首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning 基于信息物理融合和深度学习的网络通信信息安全保障
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-26 DOI: 10.4018/ijdcf.332858
Shi Cheng, Yan Qu, Chuyue Wang, Jie Wan
The internet brings high efficiency and convenience to society; however, the issue of information security in network communication has significantly affected every aspect of the society. How to ensure the security of this network communication information has become an important research topic. This paper proposes a diagnosis and prediction method based on cyber-physical fusion and deep learning, such as LSTM and CNN, to diagnose and predict network security in a complex network environment. The experiment results showed that the accuracy of network security diagnosis of the LSTM method in the training set was approximately 80%/ After the CNN training process, it has the highest accuracy rate of 95% on the test data set. This paper analysed the nature of network security problems from the perspective of cyber-physical fusion. CNN-based method to diagnose network security can obtain results with a higher accuracy rate so that technicians can better take measures to protect network security.
互联网给社会带来了高效率和便利性;然而,网络通信中的信息安全问题已经严重影响到社会的各个方面。如何保证这种网络通信信息的安全已成为一个重要的研究课题。本文提出了一种基于信息物理融合和深度学习的LSTM、CNN等诊断与预测方法,用于复杂网络环境下的网络安全诊断与预测。实验结果表明,LSTM方法在训练集上的网络安全诊断准确率约为80%/经过CNN训练过程后,在测试数据集上准确率最高,达到95%。本文从信息物理融合的角度分析了网络安全问题的本质。基于cnn的网络安全诊断方法可以获得准确率更高的结果,以便技术人员更好地采取措施保护网络安全。
{"title":"Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning","authors":"Shi Cheng, Yan Qu, Chuyue Wang, Jie Wan","doi":"10.4018/ijdcf.332858","DOIUrl":"https://doi.org/10.4018/ijdcf.332858","url":null,"abstract":"The internet brings high efficiency and convenience to society; however, the issue of information security in network communication has significantly affected every aspect of the society. How to ensure the security of this network communication information has become an important research topic. This paper proposes a diagnosis and prediction method based on cyber-physical fusion and deep learning, such as LSTM and CNN, to diagnose and predict network security in a complex network environment. The experiment results showed that the accuracy of network security diagnosis of the LSTM method in the training set was approximately 80%/ After the CNN training process, it has the highest accuracy rate of 95% on the test data set. This paper analysed the nature of network security problems from the perspective of cyber-physical fusion. CNN-based method to diagnose network security can obtain results with a higher accuracy rate so that technicians can better take measures to protect network security.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135013624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network 基于图神经网络的无人机边缘缓存内容推荐算法
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-25 DOI: 10.4018/ijdcf.332774
Wei Wang, Longxing Xing, Na Xu, Jiatao Su, Wenting Su, Jiarong Cao
When responding to emergencies such as sudden natural disasters, communication networks face challenges such as network traffic surge and complex geographic environments. Aiming at the problems of high transmission delay and insensitivity to user's preference in the current UAV edge caching strategy, this paper proposes a UAV caching content recommendation algorithm based on graph neural network. Firstly, the location of UAV is determined by clustering algorithm; secondly, the interest preferences of user nodes in the cluster are predicted by GCLRSAN model, and the UAV cache content is designed according to the result; finally, simulation experiments show that the model and algorithm proposed in this paper can effectively reduce the backhaul link overhead and outperform the comparison algorithms in the indexes such as accuracy rate, recall rate, cache hit rate, and transmission delay.
