将测试这种基于挑战的KD系统的性能。我们收集了来自6种不同母语背景的参与者的数据,并让他们在6种语言中每种语言随机输入8-12个字符的单词。参与者还随机输入英语单词和法语单词。英语被认为是所有参与者都熟悉的语言,而法语不是任何参与者的母语,很可能大多数参与者的法语都不流利。分析表明,与全英语挑战系统相比,使用语言相关单词的基于挑战的KD表现更好。当使用母语单词时,母语等于母语的参与者的表现与全英语挑战系统的表现相似,但非母语人士的FMR明显低于母语人士。我们发现母语为泰卢固语的人在写西班牙语或斯洛伐克语单词时的FMR不到1%。我们还发现,持续时间特征最能识别真正的用户,而延迟特征最能识别非本地的冒名顶替用户。
{"title":"Language dependent challenge-based keystroke dynamics","authors":"Patrick A. H. Bours, Sukanya Brahmanpally","doi":"10.1109/CCST.2017.8167838","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167838","url":null,"abstract":"Keystroke Dynamics can be used as an unobtrusive method to enhance password authentication, by checking the typing rhythm of the user. Fixed passwords will give an attacker the possibility to try to learn to mimic the typing behaviour of a victim. In this paper we will investigate the performance of a keystroke dynamic (KD) system when the users have to type given (English) words. Under the assumption that it is easy to type words in your native language and difficult in a foreign language will we also test the performance of such a challenge-based KD system when the challenges are not common English words, but words in the native language of the user. We collected data from participants with 6 different native language backgrounds and had them type random 8–12 character words in each of the 6 languages. The participants also typed random English words and random French words. English was assumed to be a language familiar to all participants, while French was not a native language to any participant and most likely most participants were not fluent in French. Analysis showed that using language dependent words gave a better performance of the challenge-based KD compared to an all English challenge-based system. When using words in a native language, then the performance of the participants with their mother-tongue equal to that native language had a similar performance compared to the all English challenge-based system, but the non-native speakers had an FMR that was significantly lower than the native language speakers. We found that native Telugu speakers had an FMR of less than 1% when writing Spanish or Slovak words. We also found that duration features were best to recognize genuine users, but latency features performed best to recognize non-native impostor users.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Signal processing on graphs for improving automatic credit card fraud detection 改进信用卡欺诈自动检测的图形信号处理
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167820
L. Vergara, A. Salazar, J. Belda, G. Safont, S. Moral, S. Iglesias
In this paper, several methods based on signal processing on graphs are proposed to improve the performance of credit card fraud detection. The proposed methods consist of a variant of the classic iterative amplitude adjusted Fourier transform (IAAFT) and two methods that we have called iterative surrogate signals on graph algorithms (ISSG). The objective is to generate surrogate samples from the original scarce fraud samples to improve the training of the detectors by lowering the variance of the estimate. A reliable augmentation of the target scarce population of frauds is important considering issues such as labeling cost; algorithm testing; data confidentiality; and constantly changing of patterns in the data streaming source. We have approached several scenarios with different legitimate and non-legitimate transaction ratios showing the feasibility of improving detection capabilities evaluated by means of receiver operating characteristic (ROC) curves and several key performance indicators (KPI) commonly used in financial business.
