首页 > 最新文献

Proceedings of the ACMSE 2018 Conference最新文献

英文 中文
Phishing e-mail detection by using deep learning algorithms 利用深度学习算法进行网络钓鱼电子邮件检测
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190719
R. Hassanpour, Erdogan Dogdu, R. Choupani, Onur Goker, Nazli Nazli
Phishing e-mails are considered as spam e-mails, which aim to collect sensitive personal information about the users via network. Since the main purpose of this behavior is mostly to harm users financially, it is vital to detect these phishing or spam e-mails immediately to prevent unauthorized access to users' vital information. To detect phishing e-mails, using a quicker and robust classification method is important. Considering the billions of e-mails on the Internet, this classification process is supposed to be done in a limited time to analyze the results. In this work, we present some of the early results on the classification of spam email using deep learning and machine methods. We utilize word2vec to represent emails instead of using the popular keyword or other rule-based methods. Vector representations are then fed into a neural network to create a learning model. We have tested our method on an open dataset and found over 96% accuracy levels with the deep learning classification methods in comparison to the standard machine learning algorithms.
网络钓鱼邮件被认为是垃圾邮件,其目的是通过网络收集用户的敏感个人信息。由于这种行为的主要目的是在经济上损害用户,因此立即检测这些网络钓鱼或垃圾邮件以防止对用户重要信息的未经授权的访问至关重要。为了检测网络钓鱼电子邮件,使用更快、更健壮的分类方法非常重要。考虑到互联网上有数十亿封电子邮件,这个分类过程应该在有限的时间内完成,以分析结果。在这项工作中,我们展示了一些使用深度学习和机器方法对垃圾邮件进行分类的早期结果。我们使用word2vec来表示电子邮件,而不是使用流行的关键字或其他基于规则的方法。然后将向量表示输入神经网络以创建学习模型。我们在一个开放数据集上测试了我们的方法,发现与标准机器学习算法相比,深度学习分类方法的准确率超过96%。
{"title":"Phishing e-mail detection by using deep learning algorithms","authors":"R. Hassanpour, Erdogan Dogdu, R. Choupani, Onur Goker, Nazli Nazli","doi":"10.1145/3190645.3190719","DOIUrl":"https://doi.org/10.1145/3190645.3190719","url":null,"abstract":"Phishing e-mails are considered as spam e-mails, which aim to collect sensitive personal information about the users via network. Since the main purpose of this behavior is mostly to harm users financially, it is vital to detect these phishing or spam e-mails immediately to prevent unauthorized access to users' vital information. To detect phishing e-mails, using a quicker and robust classification method is important. Considering the billions of e-mails on the Internet, this classification process is supposed to be done in a limited time to analyze the results. In this work, we present some of the early results on the classification of spam email using deep learning and machine methods. We utilize word2vec to represent emails instead of using the popular keyword or other rule-based methods. Vector representations are then fed into a neural network to create a learning model. We have tested our method on an open dataset and found over 96% accuracy levels with the deep learning classification methods in comparison to the standard machine learning algorithms.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123029013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance analysis of brain-computer interfaces in aerial drone 无人机脑机接口性能分析
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190683
S. North, Adnan Rashied, J. Walters, A. Alissa, Josh Cooper, E. Rawls, Cheyenne Sancho, Utku Victor Sahin, K. Randell, Heather Rego
The main objective of this study is to find efficient methods to utilize brain-computer interfaces (BCIs) in conjunction with aerial drones. The study investigates how effective the EPOC+ is by challenging users of diverse genders and ages to complete tasks using mental commands and facial expressions to control a Parrot AR-Drone 2.0. After a calibration phase, the designed experiments were conducted using randomly selected participants (n=20). Preliminary analysis of the collected data indicated that there was no significant difference between the rating of difficulty before and after, between the mental and facial commands. Furthermore, this study showed that from group of participants more individuals had greater difficulty controlling the mental and facial commands than they originally expected.