在应对突发性自然灾害等突发事件时,通信网络面临着网络流量激增、地理环境复杂等挑战。针对当前无人机边缘缓存策略存在传输时延高、对用户偏好不敏感等问题,提出了一种基于图神经网络的无人机缓存内容推荐算法。首先,采用聚类算法确定无人机的位置;其次,利用GCLRSAN模型预测集群中用户节点的兴趣偏好,并根据预测结果设计无人机缓存内容;最后,仿真实验表明,本文提出的模型和算法能够有效降低回程链路开销,并在准确率、召回率、缓存命中率和传输延迟等指标上优于比较算法。
{"title":"UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network","authors":"Wei Wang, Longxing Xing, Na Xu, Jiatao Su, Wenting Su, Jiarong Cao","doi":"10.4018/ijdcf.332774","DOIUrl":"https://doi.org/10.4018/ijdcf.332774","url":null,"abstract":"When responding to emergencies such as sudden natural disasters, communication networks face challenges such as network traffic surge and complex geographic environments. Aiming at the problems of high transmission delay and insensitivity to user's preference in the current UAV edge caching strategy, this paper proposes a UAV caching content recommendation algorithm based on graph neural network. Firstly, the location of UAV is determined by clustering algorithm; secondly, the interest preferences of user nodes in the cluster are predicted by GCLRSAN model, and the UAV cache content is designed according to the result; finally, simulation experiments show that the model and algorithm proposed in this paper can effectively reduce the backhaul link overhead and outperform the comparison algorithms in the indexes such as accuracy rate, recall rate, cache hit rate, and transmission delay.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"5 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135168052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task Offloading in Cloud-Edge Environments 云边缘环境下的任务卸载
Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-12 DOI: 10.4018/ijdcf.332066
Suzhen Wang, Yongchen Deng, Zhongbo Hu
Cloud computing involves transferring data to remote data centers for processing, which consumes significant network bandwidth and transmission time. Edge computing can effectively address this issue by processing tasks at edge nodes, thereby reducing the amount of data transmitted and enhancing the utilization of network bandwidth. This paper investigates intelligent task offloading under the three-layer architecture of cloud-edge-device to fully exploit the cloud-edge collaboration potential. Specifically, an optimization objective function is constructed by modelling the processing cost of all computing tasks. Additionally, asynchronous advantage actor-critic (A3C) algorithm is proposed under cloud-edge collaboration to solve the optimization problem of minimizing the sum of the weights of task offloading delay and energy consumption. Experimental results indicate that the algorithm can effectively utilize the computing resources of the cloud center, reduce task execution delay and energy consumption, and compare favourably with three existing task offloading methods.
云计算需要将数据传输到远程数据中心进行处理,这将消耗大量的网络带宽和传输时间。边缘计算可以通过在边缘节点处理任务来有效解决这一问题,从而减少数据传输量,提高网络带宽利用率。本文研究了云边缘设备三层架构下的智能任务卸载,以充分挖掘云边缘协作潜力。具体而言,通过对所有计算任务的处理成本建模,构建了优化目标函数。此外,在云边缘协同下,提出了异步优势actor-critic (A3C)算法,解决了任务卸载延迟和能耗权重之和最小的优化问题。实验结果表明,该算法能够有效利用云中心的计算资源,降低任务执行延迟和能耗,并与现有的三种任务卸载方法进行了比较。
{"title":"Task Offloading in Cloud-Edge Environments","authors":"Suzhen Wang, Yongchen Deng, Zhongbo Hu","doi":"10.4018/ijdcf.332066","DOIUrl":"https://doi.org/10.4018/ijdcf.332066","url":null,"abstract":"Cloud computing involves transferring data to remote data centers for processing, which consumes significant network bandwidth and transmission time. Edge computing can effectively address this issue by processing tasks at edge nodes, thereby reducing the amount of data transmitted and enhancing the utilization of network bandwidth. This paper investigates intelligent task offloading under the three-layer architecture of cloud-edge-device to fully exploit the cloud-edge collaboration potential. Specifically, an optimization objective function is constructed by modelling the processing cost of all computing tasks. Additionally, asynchronous advantage actor-critic (A3C) algorithm is proposed under cloud-edge collaboration to solve the optimization problem of minimizing the sum of the weights of task offloading delay and energy consumption. Experimental results indicate that the algorithm can effectively utilize the computing resources of the cloud center, reduce task execution delay and energy consumption, and compare favourably with three existing task offloading methods.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136013668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MD-S3C3 MD-S3C3
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-08-29 DOI: 10.4018/ijdcf.329219
Heng Pan, Yaoyao Zhang, Jianmei Liu, Xueming Si, Zhongyuan Yao, Liang Zhao
In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control over their data, privacy disclosure, and difficulties in tracking data sharing. This aarticle proposes a cooperation model of cloud and chain (CMCC) for the secure sharing of medical data. In the CMCC, the power equivalence of blockchain nodes limits the control authority asymmetry between doctors and patients in medical data sharing. Moreover, a cloud server is used to store medical data, and some of the node-side computations are handed over to the cloud, which addresses the asymmetric computing capability asymmetry between the cloud and ordinary nodes. Based on the CMCC, a secure medical data sharing scheme based on proxy re-encryption mechanism is proposed. This scheme realizes secure medical data sharing, especially the patient's complete control of the data. The security and performance analysis show that the proposed scheme outperforms the existing ones.