本文提出了几种基于图上信号处理的方法来提高信用卡欺诈检测的性能。所提出的方法包括经典迭代调幅傅立叶变换(IAAFT)的一种变体和我们称之为迭代替代信号图算法(ISSG)的两种方法。目标是从原始的稀缺欺诈样本中生成代理样本,通过降低估计的方差来改进检测器的训练。考虑到标签成本等问题,可靠地增加目标稀缺的欺诈人口是重要的;算法测试;数据的机密性;以及数据流源中模式的不断变化。我们已经接近了几种具有不同合法和非合法交易比率的场景,这些场景显示了通过接收者操作特征(ROC)曲线和金融业务中常用的几个关键绩效指标(KPI)来评估提高检测能力的可行性。
{"title":"Signal processing on graphs for improving automatic credit card fraud detection","authors":"L. Vergara, A. Salazar, J. Belda, G. Safont, S. Moral, S. Iglesias","doi":"10.1109/CCST.2017.8167820","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167820","url":null,"abstract":"In this paper, several methods based on signal processing on graphs are proposed to improve the performance of credit card fraud detection. The proposed methods consist of a variant of the classic iterative amplitude adjusted Fourier transform (IAAFT) and two methods that we have called iterative surrogate signals on graph algorithms (ISSG). The objective is to generate surrogate samples from the original scarce fraud samples to improve the training of the detectors by lowering the variance of the estimate. A reliable augmentation of the target scarce population of frauds is important considering issues such as labeling cost; algorithm testing; data confidentiality; and constantly changing of patterns in the data streaming source. We have approached several scenarios with different legitimate and non-legitimate transaction ratios showing the feasibility of improving detection capabilities evaluated by means of receiver operating characteristic (ROC) curves and several key performance indicators (KPI) commonly used in financial business.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129279626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Humans in the loop: Study of semi-automatic signature recognition based on attributes 人在循环:基于属性的半自动签名识别研究
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167815
D. Morocho, A. Morales, Julian Fierrez, J. Ortega-Garcia
The present work analyzes performance, abilities and contributions of the human being (layman) in semi-automatic signature recognition systems. During the last decade the performance of Automatic Signature Verification systems have been improved based on new machine learning techniques and better knowledge about intraclass and interclass variability of signers. However, there is still room for improvements and some real world applications demands lower error rates. This work analyzes collaborative tools such as crowdsourcing and human-assisted schemes developed to improve Automatic Signature Verification systems. The performance of humans in semi-automatic recognition tasks is directly related to the information provided during the comparisons. How humans can help automatic systems goes from direct forgery detection to semiautomatic attribute labeling. In this work, we present recent advances, analyzing their performance according to the same experimental protocol. The results suggest the potential of comparative attributes as a way to improve Automatic Signature Verification systems.
本文分析了人(外行人)在半自动签名识别系统中的表现、能力和贡献。在过去十年中,基于新的机器学习技术和对签名者类内和类间可变性的更好了解,自动签名验证系统的性能得到了改进。然而,仍然有改进的空间,一些现实世界的应用程序需要更低的错误率。这项工作分析了为改进自动签名验证系统而开发的众包和人工辅助方案等协作工具。人类在半自动识别任务中的表现与在比较过程中提供的信息直接相关。人类如何帮助自动系统从直接的伪造检测到半自动的属性标记。在这项工作中,我们介绍了最近的进展,并根据相同的实验方案分析了它们的性能。结果表明,比较属性作为一种改进自动签名验证系统的方法具有潜力。
{"title":"Humans in the loop: Study of semi-automatic signature recognition based on attributes","authors":"D. Morocho, A. Morales, Julian Fierrez, J. Ortega-Garcia","doi":"10.1109/CCST.2017.8167815","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167815","url":null,"abstract":"The present work analyzes performance, abilities and contributions of the human being (layman) in semi-automatic signature recognition systems. During the last decade the performance of Automatic Signature Verification systems have been improved based on new machine learning techniques and better knowledge about intraclass and interclass variability of signers. However, there is still room for improvements and some real world applications demands lower error rates. This work analyzes collaborative tools such as crowdsourcing and human-assisted schemes developed to improve Automatic Signature Verification systems. The performance of humans in semi-automatic recognition tasks is directly related to the information provided during the comparisons. How humans can help automatic systems goes from direct forgery detection to semiautomatic attribute labeling. In this work, we present recent advances, analyzing their performance according to the same experimental protocol. The results suggest the potential of comparative attributes as a way to improve Automatic Signature Verification systems.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126728586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Curvelets for contact-less hand biometrics under varied environmental conditions 不同环境条件下的非接触式手部生物识别曲线
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167805
Belén Ríos-Sánchez, Miguel Viana-Matesanz, C. S. Ávila
In this work, the Curvelet transform is proposed as a fairly new feature extraction method for palmprint recognition. Particularly, a multiscale analysis has been performed at four levels, assessing and combining the features extracted at each level in order to find those which better represent the palmprint. Feature matching has been conducted by means of Euclidean distance and Support Vector Machines (SVMs), and comparative results are provided. In addition, a multimodal approach involving the extracted palmprint features and hand geometry features has also been evaluated, obtaining an improvement of the results in relation to monomodal biometrics. Evaluations have been carried out following an evaluation protocol based on the definitions suggested by the ISO/IDE 19795 norm that allows for a fair comparison between the different methods. To this end, images coming from two different contact-less databases, which cover different capturing conditions, have been employed.