本研究的主要目的是寻找有效的方法来利用脑机接口(bci)与空中无人机。该研究通过挑战不同性别和年龄的用户,让他们通过心理命令和面部表情完成任务,来控制Parrot AR-Drone 2.0,以调查EPOC+的有效性。经过一个校准阶段后,随机选择参与者(n=20)进行设计的实验。对收集到的数据的初步分析表明,在测试前后,在心理命令和面部命令之间,难度评级没有显著差异。此外,这项研究表明,在一组参与者中,更多的人在控制心理和面部命令方面比他们最初预期的要困难得多。
{"title":"Performance analysis of brain-computer interfaces in aerial drone","authors":"S. North, Adnan Rashied, J. Walters, A. Alissa, Josh Cooper, E. Rawls, Cheyenne Sancho, Utku Victor Sahin, K. Randell, Heather Rego","doi":"10.1145/3190645.3190683","DOIUrl":"https://doi.org/10.1145/3190645.3190683","url":null,"abstract":"The main objective of this study is to find efficient methods to utilize brain-computer interfaces (BCIs) in conjunction with aerial drones. The study investigates how effective the EPOC+ is by challenging users of diverse genders and ages to complete tasks using mental commands and facial expressions to control a Parrot AR-Drone 2.0. After a calibration phase, the designed experiments were conducted using randomly selected participants (n=20). Preliminary analysis of the collected data indicated that there was no significant difference between the rating of difficulty before and after, between the mental and facial commands. Furthermore, this study showed that from group of participants more individuals had greater difficulty controlling the mental and facial commands than they originally expected.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Malware classification using deep learning methods 使用深度学习方法的恶意软件分类
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190692
B. Cakir, Erdogan Dogdu
Malware, short for Malicious Software, is growing continuously in numbers and sophistication as our digital world continuous to grow. It is a very serious problem and many efforts are devoted to malware detection in today's cybersecurity world. Many machine learning algorithms are used for the automatic detection of malware in recent years. Most recently, deep learning is being used with better performance. Deep learning models are shown to work much better in the analysis of long sequences of system calls. In this paper a shallow deep learning-based feature extraction method (word2vec) is used for representing any given malware based on its opcodes. Gradient Boosting algorithm is used for the classification task. Then, k-fold cross-validation is used to validate the model performance without sacrificing a validation split. Evaluation results show up to 96% accuracy with limited sample data.
恶意软件,简称恶意软件,随着我们的数字世界不断发展,其数量和复杂性也在不断增长。这是一个非常严重的问题,在当今的网络安全世界中,许多人致力于恶意软件检测。近年来,许多机器学习算法被用于恶意软件的自动检测。最近,深度学习被用于更好的性能。深度学习模型在分析长序列的系统调用时表现得更好。本文采用一种基于浅层深度学习的特征提取方法(word2vec)来表示任意给定的恶意软件的操作码。分类任务采用梯度增强算法。然后,在不牺牲验证分割的情况下,使用k-fold交叉验证来验证模型性能。评估结果表明,在有限的样本数据下,准确率高达96%。
{"title":"Malware classification using deep learning methods","authors":"B. Cakir, Erdogan Dogdu","doi":"10.1145/3190645.3190692","DOIUrl":"https://doi.org/10.1145/3190645.3190692","url":null,"abstract":"Malware, short for Malicious Software, is growing continuously in numbers and sophistication as our digital world continuous to grow. It is a very serious problem and many efforts are devoted to malware detection in today's cybersecurity world. Many machine learning algorithms are used for the automatic detection of malware in recent years. Most recently, deep learning is being used with better performance. Deep learning models are shown to work much better in the analysis of long sequences of system calls. In this paper a shallow deep learning-based feature extraction method (word2vec) is used for representing any given malware based on its opcodes. Gradient Boosting algorithm is used for the classification task. Then, k-fold cross-validation is used to validate the model performance without sacrificing a validation split. Evaluation results show up to 96% accuracy with limited sample data.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123992009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
A full quadtree searchless IFS fractal image encoding algorithm applicable in both high and low compression rates 一种适用于高低压缩率的全四叉树无搜索IFS分形图像编码算法
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190669
Kairai Chen, Xianwei Wu
Fractal Image Compression is rarely used in high-quality image compression situation because of its long encoding time and inefficiency of encoding book structure. This paper introduces a novel searchless fractal encoding algorithm based on full quadtree range block partition that can efficiently encode 2x2 range blocks or even individual pixels. This approach addresses both problems and thus can be used to perform high-quality image compression. Experimental results show that the algorithm is capable of providing superior performance in achieving better compression ratio and reconstructed image quality compared to traditional search-based and searchless fractal methods in both low and high compression rates. Another advantage of the algorithm is its fast encoding speed since no search process is needed in this approach. The encoding time of this algorithm is only a fraction of traditional fractal algorithms.