在医疗数据共享中,共享实体的数据访问控制权限和共享平台的计算能力是不对称的。这种不对称性导致患者对其数据的控制不力、隐私泄露以及跟踪数据共享的困难。本文提出了一种基于云与链的医疗数据安全共享合作模式。在CMCC中,区块链节点的权力对等限制了医疗数据共享中医患之间的控制权限不对称。此外,云服务器用于存储医疗数据,并且一些节点侧计算被移交给云,这解决了云和普通节点之间的不对称计算能力不对称问题。在CMCC的基础上,提出了一种基于代理重加密机制的安全医疗数据共享方案。该方案实现了安全的医疗数据共享,特别是患者对数据的完全控制。安全性和性能分析表明,该方案优于现有方案。
{"title":"MD-S3C3","authors":"Heng Pan, Yaoyao Zhang, Jianmei Liu, Xueming Si, Zhongyuan Yao, Liang Zhao","doi":"10.4018/ijdcf.329219","DOIUrl":"https://doi.org/10.4018/ijdcf.329219","url":null,"abstract":"In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control over their data, privacy disclosure, and difficulties in tracking data sharing. This aarticle proposes a cooperation model of cloud and chain (CMCC) for the secure sharing of medical data. In the CMCC, the power equivalence of blockchain nodes limits the control authority asymmetry between doctors and patients in medical data sharing. Moreover, a cloud server is used to store medical data, and some of the node-side computations are handed over to the cloud, which addresses the asymmetric computing capability asymmetry between the cloud and ordinary nodes. Based on the CMCC, a secure medical data sharing scheme based on proxy re-encryption mechanism is proposed. This scheme realizes secure medical data sharing, especially the patient's complete control of the data. The security and performance analysis show that the proposed scheme outperforms the existing ones.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49139483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Crime Scene Reconstruction for Digital Forensic Analysis 数字法医分析的犯罪现场重建
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-07-31 DOI: 10.4018/ijdcf.327358
Mathew Nicho, Maha Alblooki, Saeed AlMutiwei, Christopher D. McDermott, O. Ilesanmi
The abundance of digital data within modern vehicles makes digital vehicle forensics (DVF) a promising subfield of digital forensics (DF), with significant potential for investigations. In this research, the authors apply DVF methodology to a SUV, simulating a real case by extracting and analyzing the data in the period leading up to an incident to evaluate the effectiveness of DVF in solving crime. The authors employ DVF approach to extract data to reveal evidential information for judicial evaluation and verdict. This data helped determine whether the incident represented an accident or an act of crime. This simulated case and the assumptions supported by the DVF evidence provides a compelling example of how law enforcement agencies can leverage DVF to collect and present evidence to relevant authorities. This form of forensics can assist government in planning for and regulating the deployment of DVF data, the judiciary in assessing the nature and admissibility of evidence, and vehicle manufacturers in complying with the regulations relating to the harvesting and retrieval of data.
现代车辆中丰富的数字数据使数字车辆取证(DVF)成为数字取证(DF)的一个有前途的分支领域,具有巨大的调查潜力。在这项研究中,作者将DVF方法应用于一辆SUV,通过提取和分析事件发生前的数据来模拟真实案例,以评估DVF在解决犯罪方面的有效性。采用DVF方法提取数据,揭示司法评价和判决的证据信息。这些数据有助于确定该事件是意外事故还是犯罪行为。这个模拟案例和DVF证据支持的假设提供了一个令人信服的例子,说明执法机构如何利用DVF收集证据并向有关当局提供证据。这种形式的取证可以帮助政府规划和规范DVF数据的部署,帮助司法机构评估证据的性质和可采性,帮助汽车制造商遵守与收集和检索数据有关的法规。
{"title":"A Crime Scene Reconstruction for Digital Forensic Analysis","authors":"Mathew Nicho, Maha Alblooki, Saeed AlMutiwei, Christopher D. McDermott, O. Ilesanmi","doi":"10.4018/ijdcf.327358","DOIUrl":"https://doi.org/10.4018/ijdcf.327358","url":null,"abstract":"The abundance of digital data within modern vehicles makes digital vehicle forensics (DVF) a promising subfield of digital forensics (DF), with significant potential for investigations. In this research, the authors apply DVF methodology to a SUV, simulating a real case by extracting and analyzing the data in the period leading up to an incident to evaluate the effectiveness of DVF in solving crime. The authors employ DVF approach to extract data to reveal evidential information for judicial evaluation and verdict. This data helped determine whether the incident represented an accident or an act of crime. This simulated case and the assumptions supported by the DVF evidence provides a compelling example of how law enforcement agencies can leverage DVF to collect and present evidence to relevant authorities. This form of forensics can assist government in planning for and regulating the deployment of DVF data, the judiciary in assessing the nature and admissibility of evidence, and vehicle manufacturers in complying with the regulations relating to the harvesting and retrieval of data.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42579618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder 基于深度自动编码器的实验室监控视频异常检索方法
