首页 > 最新文献

2021 12th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
Sefamerve R&D at ICICS 2021 Mowjaz Multi-Topic Labelling Task Sefamerve研发在ICICS 2021 Mowjaz多主题标签任务
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464568
Birol Kuyumcu, Selman Delil, Cüneyt Aksakalli
This paper describes our contribution to ICICS 2021 Mowjaz Multi-Topic Labelling Task. The purpose of the task is to classify Arabic articles based on their topics. Participating systems are expected to select one or more of the determined topics for each given article. In our system, we experiment with state-of-art pre-trained language models (GigaBERT-v4 and Arabic BERT) and a classical logistic regression to find the best effective model for the problem. We obtained the highest F1-score of 0.8563 with GigaBERT-v4 while Arabic-BERT and logistic regression reached 0.8442 and 0.8081 respectively. Our system ranked 2nd in the competition very close to the winner.
本文描述了我们对ICICS 2021 Mowjaz多主题标签任务的贡献。任务的目的是根据题目对阿拉伯语文章进行分类。参与系统需要为每篇给定的文章选择一个或多个确定的主题。在我们的系统中,我们使用最先进的预训练语言模型(GigaBERT-v4和阿拉伯语BERT)和经典逻辑回归进行实验,以找到解决问题的最有效模型。我们使用GigaBERT-v4获得最高的f1得分0.8563,而Arabic-BERT和logistic回归分别达到0.8442和0.8081。我们的系统在比赛中排名第二,离冠军很近。
{"title":"Sefamerve R&D at ICICS 2021 Mowjaz Multi-Topic Labelling Task","authors":"Birol Kuyumcu, Selman Delil, Cüneyt Aksakalli","doi":"10.1109/ICICS52457.2021.9464568","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464568","url":null,"abstract":"This paper describes our contribution to ICICS 2021 Mowjaz Multi-Topic Labelling Task. The purpose of the task is to classify Arabic articles based on their topics. Participating systems are expected to select one or more of the determined topics for each given article. In our system, we experiment with state-of-art pre-trained language models (GigaBERT-v4 and Arabic BERT) and a classical logistic regression to find the best effective model for the problem. We obtained the highest F1-score of 0.8563 with GigaBERT-v4 while Arabic-BERT and logistic regression reached 0.8442 and 0.8081 respectively. Our system ranked 2nd in the competition very close to the winner.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"43 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Routing Algorithm based on Devices Cooperation for better QoS within IoT 一种新的基于设备协作的路由算法,在物联网中实现更好的QoS
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464616
Sofiane Hamrioui, Upasana Dohare, D. K. Lobiyal
Fairly and efficiently energy utilization among the devices and the delay spent by sending their data are a majors constraints within Internet of Things (IoT) environment. We focus the applicability of coalition game theory to stimulate cooperation among devices and analysing the performance of multipath routing to meet the quality of service (QoS). In this paper, we present a new routing algorithm, called RACD (Routing Algorithm based on Cooperation between Devices) in order to optimize the energy consumption and the link delay during the routing process. The principles that have been exploited by RACD are the multi-metrics routing and the coalitional game theory. RACD allow to selects a route with lower delay and minimum energy consumption among multiple coalitions. Others principles have been exploited too by our proposed algorithm, such as the payoff function of coalition, the core of the game and the Shapely. The performances of our proposed routing algorithm have been evaluated by simulations according to important metrics and the results obtained have been compared to two others routing solutions that are ELDR and MAODV.
