首页 > 最新文献

2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)最新文献

英文 中文
CANAL - Cyber Activity News Alerting Language Model : Empirical Approach vs. Expensive LLMs CANAL - 网络活动新闻预警语言模型:经验方法与昂贵的 LLMs 比较
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433839
Urjitkumar Patel, Fang-Chun Yeh, Chinmay Gondhalekar
In today’s digital landscape, where cyber attacks have become the norm, the detection of cyber attacks and threats is critically imperative across diverse domains. Our research presents a new empirical framework for cyber threat modeling, adept at parsing and categorizing cyber-related information from news articles, enhancing real-time vigilance for market stakeholders. At the core of this framework is a fine-tuned BERT model, which we call CANAL - Cyber Activity News Alerting Language Model, tailored for cyber categorization using a novel silver labeling approach powered by Random Forest. We benchmark CANAL against larger, costlier LLMs, including GPT-4, LLaMA, and Zephyr, highlighting their zero to few-shot learning in cyber news classification. CANAL demonstrates superior performance by outperforming all other LLM counterparts in both accuracy and cost-effectiveness. Furthermore, we introduce the Cyber Signal Discovery module, a strategic component designed to efficiently detect emerging cyber signals from news articles. Collectively, CANAL and Cyber Signal Discovery module equip our framework to provide a robust and cost-effective solution for businesses that require agile responses to cyber intelligence.
在当今的数字环境中,网络攻击已成为常态,因此在不同领域检测网络攻击和威胁至关重要。我们的研究为网络威胁建模提出了一个新的经验框架,该框架善于解析和分类新闻报道中的网络相关信息,提高市场利益相关者的实时警惕性。该框架的核心是一个经过微调的 BERT 模型,我们称之为 CANAL - 网络活动新闻预警语言模型,它采用随机森林(Random Forest)驱动的新型银标签方法,专为网络分类量身定制。我们将 CANAL 与更大型、成本更高的 LLM(包括 GPT-4、LLaMA 和 Zephyr)进行比较,突出它们在网络新闻分类中从零到几的学习能力。CANAL 在准确性和成本效益方面都优于所有其他 LLM,表现出了卓越的性能。此外,我们还介绍了网络信号发现模块,这是一个战略性组件,旨在从新闻文章中有效地发现新出现的网络信号。总之,CANAL 和网络信号发现模块使我们的框架能够为需要对网络情报做出敏捷反应的企业提供强大而经济高效的解决方案。
{"title":"CANAL - Cyber Activity News Alerting Language Model : Empirical Approach vs. Expensive LLMs","authors":"Urjitkumar Patel, Fang-Chun Yeh, Chinmay Gondhalekar","doi":"10.1109/ICAIC60265.2024.10433839","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433839","url":null,"abstract":"In today’s digital landscape, where cyber attacks have become the norm, the detection of cyber attacks and threats is critically imperative across diverse domains. Our research presents a new empirical framework for cyber threat modeling, adept at parsing and categorizing cyber-related information from news articles, enhancing real-time vigilance for market stakeholders. At the core of this framework is a fine-tuned BERT model, which we call CANAL - Cyber Activity News Alerting Language Model, tailored for cyber categorization using a novel silver labeling approach powered by Random Forest. We benchmark CANAL against larger, costlier LLMs, including GPT-4, LLaMA, and Zephyr, highlighting their zero to few-shot learning in cyber news classification. CANAL demonstrates superior performance by outperforming all other LLM counterparts in both accuracy and cost-effectiveness. Furthermore, we introduce the Cyber Signal Discovery module, a strategic component designed to efficiently detect emerging cyber signals from news articles. Collectively, CANAL and Cyber Signal Discovery module equip our framework to provide a robust and cost-effective solution for businesses that require agile responses to cyber intelligence.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"24 6","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139895351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video key concept extraction using Convolution Neural Network 利用卷积神经网络提取视频关键概念
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433799
T. H. Sardar, Ruhul Amin Hazarika, Bishwajeet Pandey, Guru Prasad M S, Sk Mahmudul Hassan, Radhakrishna Dodmane, Hardik A. Gohel
Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools to extract significant video information.Methods: The methodology comprises extracting the audio from the video, splitting it into chunks by the size of the pauses, and transcribing the audio using Google's speech recognition. The transcribed text is tokenised to create a summary, sentence and word frequencies are calculated, and the most relevant sentences are selected. The summary quality is assessed using ROUGE criteria, and the most important keywords are extracted from the transcript using RAKE.Findings: Our proposed method successfully extracts key points from video lectures and creates text summaries. Timestamping these key points provides valuable context and facilitates navigation within the lecture. Our method combines video-to-text conversion and text summarisation with timestamping key concepts, offering a novel approach to video lecture analysis. Existing video analysis methods focus on keyword extraction or summarisation, while our method offers a more comprehensive approach. Our timestamped key points provide a unique feature compared to other methods. Our method enhances existing video reports by (i) providing concise summaries of key concepts and (ii) enabling quick access to specific information through timestamps. (iii) Facilitating information retrieval through a searchable index. Further research directions: (i) Improve the accuracy of the multi-stage processing pipeline. (ii) Develop techniques to handle diverse accents and pronunciations. (iii) Explore applications of the proposed method to other video genres and types.Application/Improvements: This approach is practical in giving accurate video summaries, saving viewers time and effort when comprehending the main concepts presented in a video.