分形图像压缩由于编码时间长、编码书结构低效率等缺点,在高质量图像压缩中应用较少。本文提出了一种基于全四叉树范围块分割的无搜索分形编码算法,该算法可以有效地对2x2范围块甚至单个像素进行编码。这种方法解决了这两个问题,因此可以用于执行高质量的图像压缩。实验结果表明,无论在低压缩率还是高压缩率下,该算法都能比传统的基于搜索和无搜索分形方法获得更好的压缩比和重构图像质量。该算法的另一个优点是编码速度快,不需要搜索过程。该算法的编码时间仅为传统分形算法的一小部分。
{"title":"A full quadtree searchless IFS fractal image encoding algorithm applicable in both high and low compression rates","authors":"Kairai Chen, Xianwei Wu","doi":"10.1145/3190645.3190669","DOIUrl":"https://doi.org/10.1145/3190645.3190669","url":null,"abstract":"Fractal Image Compression is rarely used in high-quality image compression situation because of its long encoding time and inefficiency of encoding book structure. This paper introduces a novel searchless fractal encoding algorithm based on full quadtree range block partition that can efficiently encode 2x2 range blocks or even individual pixels. This approach addresses both problems and thus can be used to perform high-quality image compression. Experimental results show that the algorithm is capable of providing superior performance in achieving better compression ratio and reconstructed image quality compared to traditional search-based and searchless fractal methods in both low and high compression rates. Another advantage of the algorithm is its fast encoding speed since no search process is needed in this approach. The encoding time of this algorithm is only a fraction of traditional fractal algorithms.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cryptanalysis of the autokey cipher using the index of coincidence 使用重合索引对自动密钥密码进行密码分析
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190679
Derek C. Brown
Modern cryptography builds upon many of the concepts introduced in classical cryptography. This study contributes to research in these fields through a cryptanalysis of a polyalphabetic substitution cipher known as Autokey using Friedman's index of coincidence measure of text character frequency paired with modern computer programming and data collection techniques. Results indicate that under certain constraints on the encrypting key, the index of coincidence can be applied to text decrypted using a small sample of random keys of various lengths to accurately predict the length of the encryption key.
现代密码学建立在经典密码学中引入的许多概念之上。本研究通过使用弗里德曼的文本字符频率重合指数测量与现代计算机编程和数据收集技术配对,对称为Autokey的多字母替代密码进行密码分析,为这些领域的研究做出了贡献。结果表明,在对加密密钥有一定约束的情况下,一致性索引可以应用于使用不同长度的随机密钥的小样本解密的文本,从而准确地预测加密密钥的长度。
{"title":"A cryptanalysis of the autokey cipher using the index of coincidence","authors":"Derek C. Brown","doi":"10.1145/3190645.3190679","DOIUrl":"https://doi.org/10.1145/3190645.3190679","url":null,"abstract":"Modern cryptography builds upon many of the concepts introduced in classical cryptography. This study contributes to research in these fields through a cryptanalysis of a polyalphabetic substitution cipher known as Autokey using Friedman's index of coincidence measure of text character frequency paired with modern computer programming and data collection techniques. Results indicate that under certain constraints on the encrypting key, the index of coincidence can be applied to text decrypted using a small sample of random keys of various lengths to accurately predict the length of the encryption key.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124157178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Testing vulnerabilities in bluetooth low energy 测试蓝牙低功耗漏洞
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190693
Thomas Willingham, Cody Henderson, Blair Kiel, Md Shariful Haque, T. Atkison
Bluetooth Low Energy (BTLE) is pervasive in technology throughout all areas of our lives. In this research effort, experiments are performed to discover vulnerabilities in the Bluetooth protocol and given the right technology determine exploitation. Using a Bluetooth keyboard, practical examples of the Bluetooth Low Energy protocol were able to be provided. Because of the results garnered, it is recommended that Bluetooth Low Energy not be used for any connections that may transmit sensitive data, or with devices that may have access to sensitive networks.