在物联网(IoT)环境中,设备之间公平有效的能源利用和发送数据所花费的延迟是一个主要的制约因素。重点研究了联盟博弈论在激励设备间合作中的适用性,并分析了多径路由满足服务质量(QoS)的性能。为了优化路由过程中的能量消耗和链路延迟,本文提出了一种新的路由算法,称为RACD (routing algorithm based on cooperative between Devices)。RACD所利用的原则是多指标路由和联合博弈论。RACD允许在多个联盟中选择时延较低、能耗最小的路由。我们提出的算法也利用了其他原则,如联盟的收益函数、游戏的核心和Shapely。我们提出的路由算法的性能根据重要指标进行了仿真评估,并得到的结果与另外两种路由解决方案ELDR和MAODV进行了比较。
{"title":"A New Routing Algorithm based on Devices Cooperation for better QoS within IoT","authors":"Sofiane Hamrioui, Upasana Dohare, D. K. Lobiyal","doi":"10.1109/ICICS52457.2021.9464616","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464616","url":null,"abstract":"Fairly and efficiently energy utilization among the devices and the delay spent by sending their data are a majors constraints within Internet of Things (IoT) environment. We focus the applicability of coalition game theory to stimulate cooperation among devices and analysing the performance of multipath routing to meet the quality of service (QoS). In this paper, we present a new routing algorithm, called RACD (Routing Algorithm based on Cooperation between Devices) in order to optimize the energy consumption and the link delay during the routing process. The principles that have been exploited by RACD are the multi-metrics routing and the coalitional game theory. RACD allow to selects a route with lower delay and minimum energy consumption among multiple coalitions. Others principles have been exploited too by our proposed algorithm, such as the payoff function of coalition, the core of the game and the Shapely. The performances of our proposed routing algorithm have been evaluated by simulations according to important metrics and the results obtained have been compared to two others routing solutions that are ELDR and MAODV.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116754192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SecKG: Leveraging attack detection and prediction using knowledge graphs SecKG:利用知识图进行攻击检测和预测
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464587
Siwar Kriaa, Yahia Chaabane
Advanced persistent threats targeting sensitive corporations, are becoming today stealthier and more complex, coordinating different attacks steps and lateral movements, and trying to stay undetected for long time. Classical security solutions that rely on signature-based detection can be easily thwarted by malware using obfuscation and encryption techniques. More recent solutions are using machine learning approaches for detecting outliers. Nevertheless, the majority of them reason on tabular unstructured data which can lead to missing obvious conclusions. We propose in this paper a novel approach that leverages a combination of both knowledge graphs and machine learning techniques to detect and predict attacks. Using Cyber Threat Intelligence (CTI), we built a knowledge graph that processes event logs in order to not only detect attack techniques, but also learn how to predict them.
针对敏感企业的高级持续性威胁,如今变得更加隐蔽和复杂,协调不同的攻击步骤和横向移动,并试图长时间不被发现。依赖于基于签名的检测的经典安全解决方案很容易被使用混淆和加密技术的恶意软件所挫败。最近的解决方案是使用机器学习方法来检测异常值。然而,他们中的大多数都是基于表格式的非结构化数据进行推理,这可能会导致缺少明显的结论。我们在本文中提出了一种利用知识图和机器学习技术相结合来检测和预测攻击的新方法。利用网络威胁情报(CTI),我们建立了一个知识图,处理事件日志,不仅可以检测攻击技术,还可以学习如何预测它们。
{"title":"SecKG: Leveraging attack detection and prediction using knowledge graphs","authors":"Siwar Kriaa, Yahia Chaabane","doi":"10.1109/ICICS52457.2021.9464587","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464587","url":null,"abstract":"Advanced persistent threats targeting sensitive corporations, are becoming today stealthier and more complex, coordinating different attacks steps and lateral movements, and trying to stay undetected for long time. Classical security solutions that rely on signature-based detection can be easily thwarted by malware using obfuscation and encryption techniques. More recent solutions are using machine learning approaches for detecting outliers. Nevertheless, the majority of them reason on tabular unstructured data which can lead to missing obvious conclusions. We propose in this paper a novel approach that leverages a combination of both knowledge graphs and machine learning techniques to detect and predict attacks. Using Cyber Threat Intelligence (CTI), we built a knowledge graph that processes event logs in order to not only detect attack techniques, but also learn how to predict them.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114538747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Arabic Multi-Topic Labelling using Bidirectional Long Short-Term Memory 利用双向长短期记忆的阿拉伯语多主题标注
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464581
Sireen Abuqran
The number of text documents on the internet is rapidly increasing. As a result, there is a growing demand for methods that can automatically organize and identify electronic documents (instances). The multi-label classification task has been used in a variety of applications and is commonly used in real-world problems. It simultaneously assigns multiple labels to each text. In the Arabic language, there have been few and inadequate research studies on the multi-label text classification issue. In this paper, I proposed a deep learning model using bidirectional long short-term memory (BiLSTM) for multi-class topic classification using Mowjaz Multi-Topic Labelling Task dataset. The BiLSTM model consists of 4 layers only which can be considered as light weight model, these layers are input layer, bidirectional LSTM layer, and two dense layers. The results show that the model successfully to classify topics with F1-Socre of 0.8089 on the testing dataset.