目标:这项工作旨在开发一种自动视频摘要方法和时间戳,利用自然语言处理(NLP)工具提取重要的视频信息:方法:该方法包括从视频中提取音频,根据停顿的大小将其分割成若干块,然后使用谷歌语音识别功能转录音频。对转录文本进行标记化以创建摘要,计算句子和单词频率,并选择最相关的句子。使用 ROUGE 标准评估摘要质量,并使用 RAKE.Findings 从转录文本中提取最重要的关键词:我们提出的方法成功地从视频讲座中提取了关键点并创建了文本摘要。为这些关键点添加时间戳可提供有价值的上下文,并方便在讲座中进行导航。我们的方法将视频到文本的转换、文本摘要与关键概念的时间戳相结合,为视频讲座分析提供了一种新方法。现有的视频分析方法侧重于关键字提取或总结,而我们的方法提供了一种更全面的方法。与其他方法相比,我们的时间戳关键点具有独特的功能。我们的方法通过以下方式增强了现有的视频报告:(i) 提供关键概念的简明摘要;(ii) 通过时间戳快速访问特定信息。(iii) 通过可搜索索引促进信息检索。进一步的研究方向:(i) 提高多阶段处理管道的准确性。(ii) 开发处理不同口音和发音的技术。(iii) 探索将建议的方法应用于其他视频流派和类型:这种方法可以提供准确的视频摘要,节省观众理解视频中主要概念的时间和精力。
{"title":"Video key concept extraction using Convolution Neural Network","authors":"T. H. Sardar, Ruhul Amin Hazarika, Bishwajeet Pandey, Guru Prasad M S, Sk Mahmudul Hassan, Radhakrishna Dodmane, Hardik A. Gohel","doi":"10.1109/ICAIC60265.2024.10433799","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433799","url":null,"abstract":"Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools to extract significant video information.Methods: The methodology comprises extracting the audio from the video, splitting it into chunks by the size of the pauses, and transcribing the audio using Google's speech recognition. The transcribed text is tokenised to create a summary, sentence and word frequencies are calculated, and the most relevant sentences are selected. The summary quality is assessed using ROUGE criteria, and the most important keywords are extracted from the transcript using RAKE.Findings: Our proposed method successfully extracts key points from video lectures and creates text summaries. Timestamping these key points provides valuable context and facilitates navigation within the lecture. Our method combines video-to-text conversion and text summarisation with timestamping key concepts, offering a novel approach to video lecture analysis. Existing video analysis methods focus on keyword extraction or summarisation, while our method offers a more comprehensive approach. Our timestamped key points provide a unique feature compared to other methods. Our method enhances existing video reports by (i) providing concise summaries of key concepts and (ii) enabling quick access to specific information through timestamps. (iii) Facilitating information retrieval through a searchable index. Further research directions: (i) Improve the accuracy of the multi-stage processing pipeline. (ii) Develop techniques to handle diverse accents and pronunciations. (iii) Explore applications of the proposed method to other video genres and types.Application/Improvements: This approach is practical in giving accurate video summaries, saving viewers time and effort when comprehending the main concepts presented in a video.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"71 9","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139895517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward robust systems against sensor-based adversarial examples based on the criticalities of sensors. 基于传感器的临界性,开发针对基于传感器的对抗性实例的鲁棒系统。
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433806
Ade Kurniawan, Y. Ohsita, Masayuki Murata
In multi-sensor systems, certain sensors could have vulnerabilities that may be exploited to produce AEs. However, it is difficult to protect all sensor devices, because the risk of the existence of vulnerable sensor devices increases as the number of sensor devices increases. Therefore, we need a method to protect ML models even if a part of the sensors are compromised by the attacker. One approach is to detect the sensors used by the attacks and remove the detected sensors. However, such reactive defense method has limitations. If some critical sensors that are necessary to distinguish required states are compromised by the attacker, we cannot obtain the suitable output. In this paper, we discuss a strategy to make the system robust against AEs proactively. A system with enough redundancy can work after removing the features from the sensors used in the AEs. That is, we need a metric to check if the system has enough redundancy. In this paper, we define groups of sensors that might be compromised by the same attacker, and we propose a metric called criticality that indicates how important each group of sensors are for classification between two classes. Based on the criticality, we can make the system robust against sensor-based AEs by interactively adding sensors so as to decrease the criticality of any groups of sensors for the classes that must be distinguished.