本文提出了一种新的掌纹特征提取方法——Curvelet变换。特别是,在四个层次上进行了多尺度分析,评估和组合在每个层次上提取的特征,以找到更好地代表掌纹的特征。利用欧氏距离和支持向量机进行特征匹配,并给出对比结果。此外,还对一种涉及提取掌纹特征和手部几何特征的多模态方法进行了评估,获得了相对于单模态生物识别的改进结果。评估是根据ISO/IDE 19795规范建议的定义制定的评估协议进行的,该协议允许在不同方法之间进行公平比较。为此,采用了来自两个不同的非接触式数据库的图像,这些数据库涵盖了不同的捕获条件。
{"title":"Curvelets for contact-less hand biometrics under varied environmental conditions","authors":"Belén Ríos-Sánchez, Miguel Viana-Matesanz, C. S. Ávila","doi":"10.1109/CCST.2017.8167805","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167805","url":null,"abstract":"In this work, the Curvelet transform is proposed as a fairly new feature extraction method for palmprint recognition. Particularly, a multiscale analysis has been performed at four levels, assessing and combining the features extracted at each level in order to find those which better represent the palmprint. Feature matching has been conducted by means of Euclidean distance and Support Vector Machines (SVMs), and comparative results are provided. In addition, a multimodal approach involving the extracted palmprint features and hand geometry features has also been evaluated, obtaining an improvement of the results in relation to monomodal biometrics. Evaluations have been carried out following an evaluation protocol based on the definitions suggested by the ISO/IDE 19795 norm that allows for a fair comparison between the different methods. To this end, images coming from two different contact-less databases, which cover different capturing conditions, have been employed.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CIC-AB: Online ad blocker for browsers CIC-AB:浏览器的在线广告拦截器
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167846
Arash Habibi Lashkari, A. Seo, G. Gil, A. Ghorbani
Online advertisements (ads) have taken over the web, nowedays most websites contain some sort of ads. While ads produce revenue for the server maintainer or to businesses, they have become intrusive and dangerous as ever. The ads use more bandwidth, show inappropriate content, and spread malware such as adware and ransomware. Although there are many products to block ads, also known as ad blockers, most depend on static filter lists that must be managed manually and frequently updated. When malicious advertisers can produce millions of new URLs within minutes, this is not the most effective method against ads. In this paper we propose our own ad blocker, CIC-AB, which uses machine learning techniques to detect new and unknown ads without needing to update a filter list. The proposed ad blocker has been developed as an extension for the common browsers (e.g. Firefox and Chrome). It classifies URLs, both HTTP and HTTPS, as: non-ad, normal-ad and malicious-ad. The analysis showed the average precision, recall and False Positive rate of CIC-AB for five classifiers namely; Naive Bayes (NB), Support Vector Machine (SVM), K-Nearest Neighbour (KNN), Random Forest (RF) and Decision Tree (DT) is 97.16%, 94.96% and 3.38% respectively.
在线广告(广告)已经接管了网络,现在大多数网站都包含某种形式的广告。虽然广告为服务器维护人员或企业带来收入,但它们已经变得侵入性和危险性一如既往。这些广告占用更多的带宽,展示不适当的内容,并传播恶意软件,如广告软件和勒索软件。虽然有许多产品可以阻止广告,也被称为广告拦截器,但大多数依赖于必须手动管理和经常更新的静态过滤列表。当恶意广告商可以在几分钟内产生数百万个新url时,这并不是对抗广告的最有效方法。在本文中,我们提出了我们自己的广告拦截器CIC-AB,它使用机器学习技术来检测新的和未知的广告,而无需更新过滤列表。拟议的广告拦截器已开发为一个扩展,为常见的浏览器(如Firefox和Chrome)。它将HTTP和HTTPS url分类为:非广告、正常广告和恶意广告。分析表明,5种分类器的平均准确率、查全率和假阳性率分别为:朴素贝叶斯(NB)、支持向量机(SVM)、k近邻(KNN)、随机森林(RF)和决策树(DT)分别为97.16%、94.96%和3.38%。
{"title":"CIC-AB: Online ad blocker for browsers","authors":"Arash Habibi Lashkari, A. Seo, G. Gil, A. Ghorbani","doi":"10.1109/CCST.2017.8167846","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167846","url":null,"abstract":"Online advertisements (ads) have taken over the web, nowedays most websites contain some sort of ads. While ads produce revenue for the server maintainer or to businesses, they have become intrusive and dangerous as ever. The ads use more bandwidth, show inappropriate content, and spread malware such as adware and ransomware. Although there are many products to block ads, also known as ad blockers, most depend on static filter lists that must be managed manually and frequently updated. When malicious advertisers can produce millions of new URLs within minutes, this is not the most effective method against ads. In this paper we propose our own ad blocker, CIC-AB, which uses machine learning techniques to detect new and unknown ads without needing to update a filter list. The proposed ad blocker has been developed as an extension for the common browsers (e.g. Firefox and Chrome). It classifies URLs, both HTTP and HTTPS, as: non-ad, normal-ad and malicious-ad. The analysis showed the average precision, recall and False Positive rate of CIC-AB for five classifiers namely; Naive Bayes (NB), Support Vector Machine (SVM), K-Nearest Neighbour (KNN), Random Forest (RF) and Decision Tree (DT) is 97.16%, 94.96% and 3.38% respectively.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"928 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116193270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Accurate multi-target surveillance system over wide areas 广域精确多目标监视系统