互联网上的文本文档数量正在迅速增加。因此,对能够自动组织和识别电子文档(实例)的方法的需求不断增长。多标签分类任务已经在各种应用程序中使用,并且通常用于实际问题。它同时为每个文本分配多个标签。在阿拉伯文中,对多标签文本分类问题的研究很少,研究也不充分。在本文中,我提出了一种基于双向长短期记忆(BiLSTM)的深度学习模型,该模型使用Mowjaz多主题标记任务数据集进行多类主题分类。BiLSTM模型仅由4层组成,可以认为是轻量级模型,这4层分别是输入层、双向LSTM层和两个致密层。结果表明,该模型在测试数据集上成功分类了f1 - score为0.8089的主题。
{"title":"Arabic Multi-Topic Labelling using Bidirectional Long Short-Term Memory","authors":"Sireen Abuqran","doi":"10.1109/ICICS52457.2021.9464581","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464581","url":null,"abstract":"The number of text documents on the internet is rapidly increasing. As a result, there is a growing demand for methods that can automatically organize and identify electronic documents (instances). The multi-label classification task has been used in a variety of applications and is commonly used in real-world problems. It simultaneously assigns multiple labels to each text. In the Arabic language, there have been few and inadequate research studies on the multi-label text classification issue. In this paper, I proposed a deep learning model using bidirectional long short-term memory (BiLSTM) for multi-class topic classification using Mowjaz Multi-Topic Labelling Task dataset. The BiLSTM model consists of 4 layers only which can be considered as light weight model, these layers are input layer, bidirectional LSTM layer, and two dense layers. The results show that the model successfully to classify topics with F1-Socre of 0.8089 on the testing dataset.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114977027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SEFlowViz: A Visualization Tool for SELinux Policy Analysis SEFlowViz: SELinux策略分析的可视化工具
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464541
Karan Singh, R. B. S., R. Shyamasundar
SELinux policies used in practice are generally large and complex. As a result, it is difficult for the policy writers to completely understand the policy and ensure that the policy meets the intended security goals. To remedy this, we have developed a tool called SEFlowViz that helps in visualizing the information flows of a policy and thereby helps in creating flow-secure policies. The tool uses the graph database Neo4j to visualize the policy. Along with visualization, the tool also supports extracting various information regarding the policy and its components through queries. Furthermore, the tool also supports the addition and deletion of rules which is useful in converting inconsistent policies into consistent policies.
在实践中使用的SELinux策略通常是大型和复杂的。因此,策略编写者很难完全理解策略并确保策略满足预期的安全目标。为了解决这个问题,我们开发了一个名为SEFlowViz的工具,它有助于将策略的信息流可视化,从而有助于创建流安全策略。该工具使用图形数据库Neo4j来可视化策略。除了可视化之外,该工具还支持通过查询提取关于策略及其组件的各种信息。此外,该工具还支持添加和删除规则,这有助于将不一致的策略转换为一致的策略。
{"title":"SEFlowViz: A Visualization Tool for SELinux Policy Analysis","authors":"Karan Singh, R. B. S., R. Shyamasundar","doi":"10.1109/ICICS52457.2021.9464541","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464541","url":null,"abstract":"SELinux policies used in practice are generally large and complex. As a result, it is difficult for the policy writers to completely understand the policy and ensure that the policy meets the intended security goals. To remedy this, we have developed a tool called SEFlowViz that helps in visualizing the information flows of a policy and thereby helps in creating flow-secure policies. The tool uses the graph database Neo4j to visualize the policy. Along with visualization, the tool also supports extracting various information regarding the policy and its components through queries. Furthermore, the tool also supports the addition and deletion of rules which is useful in converting inconsistent policies into consistent policies.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cash for the Register? Capturing Rationales of Early COVID-19 Domain Registrations at Internet-scale 现金入帐?捕获互联网规模的早期COVID-19域名注册的基本原理
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464572
Stijn Pletinckx, G. Jansen, A. Brussen, R. van Wegberg
The COVID-19 pandemic introduced novel incentives for adversaries to exploit the state of turmoil. As we have witnessed with the increase in for instance phishing attacks and domain name registrations piggybacking the COVID-19 brand name. In this paper, we perform an analysis at Internet-scale of COVID-19 domain name registrations during the early stages of the virus’ spread, and investigate the rationales behind them. We leverage the DomainTools COVID-19 Threat List and additional measurements to analyze over 150,000 domains registered between January 1st 2020 and May 1st 2020. We identify two key rationales for covid-related domain registrations. Online marketing, by either redirecting traffic or hosting a commercial service on the domain, and domain parking, by registering domains containing popular COVID-19 keywords, presumably anticipating a profit when reselling the domain later on. We also highlight three public policy take-aways that can counteract this domain registration behavior.