在多传感器系统中,某些传感器可能存在漏洞,可能会被利用来产生 AE。然而,要保护所有传感器设备是很困难的,因为随着传感器设备数量的增加,存在漏洞的传感器设备的风险也会增加。因此,我们需要一种方法来保护 ML 模型,即使部分传感器被攻击者破坏。一种方法是检测攻击所使用的传感器,并移除检测到的传感器。然而,这种被动防御方法有其局限性。如果一些区分所需状态的关键传感器被攻击者破坏,我们就无法获得合适的输出。在本文中,我们讨论了一种使系统主动抵御 AE 的策略。一个具有足够冗余度的系统可以在去除 AE 所用传感器的特征后正常工作。也就是说,我们需要一个指标来检查系统是否有足够的冗余度。在本文中,我们定义了可能会被同一攻击者入侵的传感器组,并提出了一种称为临界度的指标,它表明了每组传感器对于两个类别之间的分类有多重要。根据临界度,我们可以通过交互式添加传感器来降低任何一组传感器对必须区分的类别的临界度,从而使系统对基于传感器的 AE 具有鲁棒性。
{"title":"Toward robust systems against sensor-based adversarial examples based on the criticalities of sensors.","authors":"Ade Kurniawan, Y. Ohsita, Masayuki Murata","doi":"10.1109/ICAIC60265.2024.10433806","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433806","url":null,"abstract":"In multi-sensor systems, certain sensors could have vulnerabilities that may be exploited to produce AEs. However, it is difficult to protect all sensor devices, because the risk of the existence of vulnerable sensor devices increases as the number of sensor devices increases. Therefore, we need a method to protect ML models even if a part of the sensors are compromised by the attacker. One approach is to detect the sensors used by the attacks and remove the detected sensors. However, such reactive defense method has limitations. If some critical sensors that are necessary to distinguish required states are compromised by the attacker, we cannot obtain the suitable output. In this paper, we discuss a strategy to make the system robust against AEs proactively. A system with enough redundancy can work after removing the features from the sensors used in the AEs. That is, we need a metric to check if the system has enough redundancy. In this paper, we define groups of sensors that might be compromised by the same attacker, and we propose a metric called criticality that indicates how important each group of sensors are for classification between two classes. Based on the criticality, we can make the system robust against sensor-based AEs by interactively adding sensors so as to decrease the criticality of any groups of sensors for the classes that must be distinguished.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"26 5","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139895559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Network Intrusion Detection Performance : An Empirical Evaluation Using Extreme Gradient Boosting (XGBoost) with Recursive Feature Elimination 提高网络入侵检测性能:使用极端梯度提升(XGBoost)与递归特征消除的经验评估
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433805
Gerard Shu Fuhnwi, Matthew Revelle, Clemente Izurieta
In cybersecurity, Network Intrusion Detection Systems (NIDS) are essential for identifying and preventing malicious activity within computer networks. Machine learning algorithms have been widely applied to NIDS due to their ability to identify complex patterns and anomalies in network traffic. Improvements in the performance of an IDS can be measured by increasing the Matthew Correlation Coefficient (MCC), the reduction of False Alarm Rates (FARs), and the maintenance of up-to-date signatures of the latest attacks to maintain confidentiality, integrity, and availability of services. Integrating machine learning with feature selection for IDSs can help eliminate less important features until the optimal subset of features is achieved, thus improving the NIDS.In this research, we propose an approach for NIDS using XGBoost, a popular gradient boosting algorithm, with Recursive Feature Elimination (RFE) feature selection. We used the NSL-KDD dataset, a benchmark dataset for evaluating NIDS, for training and testing. Our empirical results show that XGBoost with RFE outperforms other popular machine learning algorithms for NIDS on this dataset, achieving the highest MCC for detecting NSL-KDD dataset attacks of type DoS, Probe, U2R, and R2L and very high classification time.