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167853
Francisco-Javier Romero-Paisano, F. Pérez-Martínez, Susan Martínez-Cordero, J. Calvo-Gallego
The article presents an accurate system for surveillance purposes of multiple targets in wide areas. The surveillance system is based on a GB-ROSAR (Ground-Based-Rotating Synthetic Aperture Radar). It is a fixed radar with the ability of obtaining images by synthesizing the radiating aperture by a circular movement of the antenna. The prototype makes use of FM-CW (Frequency-Modulated Continuous-Wave) signals, operating in millimeter wave bands. The system has been developed with low cost devices. The objective of this work is to show, through simulations and experimental results, the real possibilities of this type of systems in the setting of precise surveillance of several targets simultaneously over wide areas. This study contains the design and construction of the proposed surveillance system, the implemented signal processing, the obtained results and its interpretation, and the conclusions about this work.
本文提出了一种适用于大范围内多目标监视的精确系统。监视系统基于GB-ROSAR(地基旋转合成孔径雷达)。它是一种固定雷达,能够通过天线的圆周运动合成辐射孔径来获取图像。原型机使用FM-CW(调频连续波)信号,工作在毫米波波段。该系统采用低成本设备开发。这项工作的目的是通过模拟和实验结果来展示这种类型的系统在广泛区域内同时对几个目标进行精确监视的真正可能性。本研究包含了所提出的监控系统的设计和构建,实现的信号处理,获得的结果及其解释,以及关于本工作的结论。
{"title":"Accurate multi-target surveillance system over wide areas","authors":"Francisco-Javier Romero-Paisano, F. Pérez-Martínez, Susan Martínez-Cordero, J. Calvo-Gallego","doi":"10.1109/CCST.2017.8167853","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167853","url":null,"abstract":"The article presents an accurate system for surveillance purposes of multiple targets in wide areas. The surveillance system is based on a GB-ROSAR (Ground-Based-Rotating Synthetic Aperture Radar). It is a fixed radar with the ability of obtaining images by synthesizing the radiating aperture by a circular movement of the antenna. The prototype makes use of FM-CW (Frequency-Modulated Continuous-Wave) signals, operating in millimeter wave bands. The system has been developed with low cost devices. The objective of this work is to show, through simulations and experimental results, the real possibilities of this type of systems in the setting of precise surveillance of several targets simultaneously over wide areas. This study contains the design and construction of the proposed surveillance system, the implemented signal processing, the obtained results and its interpretation, and the conclusions about this work.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128123975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Principal component analysis for ear-based biometric verification 基于耳的生物特征验证主成分分析
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167843
David Querencias-Uceta, Belén Ríos-Sánchez, C. S. Ávila
Biometrics is an active research field that is increasingly being integrated into current technology. As a result, more and more people are becoming familiar with biometric technics such as fingerprint or facial recognition. Nevertheless, there are innovative techniques such as ear-based biometrics which are not very well known yet because they are at initial stages of research. In this work, an ear geometry-based biometric verification system oriented to recognition through mobile phones is presented and evaluated. Feature extraction is carried out by means of Principal Component Analysis and feature matching is performed by a distance-based classifier including Euclidean and Eigen distances. The evaluation has been made according to the specifications included in the ISO/IDE 19795 norm following a zero-effort falsification scenario. To this end, a database including ear images of different users has been captured using the camera of a smartphone. The obtained Equal Error Rate matches 1.11% when Euclidean distance is applied for feature comparison and 5.56% in the case of Eigendistance.