2019冠状病毒病大流行为对手提供了利用动荡状态的新动机。正如我们所看到的,例如网络钓鱼攻击和以COVID-19品牌命名的域名注册的增加。本文对新冠病毒传播初期的互联网级域名注册情况进行了分析,并探讨了其背后的原因。我们利用DomainTools COVID-19威胁列表和其他测量方法分析了2020年1月1日至2020年5月1日期间注册的150,000多个域名。我们确定了与covid相关的域名注册的两个关键理由。在线营销,通过重定向流量或在域名上托管商业服务,以及域名停放,通过注册包含流行的COVID-19关键字的域名,大概是期望在以后转售域名时获利。我们还强调了可以抵消这种域名注册行为的三个公共政策要点。
{"title":"Cash for the Register? Capturing Rationales of Early COVID-19 Domain Registrations at Internet-scale","authors":"Stijn Pletinckx, G. Jansen, A. Brussen, R. van Wegberg","doi":"10.1109/ICICS52457.2021.9464572","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464572","url":null,"abstract":"The COVID-19 pandemic introduced novel incentives for adversaries to exploit the state of turmoil. As we have witnessed with the increase in for instance phishing attacks and domain name registrations piggybacking the COVID-19 brand name. In this paper, we perform an analysis at Internet-scale of COVID-19 domain name registrations during the early stages of the virus’ spread, and investigate the rationales behind them. We leverage the DomainTools COVID-19 Threat List and additional measurements to analyze over 150,000 domains registered between January 1st 2020 and May 1st 2020. We identify two key rationales for covid-related domain registrations. Online marketing, by either redirecting traffic or hosting a commercial service on the domain, and domain parking, by registering domains containing popular COVID-19 keywords, presumably anticipating a profit when reselling the domain later on. We also highlight three public policy take-aways that can counteract this domain registration behavior.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scalable Arabic text Classification Using Machine Learning Model 使用机器学习模型的可扩展阿拉伯语文本分类
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464566
Rahaf M. AL Mgheed
Recently, with the existence of internet we have witnessed great development in computer systems. Artificial intelligence means to developing computer systems that able to perform intelligent tasks.[1] Machine learning is one method of make such systems. In this paper, using SVM classifier, I build a Multi-label text classification model for Arabic text. This model is basically used to classify articles on their topics. The results show that using SVM classifier on the dataset generated the best results with 82.2% accuracy. The model was build using Python.
最近,随着互联网的存在,我们见证了计算机系统的巨大发展。人工智能意味着开发能够执行智能任务的计算机系统。[1]机器学习是制造这种系统的一种方法。本文利用支持向量机分类器,建立了一个针对阿拉伯语文本的多标签文本分类模型。该模型主要用于根据文章的主题对文章进行分类。结果表明,使用SVM分类器对该数据集进行分类,准确率达到82.2%。该模型是使用Python构建的。
{"title":"Scalable Arabic text Classification Using Machine Learning Model","authors":"Rahaf M. AL Mgheed","doi":"10.1109/ICICS52457.2021.9464566","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464566","url":null,"abstract":"Recently, with the existence of internet we have witnessed great development in computer systems. Artificial intelligence means to developing computer systems that able to perform intelligent tasks.[1] Machine learning is one method of make such systems. In this paper, using SVM classifier, I build a Multi-label text classification model for Arabic text. This model is basically used to classify articles on their topics. The results show that using SVM classifier on the dataset generated the best results with 82.2% accuracy. The model was build using Python.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122489179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image Steganography Scheme Using Dilated Convolutional Network 基于扩展卷积网络的图像隐写方案
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464546
I. Kich, El Bachir Ameur, Y. Taouil, Amine Benhfid
Nowadays, Convolutional Neural Networks (CNN) have allowed us to solve many problems, difficult to solve with classical methods, in different fields of applications. The use of this technique in the field of modern steganography has improved the performance of steganographic schemes in terms of concealability and invisibility. In this article, we propose a system based on CNN in order to hide a color image in another color image of the same size. The proposed system is based on Auto-Encoder network and U-net architecture. The network is subdivided into two sub-networks, the first is for the concealment of the image secret by the sender, the second is for its extraction by the receiver. The network is end to end trained to ensure the integrity of the concealment and extraction process. The tests were performed on challenging images dataset publicly available, such as ImageNet, LFW, PASCAL-VOC12. The results show that the proposed steganographic scheme can hide a color image in another one of the same sizes, i.e. a capacity of 24 bpp, with acceptable PSNR and SSIM values compared to other previous work.