在网络安全领域,网络入侵检测系统(NIDS)对于识别和预防计算机网络中的恶意活动至关重要。机器学习算法能够识别网络流量中的复杂模式和异常情况,因此被广泛应用于网络入侵检测系统。IDS 性能的改进可以通过提高马修相关系数(MCC)、降低误报率(FAR)以及维护最新攻击的最新签名来衡量,以维护服务的机密性、完整性和可用性。将机器学习与 IDS 的特征选择相结合,有助于剔除不太重要的特征,直到获得最佳特征子集,从而改进 NIDS。在本研究中,我们提出了一种使用 XGBoost(一种流行的梯度提升算法)和递归特征剔除(RFE)特征选择的 NIDS 方法。我们使用评估 NIDS 的基准数据集 NSL-KDD 数据集进行训练和测试。实证结果表明,在该数据集上,采用 RFE 算法的 XGBoost 优于用于 NIDS 的其他流行机器学习算法,在检测 DoS、Probe、U2R 和 R2L 类型的 NSL-KDD 数据集攻击方面获得了最高的 MCC,并且分类时间非常短。
{"title":"Improving Network Intrusion Detection Performance : An Empirical Evaluation Using Extreme Gradient Boosting (XGBoost) with Recursive Feature Elimination","authors":"Gerard Shu Fuhnwi, Matthew Revelle, Clemente Izurieta","doi":"10.1109/ICAIC60265.2024.10433805","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433805","url":null,"abstract":"In cybersecurity, Network Intrusion Detection Systems (NIDS) are essential for identifying and preventing malicious activity within computer networks. Machine learning algorithms have been widely applied to NIDS due to their ability to identify complex patterns and anomalies in network traffic. Improvements in the performance of an IDS can be measured by increasing the Matthew Correlation Coefficient (MCC), the reduction of False Alarm Rates (FARs), and the maintenance of up-to-date signatures of the latest attacks to maintain confidentiality, integrity, and availability of services. Integrating machine learning with feature selection for IDSs can help eliminate less important features until the optimal subset of features is achieved, thus improving the NIDS.In this research, we propose an approach for NIDS using XGBoost, a popular gradient boosting algorithm, with Recursive Feature Elimination (RFE) feature selection. We used the NSL-KDD dataset, a benchmark dataset for evaluating NIDS, for training and testing. Our empirical results show that XGBoost with RFE outperforms other popular machine learning algorithms for NIDS on this dataset, achieving the highest MCC for detecting NSL-KDD dataset attacks of type DoS, Probe, U2R, and R2L and very high classification time.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"259 7","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139896083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link-based Anomaly Detection with Sysmon and Graph Neural Networks 利用 Sysmon 和图神经网络进行基于链接的异常检测
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433846
Charlie Grimshaw, Brian Lachine, Taylor Perkins, Emilie Coote
Anomaly detection is a challenge well-suited to machine learning and in the context of information security, the benefits of unsupervised solutions show significant promise. Recent attention to Graph Neural Networks (GNNs) has provided an innovative approach to learn from attributed graphs. Using a GNN encoder-decoder architecture, anomalous edges between nodes can be detected during the reconstruction phase. The aim of this research is to determine whether an unsupervised GNN model can detect anomalous network connections in a static, attributed network. Network logs were collected from four corporate networks and one artificial network using endpoint monitoring tools. A GNN-based anomaly detection system was designed and employed to score and rank anomalous connections between hosts. The model was validated against four realistic experimental scenarios against the four large corporate networks and the smaller artificial network environment. Although quantitative metrics were affected by factors including the scale of the network, qualitative assessments indicated that anomalies from all scenarios were detected. The false positives across each scenario indicate that this model in its current form is useful as an initial triage, though would require further improvement to become a performant detector. This research serves as a promising step for advancing this methodology in detecting anomalous network connections. Future work to improve results includes narrowing the scope of detection to specific threat types and a further focus on feature engineering and selection.