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-07-07 DOI: 10.4018/ijdcf.325224
Dawei Zhang
Aiming at the problem that abnormal behavior is difficult to distinguish from normal behavior, a retrieval method for abnormal behavior of laboratory security surveillance video based on deep automatic encoder is proposed. Firstly, the fuzzy median filtering algorithm is used to reduce the noise of the collected laboratory security surveillance video, and then the YUV spatial chromaticity difference method is used to divide the foreground and background of the video, and the illumination degree in the video is determined. The diagonal model and codebook clustering idea are used to compensate for global and local lighting mutations. Finally, the preprocessed video is input into the mixture model, which is based on the deep automatic encoder and combined with the Gaussian mixture model, and the abnormal behavior retrieval results are output. The experimental results show that the proposed method has good security surveillance video preprocessing effect, large AUC, small error rate of abnormal behavior retrieval, and high operation efficiency.
针对实验室安防监控视频异常行为与正常行为难以区分的问题,提出了一种基于深度自动编码器的实验室安防监控视频异常行为检索方法。首先利用模糊中值滤波算法对采集到的实验室安防监控视频进行降噪处理,然后利用YUV空间色度差法对视频的前景和背景进行分割,确定视频中的照度。对角线模型和码本聚类思想用于补偿全局和局部光照突变。最后,将预处理后的视频输入到基于深度自动编码器并结合高斯混合模型的混合模型中,输出异常行为检索结果。实验结果表明,该方法具有良好的安防监控视频预处理效果,AUC大,异常行为检索错误率小,运行效率高。
{"title":"Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder","authors":"Dawei Zhang","doi":"10.4018/ijdcf.325224","DOIUrl":"https://doi.org/10.4018/ijdcf.325224","url":null,"abstract":"Aiming at the problem that abnormal behavior is difficult to distinguish from normal behavior, a retrieval method for abnormal behavior of laboratory security surveillance video based on deep automatic encoder is proposed. Firstly, the fuzzy median filtering algorithm is used to reduce the noise of the collected laboratory security surveillance video, and then the YUV spatial chromaticity difference method is used to divide the foreground and background of the video, and the illumination degree in the video is determined. The diagonal model and codebook clustering idea are used to compensate for global and local lighting mutations. Finally, the preprocessed video is input into the mixture model, which is based on the deep automatic encoder and combined with the Gaussian mixture model, and the abnormal behavior retrieval results are output. The experimental results show that the proposed method has good security surveillance video preprocessing effect, large AUC, small error rate of abnormal behavior retrieval, and high operation efficiency.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42831407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree 基于动态抽象语法树的代码自动生成度量
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-06-27 DOI: 10.4018/ijdcf.325062
Wenjun Yao, Ying Jiang, Yang Yang
In order to improve the efficiency and quality of software development, automatic code generation technology is the current focus. The quality of the code generated by the automatic code generation technology is also an important issue. However, existing metrics for code automatic generation ignore that the programming process is a continuous dynamic changeable process. So the metric is a dynamic process. This article proposes a metric method based on dynamic abstract syntax tree (DAST). More specifically, the method first builds a DAST through the interaction in behavior information between the automatic code generation tool and programmer. Then the measurement contents are extracted on the DAST. Finally, the metric is completed with contents extracted. The experiment results show that the method can effectively realize the metrics of automatic code generation. Compared with the MAST method, the method in this article can improve the convergence speed by 80% when training the model, and can shorten the time-consuming by an average of 46% when doing the metric prediction.