低功耗蓝牙(BTLE)技术在我们生活的各个领域都很普遍。在这项研究工作中,通过实验发现蓝牙协议中的漏洞,并给出正确的技术确定利用。使用蓝牙键盘,可以提供低功耗蓝牙协议的实际示例。由于所获得的结果,建议不要将低功耗蓝牙用于可能传输敏感数据的任何连接,或者可能访问敏感网络的设备。
{"title":"Testing vulnerabilities in bluetooth low energy","authors":"Thomas Willingham, Cody Henderson, Blair Kiel, Md Shariful Haque, T. Atkison","doi":"10.1145/3190645.3190693","DOIUrl":"https://doi.org/10.1145/3190645.3190693","url":null,"abstract":"Bluetooth Low Energy (BTLE) is pervasive in technology throughout all areas of our lives. In this research effort, experiments are performed to discover vulnerabilities in the Bluetooth protocol and given the right technology determine exploitation. Using a Bluetooth keyboard, practical examples of the Bluetooth Low Energy protocol were able to be provided. Because of the results garnered, it is recommended that Bluetooth Low Energy not be used for any connections that may transmit sensitive data, or with devices that may have access to sensitive networks.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122928779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Preliminary research on thesaurus-based query expansion for Twitter data extraction 基于同义词库的Twitter数据提取查询扩展初探
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190694
Vidya Nakade, A. Musaev, T. Atkison
With the increasing popularity of microblogging and social media platforms like Twitter, researchers are trying to make use of the massive amount of user-created data to explore new applications/tools. Success of research in data science is highly dependent on the amount and type of data collected. For this effort, a thesaurus-based query expansion technique from information retrieval will be used to extract additional Twitter data. Though there has been research in this general area, our effort concentrates on applying a thesaurus-based query expansion for Twitter retrieval. Experiments are performed to collect Twitter data using the proposed approach for query terms related to disaster situations like hurricanes and shootings. We observed an increase of 32% in tweets received for the Hurricane Harvey event, and a 131% increase in the volume of tweets for a query related to the Vegas shooting incidence using the thesaurus-based query expansion approach.
随着微博和Twitter等社交媒体平台的日益普及,研究人员正试图利用大量用户创建的数据来探索新的应用/工具。数据科学研究的成功高度依赖于所收集数据的数量和类型。对于这项工作,将使用来自信息检索的基于同义词库的查询扩展技术来提取额外的Twitter数据。虽然在这个领域已经有了研究,但我们的努力集中在应用基于同义词库的查询扩展来进行Twitter检索。实验使用所提出的方法来收集与飓风和枪击等灾难情况相关的查询术语的Twitter数据。我们观察到,使用基于同义词库的查询扩展方法,收到的关于飓风哈维事件的tweet增加了32%,而与拉斯维加斯枪击事件相关的查询的tweet量增加了131%。
{"title":"Preliminary research on thesaurus-based query expansion for Twitter data extraction","authors":"Vidya Nakade, A. Musaev, T. Atkison","doi":"10.1145/3190645.3190694","DOIUrl":"https://doi.org/10.1145/3190645.3190694","url":null,"abstract":"With the increasing popularity of microblogging and social media platforms like Twitter, researchers are trying to make use of the massive amount of user-created data to explore new applications/tools. Success of research in data science is highly dependent on the amount and type of data collected. For this effort, a thesaurus-based query expansion technique from information retrieval will be used to extract additional Twitter data. Though there has been research in this general area, our effort concentrates on applying a thesaurus-based query expansion for Twitter retrieval. Experiments are performed to collect Twitter data using the proposed approach for query terms related to disaster situations like hurricanes and shootings. We observed an increase of 32% in tweets received for the Hurricane Harvey event, and a 131% increase in the volume of tweets for a query related to the Vegas shooting incidence using the thesaurus-based query expansion approach.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130408099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An exercise in repeating experimental analysis using a program developed on a no longer available computing system 用在不再可用的计算系统上开发的程序进行重复实验分析的练习
Pub Date : 2018-03-29 DOI: 10.1145/3190645.3190720
L. D. Castro, J. Jaromczyk
Useful programs often fall into obsolescence when they are not updated with the advancing hardware and software. This presentation describes an exercise on deploying a legacy software for a latent variable analysis. Although the need to use this software arose in the context of a multidisciplinary project, including bioinformatics, the goal of this exercise is to provide a better understanding of the challenges in preserving programs developed on hardware that may no longer exist or used out-of-date or earlier versions of operations systems and compilers. Such programs may be required to maintain reproducibility of previously published experiments and used to further contribute to research.