异常检测是一项非常适合机器学习的挑战,而在信息安全方面,无监督解决方案的优势显示出巨大的前景。最近对图形神经网络(GNN)的关注为从属性图中学习提供了一种创新方法。利用 GNN 编码器-解码器架构,可以在重建阶段检测到节点之间的异常边缘。本研究的目的是确定无监督 GNN 模型能否检测静态归属网络中的异常网络连接。使用端点监控工具从四个企业网络和一个人工网络中收集了网络日志。设计并使用了基于 GNN 的异常检测系统,对主机间的异常连接进行评分和排序。该模型在四个大型企业网络和较小的人工网络环境中的四个真实实验场景中进行了验证。虽然定量指标受到网络规模等因素的影响,但定性评估表明,所有场景中的异常都被检测到了。每个场景中的误报率表明,当前形式的模型可作为初步分流工具,但需要进一步改进才能成为性能良好的检测器。这项研究为推进这种方法检测异常网络连接迈出了可喜的一步。未来改进结果的工作包括将检测范围缩小到特定威胁类型,以及进一步关注特征工程和选择。
{"title":"Link-based Anomaly Detection with Sysmon and Graph Neural Networks","authors":"Charlie Grimshaw, Brian Lachine, Taylor Perkins, Emilie Coote","doi":"10.1109/ICAIC60265.2024.10433846","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433846","url":null,"abstract":"Anomaly detection is a challenge well-suited to machine learning and in the context of information security, the benefits of unsupervised solutions show significant promise. Recent attention to Graph Neural Networks (GNNs) has provided an innovative approach to learn from attributed graphs. Using a GNN encoder-decoder architecture, anomalous edges between nodes can be detected during the reconstruction phase. The aim of this research is to determine whether an unsupervised GNN model can detect anomalous network connections in a static, attributed network. Network logs were collected from four corporate networks and one artificial network using endpoint monitoring tools. A GNN-based anomaly detection system was designed and employed to score and rank anomalous connections between hosts. The model was validated against four realistic experimental scenarios against the four large corporate networks and the smaller artificial network environment. Although quantitative metrics were affected by factors including the scale of the network, qualitative assessments indicated that anomalies from all scenarios were detected. The false positives across each scenario indicate that this model in its current form is useful as an initial triage, though would require further improvement to become a performant detector. This research serves as a promising step for advancing this methodology in detecting anomalous network connections. Future work to improve results includes narrowing the scope of detection to specific threat types and a further focus on feature engineering and selection.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"14 2","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139895373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing Data Imbalance in Plant Disease Recognition through Contrastive Learning 通过对比学习解决植物病害识别中的数据不平衡问题
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433841
Bryan Chung
The following study introduces a novel framework for recognizing plant diseases, tackling the issue of imbalanced datasets, which is prevalent in agriculture, a key sector for many economies. Plant diseases can significantly affect crop quality and yield, making early and accurate detection vital for effective disease management. Traditional Convolutional Neural Networks (CNNs) have shown promise in plant disease recognition but often fall short with non-tomato crops due to class imbalance in datasets. The proposed approach utilizes contrastive learning to train a model on the PlantDoc dataset in a self-supervised manner, allowing it to learn meaningful representations from unlabeled data by maximizing the similarity between images based on disease state rather than species. This method shows a marked improvement in accuracy, achieving 87.42% on the PlantDoc dataset and demonstrating its superiority over existing supervised learning methods. The agnostic nature of the model towards plant species allows for universal application in agriculture, offering a significant tool for disease management and enhancing productivity in both existing farms and future smart farming environments.