为了提高软件开发的效率和质量,代码自动生成技术是当前的重点。由自动代码生成技术生成的代码的质量也是一个重要问题。然而,现有的代码自动生成度量忽略了编程过程是一个连续的动态可变过程。因此,度量是一个动态过程。本文提出了一种基于动态抽象语法树(DAST)的度量方法。更具体地说,该方法首先通过自动代码生成工具和程序员之间的行为信息交互来构建DAST。然后在DAST上提取测量内容。最后,通过提取内容来完成度量。实验结果表明,该方法能够有效地实现代码自动生成的度量。与MAST方法相比,本文的方法在训练模型时可以将收敛速度提高80%,在进行度量预测时可以平均缩短46%的时间。
{"title":"The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree","authors":"Wenjun Yao, Ying Jiang, Yang Yang","doi":"10.4018/ijdcf.325062","DOIUrl":"https://doi.org/10.4018/ijdcf.325062","url":null,"abstract":"In order to improve the efficiency and quality of software development, automatic code generation technology is the current focus. The quality of the code generated by the automatic code generation technology is also an important issue. However, existing metrics for code automatic generation ignore that the programming process is a continuous dynamic changeable process. So the metric is a dynamic process. This article proposes a metric method based on dynamic abstract syntax tree (DAST). More specifically, the method first builds a DAST through the interaction in behavior information between the automatic code generation tool and programmer. Then the measurement contents are extracted on the DAST. Finally, the metric is completed with contents extracted. The experiment results show that the method can effectively realize the metrics of automatic code generation. Compared with the MAST method, the method in this article can improve the convergence speed by 80% when training the model, and can shorten the time-consuming by an average of 46% when doing the metric prediction.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43006709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latest Trends in Deep Learning Techniques for Image Steganography 用于图像隐写的深度学习技术的最新趋势
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-02-24 DOI: 10.4018/ijdcf.318666
Vijay Kumar, Sahil Sharma, Chandan Kumar, A. Sahu
The development of deep convolutional neural networks has been largely responsible for the significant strides forward made in steganography over the past decade. In the field of image steganography, generative adversarial networks (GAN) are becoming increasingly popular. This study describes current development in image steganographic systems based on deep learning. The authors' goal is to lay out the various works that have been done in image steganography using deep learning techniques and provide some notes on the various methods. This study proposed a result that could open up some new avenues for future research in deep learning based on image steganographic methods. These new avenues could be explored in the future. Moreover, the pros and cons of current methods are laid out with several promising directions to define problems that researchers can work on in future research avenues.
深度卷积神经网络的发展在很大程度上是过去十年隐写术取得重大进展的原因。在图像隐写术领域,生成对抗性网络(GAN)越来越受欢迎。本研究描述了基于深度学习的图像隐写系统的发展现状。作者的目标是介绍使用深度学习技术在图像隐写术中所做的各种工作,并对各种方法进行一些说明。这项研究提出了一个结果,可以为未来基于图像隐写方法的深度学习研究开辟一些新的途径。今后可以探索这些新途径。此外,还列出了当前方法的优缺点,并提出了几个有希望的方向,以确定研究人员在未来研究途径中可以解决的问题。
{"title":"Latest Trends in Deep Learning Techniques for Image Steganography","authors":"Vijay Kumar, Sahil Sharma, Chandan Kumar, A. Sahu","doi":"10.4018/ijdcf.318666","DOIUrl":"https://doi.org/10.4018/ijdcf.318666","url":null,"abstract":"The development of deep convolutional neural networks has been largely responsible for the significant strides forward made in steganography over the past decade. In the field of image steganography, generative adversarial networks (GAN) are becoming increasingly popular. This study describes current development in image steganographic systems based on deep learning. The authors' goal is to lay out the various works that have been done in image steganography using deep learning techniques and provide some notes on the various methods. This study proposed a result that could open up some new avenues for future research in deep learning based on image steganographic methods. These new avenues could be explored in the future. Moreover, the pros and cons of current methods are laid out with several promising directions to define problems that researchers can work on in future research avenues.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48569718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology 基于脆弱性生命周期的关键节点识别及网络拓扑的重要性
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-20 DOI: 10.4018/ijdcf.317100
Yuwen Zhu, Lei Yu
The key network node identification technology plays an important role in comprehending unknown terrains and rapid action planning in network attack and defense confrontation. The conventional key node identification algorithm only takes one type of relationship into consideration; therefore, it is incapable of representing the characteristics of multiple relationships between nodes. Additionally, it typically disregards the periodic change law of network node vulnerability over time. In order to solve the above problems, this paper proposes a network key node identification method based on the vulnerability life cycle and the significance of the network topology. Based on the CVSS score, this paper proposes the calculation method of the vulnerability life cycle risk value, and identifies the key nodes of the network based on the importance of the network topology. Finally, it demonstrates the effectiveness of the method in the selection of key nodes through network instance analysis.