有用的程序如果不随着硬件和软件的发展而更新,往往就会过时。本演讲描述了部署用于潜在变量分析的遗留软件的练习。尽管使用该软件的需求出现在包括生物信息学在内的多学科项目的背景下,但本练习的目标是更好地理解保存在硬件上开发的程序所面临的挑战,这些硬件可能不再存在,或者使用过时或早期版本的操作系统和编译器。此类程序可能需要保持先前发表的实验的可重复性,并用于进一步促进研究。
{"title":"An exercise in repeating experimental analysis using a program developed on a no longer available computing system","authors":"L. D. Castro, J. Jaromczyk","doi":"10.1145/3190645.3190720","DOIUrl":"https://doi.org/10.1145/3190645.3190720","url":null,"abstract":"Useful programs often fall into obsolescence when they are not updated with the advancing hardware and software. This presentation describes an exercise on deploying a legacy software for a latent variable analysis. Although the need to use this software arose in the context of a multidisciplinary project, including bioinformatics, the goal of this exercise is to provide a better understanding of the challenges in preserving programs developed on hardware that may no longer exist or used out-of-date or earlier versions of operations systems and compilers. Such programs may be required to maintain reproducibility of previously published experiments and used to further contribute to research.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126378412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model for donation verification 捐赠验证模型
Pub Date : 2017-08-26 DOI: 10.1145/3190645.3190698
Bin Fu, F. Zhu, J. Abraham
In this paper, we introduce a model for donation verification. A randomized algorithm is developed to check if the money claimed being received by the collector is (1 - ϵ)-approximation to the total amount money contributed by the donors. We also derive some negative results that show it is impossible to verify the donations under some circumstances.
本文介绍了一个捐赠验证模型。开发了一种随机算法来检查收集者声称收到的钱是否为(1 - λ)——与捐赠者捐款总额的近似值。我们也得出了一些负面的结果,表明在某些情况下无法核实捐赠。
{"title":"A model for donation verification","authors":"Bin Fu, F. Zhu, J. Abraham","doi":"10.1145/3190645.3190698","DOIUrl":"https://doi.org/10.1145/3190645.3190698","url":null,"abstract":"In this paper, we introduce a model for donation verification. A randomized algorithm is developed to check if the money claimed being received by the collector is (1 - ϵ)-approximation to the total amount money contributed by the donors. We also derive some negative results that show it is impossible to verify the donations under some circumstances.","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proceedings of the ACMSE 2018 Conference 2018年ACMSE会议记录
Pub Date : 1900-01-01 DOI: 10.1145/3190645
{"title":"Proceedings of the ACMSE 2018 Conference","authors":"","doi":"10.1145/3190645","DOIUrl":"https://doi.org/10.1145/3190645","url":null,"abstract":"","PeriodicalId":403177,"journal":{"name":"Proceedings of the ACMSE 2018 Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121900032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the ACMSE 2018 Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1