农业是许多经济体的关键部门,而不平衡数据集是农业中普遍存在的问题。植物病害会严重影响作物的质量和产量,因此早期准确检测对有效管理病害至关重要。传统的卷积神经网络(CNN)在植物病害识别方面已显示出良好的前景,但由于数据集中的类不平衡,在识别非番茄作物时往往会出现问题。所提出的方法利用对比学习,以自我监督的方式在 PlantDoc 数据集上训练模型,通过最大化基于疾病状态而非物种的图像之间的相似性,使其能够从未标明的数据中学习有意义的表征。这种方法显著提高了准确率,在 PlantDoc 数据集上的准确率达到了 87.42%,证明了它优于现有的监督学习方法。该模型对植物种类的不可知性使其可以普遍应用于农业领域,为现有农场和未来智能农业环境提供了一个重要的疾病管理工具,并提高了生产力。
{"title":"Addressing Data Imbalance in Plant Disease Recognition through Contrastive Learning","authors":"Bryan Chung","doi":"10.1109/ICAIC60265.2024.10433841","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433841","url":null,"abstract":"The following study introduces a novel framework for recognizing plant diseases, tackling the issue of imbalanced datasets, which is prevalent in agriculture, a key sector for many economies. Plant diseases can significantly affect crop quality and yield, making early and accurate detection vital for effective disease management. Traditional Convolutional Neural Networks (CNNs) have shown promise in plant disease recognition but often fall short with non-tomato crops due to class imbalance in datasets. The proposed approach utilizes contrastive learning to train a model on the PlantDoc dataset in a self-supervised manner, allowing it to learn meaningful representations from unlabeled data by maximizing the similarity between images based on disease state rather than species. This method shows a marked improvement in accuracy, achieving 87.42% on the PlantDoc dataset and demonstrating its superiority over existing supervised learning methods. The agnostic nature of the model towards plant species allows for universal application in agriculture, offering a significant tool for disease management and enhancing productivity in both existing farms and future smart farming environments.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"9 4","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139895498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk-Aware Mobile App Security Testing: Safeguarding Sensitive User Inputs 具有风险意识的移动应用程序安全测试:保护敏感的用户输入
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433804
Trishla Shah, Raghav V. Sampangi, Angela Siegel
Over the years, mobile applications have brought about transformative changes in user interactions with digital services. Many of these apps however, are free and offer convenience at the cost of exchanging personal data. This convenience, however, comes with inherent risks to user privacy and security. This paper introduces a comprehensive methodology that evaluates the risks associated with sharing sensitive data through mobile applications. Building upon the Hierarchical Weighted Risk Scoring Model (HWRSM), this paper proposes an evaluation methodology for HWRSM, keeping in mind the implications of such risk scoring on real-world security scenarios. The methodology employs innovative risk scoring, considering various factors to assess potential security vulnerabilities related to sensitive terms. Practical assessments involving diverse set of Android applications, particularly in data-intensive categories, reveal insights into data privacy practices, vulnerabilities, and alignment with HWRSM scores. By offering insights into testing, validation, real-world findings, and model effectiveness, the paper aims to provide practical considerations to mobile application security discussions, facilitating informed approaches to address security and privacy concerns.
多年来,移动应用程序为用户与数字服务的互动带来了变革。然而,这些应用程序中有许多都是免费的,它们以交换个人数据为代价提供便利。然而,这种便利也带来了用户隐私和安全方面的固有风险。本文介绍了一种综合方法,用于评估通过移动应用程序共享敏感数据所带来的风险。在分层加权风险评分模型(HWRSM)的基础上,本文提出了 HWRSM 的评估方法,同时考虑到这种风险评分对现实世界安全场景的影响。该方法采用创新的风险评分法,考虑各种因素来评估与敏感术语相关的潜在安全漏洞。涉及各种 Android 应用程序(尤其是数据密集型类别)的实际评估揭示了数据隐私实践、漏洞以及与 HWRSM 评分的一致性。通过对测试、验证、实际发现和模型有效性的深入分析,本文旨在为移动应用安全讨论提供实用的考虑因素,促进采用知情的方法来解决安全和隐私问题。
{"title":"Risk-Aware Mobile App Security Testing: Safeguarding Sensitive User Inputs","authors":"Trishla Shah, Raghav V. Sampangi, Angela Siegel","doi":"10.1109/ICAIC60265.2024.10433804","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433804","url":null,"abstract":"Over the years, mobile applications have brought about transformative changes in user interactions with digital services. Many of these apps however, are free and offer convenience at the cost of exchanging personal data. This convenience, however, comes with inherent risks to user privacy and security. This paper introduces a comprehensive methodology that evaluates the risks associated with sharing sensitive data through mobile applications. Building upon the Hierarchical Weighted Risk Scoring Model (HWRSM), this paper proposes an evaluation methodology for HWRSM, keeping in mind the implications of such risk scoring on real-world security scenarios. The methodology employs innovative risk scoring, considering various factors to assess potential security vulnerabilities related to sensitive terms. Practical assessments involving diverse set of Android applications, particularly in data-intensive categories, reveal insights into data privacy practices, vulnerabilities, and alignment with HWRSM scores. By offering insights into testing, validation, real-world findings, and model effectiveness, the paper aims to provide practical considerations to mobile application security discussions, facilitating informed approaches to address security and privacy concerns.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"262 6","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139896081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Weak Supervision and BiGRU Neural Networks for Sentiment Analysis on Label-Free News Headlines 利用弱监督和 BiGRU 神经网络对无标签新闻标题进行情感分析
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433844
Ahamadali Jamali, Shahin Alipour, Audrey Rah
Auto-labeling of text is a useful and necessary technique for creating large and high-quality training data sets for machine learning models. Label-free sentiment classification is a challenging semi-supervised task in the natural language processing domain. This study leveraged the weak supervision framework to generate weak labels in three categories for millions of news headlines from Australian Broadcasting Corporation (ABC). A Bidirectional Gate Recurrent Unit (BiGRU) was then trained with neural network dense layers to achieve a validation accuracy of 96.76% with 99.99% accuracy. The performance of this method was also compared with traditional and deep learning natural language processing techniques.