如今,卷积神经网络(CNN)在不同的应用领域已经使我们能够解决许多经典方法难以解决的问题。该技术在现代隐写领域的应用提高了隐写方案的隐蔽性和不可见性。在本文中,我们提出了一个基于CNN的系统,目的是将一个彩色图像隐藏在另一个相同大小的彩色图像中。该系统基于自编码器网络和U-net架构。该网络被细分为两个子网,第一个子网用于发送方对图像秘密的隐藏,第二个子网用于接收方对图像秘密的提取。该网络是端到端的训练,以确保隐藏和提取过程的完整性。在ImageNet、LFW、PASCAL-VOC12等具有挑战性的公开图像数据集上进行测试。结果表明,所提出的隐写方案可以将一幅彩色图像隐藏在另一幅相同大小的彩色图像中,即容量为24bpp,与以往的工作相比,具有可接受的PSNR和SSIM值。
{"title":"Image Steganography Scheme Using Dilated Convolutional Network","authors":"I. Kich, El Bachir Ameur, Y. Taouil, Amine Benhfid","doi":"10.1109/ICICS52457.2021.9464546","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464546","url":null,"abstract":"Nowadays, Convolutional Neural Networks (CNN) have allowed us to solve many problems, difficult to solve with classical methods, in different fields of applications. The use of this technique in the field of modern steganography has improved the performance of steganographic schemes in terms of concealability and invisibility. In this article, we propose a system based on CNN in order to hide a color image in another color image of the same size. The proposed system is based on Auto-Encoder network and U-net architecture. The network is subdivided into two sub-networks, the first is for the concealment of the image secret by the sender, the second is for its extraction by the receiver. The network is end to end trained to ensure the integrity of the concealment and extraction process. The tests were performed on challenging images dataset publicly available, such as ImageNet, LFW, PASCAL-VOC12. The results show that the proposed steganographic scheme can hide a color image in another one of the same sizes, i.e. a capacity of 24 bpp, with acceptable PSNR and SSIM values compared to other previous work.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120960027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction Alzheimer's disease from MRI images using deep learning 利用深度学习从核磁共振成像图像预测阿尔茨海默病
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464543
Esraa Mggdadi, Ahmad Al-Aiad, M. Al-Ayyad, Alaa Darabseh
Alzheimer's is one of the diseases that are the most publicized type of dementia. Alzheimer's disease will be born every 3 second the world. Previous research shows that early prediction of AD in the medical field for reduced cost of treatment and time of it. To this end, construct an efficient prediction system for AD, which is the goal of this paper, often reduces time to treatment, medical errors, and overall healthcare cost. We used Deep Learning to predict and diagnose AD and for this reason using python code in Colaboratory as platform environments. In particular, we used 2D CNN and vgg16 to achieve the research goal, we used experiments conducted on MRI images from Kaggle dataset. Our experiment achieved accuracy of 67.5% for 2D CNN algorithm, while the vgg16 algorithm achieved accuracy of 70.3%. We conclude by showing that deep learning can improve the prediction AD and using algorithm vgg16 is better than 2D CNN.