关键网络节点识别技术在网络攻防对抗中对未知地形的理解和快速行动规划起着重要作用。传统的关键节点识别算法只考虑一种类型的关系;因此,它不能表示节点之间的多个关系的特征。此外,它通常忽略了网络节点漏洞随时间的周期性变化规律。为了解决上述问题,本文提出了一种基于脆弱性生命周期和网络拓扑意义的网络关键节点识别方法。基于CVSS评分,提出了脆弱性生命周期风险值的计算方法,并根据网络拓扑的重要性确定了网络的关键节点。最后,通过网络实例分析,验证了该方法在关键节点选择方面的有效性。
{"title":"Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology","authors":"Yuwen Zhu, Lei Yu","doi":"10.4018/ijdcf.317100","DOIUrl":"https://doi.org/10.4018/ijdcf.317100","url":null,"abstract":"The key network node identification technology plays an important role in comprehending unknown terrains and rapid action planning in network attack and defense confrontation. The conventional key node identification algorithm only takes one type of relationship into consideration; therefore, it is incapable of representing the characteristics of multiple relationships between nodes. Additionally, it typically disregards the periodic change law of network node vulnerability over time. In order to solve the above problems, this paper proposes a network key node identification method based on the vulnerability life cycle and the significance of the network topology. Based on the CVSS score, this paper proposes the calculation method of the vulnerability life cycle risk value, and identifies the key nodes of the network based on the importance of the network topology. Finally, it demonstrates the effectiveness of the method in the selection of key nodes through network instance analysis.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48131380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Identity Verification Software Based on Deep Learning 基于深度学习的身份验证软件的设计与实现
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-30 DOI: 10.4018/ijdcf.315796
Runde Yu, Xianwei Zhang, Yimeng Zhang, Jianfeng Song, Kang Liu, Q. Miao
Identity verification, a noncontact biometric identification technology, has important scientific significance in theoretical research and shows great practical value in national security, public safety, and finance. In view of this situation, this paper designs an identity verification software based on deep learning, which has been successfully applied to real-world applications. The central idea of the software can be summarized as follows: First, the lightweight multi-task cascaded convolutional network (MTCNN), which can learn correlations between face detection and alignment, is employed for face detection. The software then conducts face recognition with MobileFaceNet which is an efficient and lightweight neural network, reducing the hardware cost. The test results show that the software meets the design requirements and can complete the corresponding identity confirmation function.
身份验证作为一种非接触式的生物特征识别技术,在理论研究上具有重要的科学意义,在国家安全、公共安全、金融等领域具有重要的实用价值。针对这种情况,本文设计了一种基于深度学习的身份验证软件,并成功应用于实际应用。该软件的核心思想可以概括如下:首先,将轻量级多任务级联卷积网络(MTCNN)用于人脸检测,该网络可以学习人脸检测与对齐之间的相关性。该软件利用MobileFaceNet进行人脸识别,MobileFaceNet是一种高效、轻量级的神经网络,降低了硬件成本。测试结果表明,该软件满足设计要求,能够完成相应的身份确认功能。
{"title":"Design and Implementation of Identity Verification Software Based on Deep Learning","authors":"Runde Yu, Xianwei Zhang, Yimeng Zhang, Jianfeng Song, Kang Liu, Q. Miao","doi":"10.4018/ijdcf.315796","DOIUrl":"https://doi.org/10.4018/ijdcf.315796","url":null,"abstract":"Identity verification, a noncontact biometric identification technology, has important scientific significance in theoretical research and shows great practical value in national security, public safety, and finance. In view of this situation, this paper designs an identity verification software based on deep learning, which has been successfully applied to real-world applications. The central idea of the software can be summarized as follows: First, the lightweight multi-task cascaded convolutional network (MTCNN), which can learn correlations between face detection and alignment, is employed for face detection. The software then conducts face recognition with MobileFaceNet which is an efficient and lightweight neural network, reducing the hardware cost. The test results show that the software meets the design requirements and can complete the corresponding identity confirmation function.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"408 1","pages":"1-15"},"PeriodicalIF":0.7,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78014899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1