文本自动标记是一种有用且必要的技术,可为机器学习模型创建大量高质量的训练数据集。在自然语言处理领域,无标签情感分类是一项具有挑战性的半监督任务。本研究利用弱监督框架,为澳大利亚广播公司(ABC)的数百万条新闻标题生成三个类别的弱标签。然后用神经网络密集层训练双向门递归单元(BiGRU),使验证准确率达到 96.76%,准确率为 99.99%。该方法的性能还与传统自然语言处理技术和深度学习自然语言处理技术进行了比较。
{"title":"Leveraging Weak Supervision and BiGRU Neural Networks for Sentiment Analysis on Label-Free News Headlines","authors":"Ahamadali Jamali, Shahin Alipour, Audrey Rah","doi":"10.1109/ICAIC60265.2024.10433844","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433844","url":null,"abstract":"Auto-labeling of text is a useful and necessary technique for creating large and high-quality training data sets for machine learning models. Label-free sentiment classification is a challenging semi-supervised task in the natural language processing domain. This study leveraged the weak supervision framework to generate weak labels in three categories for millions of news headlines from Australian Broadcasting Corporation (ABC). A Bidirectional Gate Recurrent Unit (BiGRU) was then trained with neural network dense layers to achieve a validation accuracy of 96.76% with 99.99% accuracy. The performance of this method was also compared with traditional and deep learning natural language processing techniques.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"3 3","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139895509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Application of the Fifth Discipline Strategies in the Learning City Concept 学习型城市理念中第五项学科战略的应用
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433847
C. Mutongi, Billy Rigava
The stone age did not end because there were no more stones, it ended because of continuous improvement, innovation, creativity and learning. Local government has always been around since time immemorial. Even in the Stone Age period there was some form of local government, leaning and continuous improvement. In this DVUCADD environment, an environment characterized by dynamic, volatile, uncertain, ambiguous, diversity and disruptive phenomena, cities should be in a position to employ Peter Senge’s fifth discipline in order to survive and be in a position to learn faster. The Local government in Africa and Zimbabwe in particular has the role of proving a range of vital learning city services delivery for residents and organisations in defined areas. Among them are well known functions such as social services like primary education, libraries, vocational training and recreational facilities. Local government administration has a great role to play in bringing citizenry’s lifelong learning, engagement and participation. This then brings in economic and social development. One of the important aspects that ever happened in our life, is when Peter Senge came up with the fifth discipline that any organisation can apply in order to achieve a learning organisation. These disciplines are personal mastery, mental models, shared vision, team learning and systems thinking. The City of Harare is used as a case study in the application of Peter Senge’s fifth discipline to foster the learning city concept.