生物识别是一个活跃的研究领域,越来越多地与当前的技术相结合。因此,越来越多的人开始熟悉指纹或面部识别等生物识别技术。然而,有一些创新技术,如基于耳朵的生物识别技术,由于它们还处于研究的初始阶段,所以还不是很为人所知。本文提出并评估了一种基于耳朵几何的、面向手机识别的生物特征验证系统。通过主成分分析进行特征提取,并通过基于距离的分类器进行特征匹配,包括欧几里得距离和特征距离。评估是根据ISO/IDE 19795标准中包含的规范在零努力伪造情况下进行的。为此,利用智能手机的摄像头,建立了包含不同用户耳朵图像的数据库。得到的等错误率在欧氏距离下为1.11%,在特征距离下为5.56%。
{"title":"Principal component analysis for ear-based biometric verification","authors":"David Querencias-Uceta, Belén Ríos-Sánchez, C. S. Ávila","doi":"10.1109/CCST.2017.8167843","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167843","url":null,"abstract":"Biometrics is an active research field that is increasingly being integrated into current technology. As a result, more and more people are becoming familiar with biometric technics such as fingerprint or facial recognition. Nevertheless, there are innovative techniques such as ear-based biometrics which are not very well known yet because they are at initial stages of research. In this work, an ear geometry-based biometric verification system oriented to recognition through mobile phones is presented and evaluated. Feature extraction is carried out by means of Principal Component Analysis and feature matching is performed by a distance-based classifier including Euclidean and Eigen distances. The evaluation has been made according to the specifications included in the ISO/IDE 19795 norm following a zero-effort falsification scenario. To this end, a database including ear images of different users has been captured using the camera of a smartphone. The obtained Equal Error Rate matches 1.11% when Euclidean distance is applied for feature comparison and 5.56% in the case of Eigendistance.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Person authentication using nearest feature line embedding transformation and biased discriminant analysis 基于最近特征线嵌入变换和有偏判别分析的人物认证
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167858
Chen-Ta Hsieh, Chin-Chuan Han, Chang-Hsing Lee, Kuo-Chin Fan
Personal authentication (PA) on smartphones plays the crucial role in mobile payment. Facial features are the most user-friendly biometric feature because of the build-in camera, when we use smartphones as the payment devices. In this study, a novel authenticated method is proposed for PA by integrating feature line embedding (FLE) transformation and biased discriminant analysis (BDA) by using facial features. Due to the few training samples, the discriminant power is limited for learning. In feature spaces, feature lines are regarded as the feature combination between two training samples and infinitely simulate the possible features of various conditions for training. In PA, only positive samples is used to calculate the within-class scatter, and the between class scatter is also calculated using negative samples by the BDA strategy. Compared with the traditional two-class classification and BDA problems, the FLE integrates with BDA to obtain a better dimension reduction transformation. A support vector machine (SVM) classifier is further trained to determine a query sample is a real or a forged sample.
智能手机上的个人认证(PA)在移动支付中起着至关重要的作用。当我们使用智能手机作为支付设备时,面部特征是最方便用户使用的生物特征,因为它内置了摄像头。本文提出了一种基于人脸特征的人脸识别方法,该方法将特征线嵌入(FLE)变换与有偏判别分析(BDA)相结合。由于训练样本较少,学习的判别能力受到限制。在特征空间中,将特征线视为两个训练样本之间的特征组合,无限模拟各种条件下可能出现的特征进行训练。在PA中,只使用正样本计算类内散点,使用BDA策略也使用负样本计算类间散点。与传统的两类分类和BDA问题相比,FLE与BDA相结合,获得了更好的降维变换。进一步训练支持向量机(SVM)分类器来判断查询样本是真实样本还是伪造样本。
{"title":"Person authentication using nearest feature line embedding transformation and biased discriminant analysis","authors":"Chen-Ta Hsieh, Chin-Chuan Han, Chang-Hsing Lee, Kuo-Chin Fan","doi":"10.1109/CCST.2017.8167858","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167858","url":null,"abstract":"Personal authentication (PA) on smartphones plays the crucial role in mobile payment. Facial features are the most user-friendly biometric feature because of the build-in camera, when we use smartphones as the payment devices. In this study, a novel authenticated method is proposed for PA by integrating feature line embedding (FLE) transformation and biased discriminant analysis (BDA) by using facial features. Due to the few training samples, the discriminant power is limited for learning. In feature spaces, feature lines are regarded as the feature combination between two training samples and infinitely simulate the possible features of various conditions for training. In PA, only positive samples is used to calculate the within-class scatter, and the between class scatter is also calculated using negative samples by the BDA strategy. Compared with the traditional two-class classification and BDA problems, the FLE integrates with BDA to obtain a better dimension reduction transformation. A support vector machine (SVM) classifier is further trained to determine a query sample is a real or a forged sample.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124746044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1