阿尔茨海默氏症是最广为人知的痴呆症之一。全世界每三秒钟就会有一个阿尔茨海默氏症患者出生。以往的研究表明,医学领域对AD的早期预测可以降低治疗成本和时间。为此,构建一个有效的AD预测系统,这是本文的目标,往往减少治疗时间,医疗差错,和整体医疗成本。我们使用深度学习来预测和诊断AD,因此在协作实验室中使用python代码作为平台环境。特别是,我们使用2D CNN和vgg16来实现研究目标,我们使用来自Kaggle数据集的MRI图像进行实验。在我们的实验中,2D CNN算法的准确率为67.5%,而vgg16算法的准确率为70.3%。我们的结论是,深度学习可以提高预测AD,并且使用vgg16算法优于2D CNN。
{"title":"Prediction Alzheimer's disease from MRI images using deep learning","authors":"Esraa Mggdadi, Ahmad Al-Aiad, M. Al-Ayyad, Alaa Darabseh","doi":"10.1109/ICICS52457.2021.9464543","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464543","url":null,"abstract":"Alzheimer's is one of the diseases that are the most publicized type of dementia. Alzheimer's disease will be born every 3 second the world. Previous research shows that early prediction of AD in the medical field for reduced cost of treatment and time of it. To this end, construct an efficient prediction system for AD, which is the goal of this paper, often reduces time to treatment, medical errors, and overall healthcare cost. We used Deep Learning to predict and diagnose AD and for this reason using python code in Colaboratory as platform environments. In particular, we used 2D CNN and vgg16 to achieve the research goal, we used experiments conducted on MRI images from Kaggle dataset. Our experiment achieved accuracy of 67.5% for 2D CNN algorithm, while the vgg16 algorithm achieved accuracy of 70.3%. We conclude by showing that deep learning can improve the prediction AD and using algorithm vgg16 is better than 2D CNN.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"46 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132134717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using Machine Learning Algorithms to Predict the State of Financial Inclusion in Africa 使用机器学习算法预测非洲的金融包容性状况
Pub Date : 2021-05-24 DOI: 10.1109/ICICS52457.2021.9464590
Qusai Ismail, Eslam Al-Sobh, Sarah Al-Omari, Tuqa M. Bani Yaseen, Malak Abdullah
The financial economy in Africa faces significant challenges that affect development and livelihood. One of these challenges is holding a bank account in Africa, indicating the person’s stable economic status. There is a need to solve bank problems in Africa and find solutions to the banking problems. Studies on this topic consider the enormous number of people who do not have a bank account compared to those who have and how this contributes to the decline of Africa’s economy. Therefore, in this research, we have implemented effective mechanisms using machine learning techniques to predict who owns a bank account and who is not in African banks. We used different machine learning algorithms, such as SVM, Naive Bays, Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Bagging, AdaBoosting, Voting Ensemble, KNN, Stack, and XGBoosting Classifiers. We have experimented with these techniques on a public dataset obtained from African banks (publically available on Zindi) to predict whether a person has a bank account or not. We used the Holdout cross-validation method to split the training dataset randomly to train and validation. The results show that the XGBoost model has a superior accuracy score of 89.23%. This paper provides a comprehensive comparison for all mentioned models, which we used to perform our study.
非洲金融经济面临重大挑战,影响发展和民生。其中一项挑战是在非洲拥有银行账户,这表明该人的经济地位稳定。有必要解决非洲的银行问题,并找到解决银行问题的办法。关于这一主题的研究考虑了大量没有银行账户的人与拥有银行账户的人的比较,以及这对非洲经济衰退的影响。因此,在这项研究中,我们使用机器学习技术实现了有效的机制来预测谁拥有银行账户,谁不在非洲银行。我们使用了不同的机器学习算法,如SVM、朴素贝叶斯、逻辑回归、决策树、随机森林、梯度增强、Bagging、AdaBoosting、投票集合、KNN、Stack和XGBoosting分类器。我们在一个从非洲银行获得的公共数据集(在Zindi上公开)上试验了这些技术,以预测一个人是否有银行账户。我们使用Holdout交叉验证方法对训练数据集进行随机分割,进行训练和验证。结果表明,XGBoost模型的准确率达到89.23%。本文对上述所有模型进行了全面的比较,我们使用这些模型进行了研究。
{"title":"Using Machine Learning Algorithms to Predict the State of Financial Inclusion in Africa","authors":"Qusai Ismail, Eslam Al-Sobh, Sarah Al-Omari, Tuqa M. Bani Yaseen, Malak Abdullah","doi":"10.1109/ICICS52457.2021.9464590","DOIUrl":"https://doi.org/10.1109/ICICS52457.2021.9464590","url":null,"abstract":"The financial economy in Africa faces significant challenges that affect development and livelihood. One of these challenges is holding a bank account in Africa, indicating the person’s stable economic status. There is a need to solve bank problems in Africa and find solutions to the banking problems. Studies on this topic consider the enormous number of people who do not have a bank account compared to those who have and how this contributes to the decline of Africa’s economy. Therefore, in this research, we have implemented effective mechanisms using machine learning techniques to predict who owns a bank account and who is not in African banks. We used different machine learning algorithms, such as SVM, Naive Bays, Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Bagging, AdaBoosting, Voting Ensemble, KNN, Stack, and XGBoosting Classifiers. We have experimented with these techniques on a public dataset obtained from African banks (publically available on Zindi) to predict whether a person has a bank account or not. We used the Holdout cross-validation method to split the training dataset randomly to train and validation. The results show that the XGBoost model has a superior accuracy score of 89.23%. This paper provides a comprehensive comparison for all mentioned models, which we used to perform our study.","PeriodicalId":421803,"journal":{"name":"2021 12th International Conference on Information and Communication Systems (ICICS)","volume":"2 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 12th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1