石器时代的终结并不是因为没有石头了,而是因为不断改进、创新、创造和学习。自古以来,地方政府就一直存在。即使在石器时代,也有某种形式的地方政府、精益求精和不断改进。在这个以动态、动荡、不确定、模糊、多样性和破坏性现象为特征的 DVUCADD 环境中,城市应该能够运用彼得-圣吉的第五项修炼,以求生存并能够更快地学习。在非洲,尤其是津巴布韦,地方政府的职责是为特定地区的居民和组织提供一系列重要的学习型城市服务。其中包括众所周知的社会服务功能,如初等教育、图书馆、职业培训和娱乐设施。地方政府管理部门在促进公民终身学习、参与和投入方面发挥着重要作用。这将带来经济和社会发展。彼得-圣吉(Peter Senge)提出了任何组织都可以应用的第五项纪律,以实现学习型组织。这些纪律包括个人掌握、心智模式、共同愿景、团队学习和系统思维。哈拉雷市是应用彼得-圣吉的第五项修炼来促进学习型城市概念的一个案例研究。
{"title":"The Application of the Fifth Discipline Strategies in the Learning City Concept","authors":"C. Mutongi, Billy Rigava","doi":"10.1109/ICAIC60265.2024.10433847","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433847","url":null,"abstract":"The stone age did not end because there were no more stones, it ended because of continuous improvement, innovation, creativity and learning. Local government has always been around since time immemorial. Even in the Stone Age period there was some form of local government, leaning and continuous improvement. In this DVUCADD environment, an environment characterized by dynamic, volatile, uncertain, ambiguous, diversity and disruptive phenomena, cities should be in a position to employ Peter Senge’s fifth discipline in order to survive and be in a position to learn faster. The Local government in Africa and Zimbabwe in particular has the role of proving a range of vital learning city services delivery for residents and organisations in defined areas. Among them are well known functions such as social services like primary education, libraries, vocational training and recreational facilities. Local government administration has a great role to play in bringing citizenry’s lifelong learning, engagement and participation. This then brings in economic and social development. One of the important aspects that ever happened in our life, is when Peter Senge came up with the fifth discipline that any organisation can apply in order to achieve a learning organisation. These disciplines are personal mastery, mental models, shared vision, team learning and systems thinking. The City of Harare is used as a case study in the application of Peter Senge’s fifth discipline to foster the learning city concept.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"95 2","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139896101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
YSAF: Yolo with Spatial Attention and FFT to Detect Face Spoofing Attacks YSAF:利用空间注意力和 FFT 检测人脸欺骗攻击的 Yolo
Pub Date : 2024-02-07 DOI: 10.1109/ICAIC60265.2024.10433802
Rathinaraja Jeyaraj, B. Subramanian, Karnam Yogesh, Aobo Jin, Hardik A. Gohel
Besides biometrics, face authentication is quite popular on smart devices like smartphones and other electronic gadgets to verify and authenticate individuals. In the face authentication method, there is a chance of spoofing attacks, in which a static image or recorded video can be substituted for a real person’s face to breach security and gain access. To solve this problem, smart devices use additional hardware like a dual camera or an infrared sensor, which adds extra cost, weight, and incompatibility to different gadgets. Alternatively, software-based methods may be confused with a video of the user to gain the access. To overcome these problems, in this paper, we present a framework, YSAF, that combines Yolo v8 object detection, spatial attention, and fast Fourier transform (FFT) to restrict facial-based spoofing attacks without additional hardware. In YSAF, spatial attention is first used to focus on relevant features and reduce noise in the input image. Next, frequency analysis through FFT is applied to embed information in the collected images to help the classification model differentiate live faces from static ones. As a final step, Yolo detects whether the object present in the collected images is real or fake (spoof). The YSAF is trained using real images collected by volunteers from different sources and pre-processed with spatial attention and FFT before training with Yolo. The results show that the YSAF accurately blocks spoofing attacks with still images/videos in real-time.
除生物识别技术外,人脸认证在智能手机等智能设备和其他电子产品上也相当流行,用于验证和认证个人身份。在人脸认证方法中,存在欺骗攻击的可能性,即用静态图像或录制的视频代替真实的人脸,从而破坏安全并获取访问权。为了解决这个问题,智能设备需要使用额外的硬件,如双摄像头或红外传感器,这增加了额外的成本、重量,而且与不同的小工具不兼容。另外,基于软件的方法可能会与用户的视频相混淆,从而获得访问权限。为了克服这些问题,我们在本文中提出了一个框架 YSAF,它结合了 Yolo v8 物体检测、空间注意力和快速傅立叶变换(FFT),无需额外硬件即可限制基于面部的欺骗攻击。在 YSAF 中,空间注意力首先用于关注相关特征并减少输入图像中的噪声。接着,通过 FFT 进行频率分析,将信息嵌入收集到的图像中,帮助分类模型区分活体人脸和静态人脸。最后,Yolo 会检测采集图像中出现的物体是真实的还是伪造的(欺骗)。YSAF 使用志愿者从不同来源收集的真实图像进行训练,并在使用 Yolo 进行训练前进行了空间注意力和 FFT 预处理。结果表明,YSAF 能实时准确地阻止静态图像/视频中的欺骗攻击。
{"title":"YSAF: Yolo with Spatial Attention and FFT to Detect Face Spoofing Attacks","authors":"Rathinaraja Jeyaraj, B. Subramanian, Karnam Yogesh, Aobo Jin, Hardik A. Gohel","doi":"10.1109/ICAIC60265.2024.10433802","DOIUrl":"https://doi.org/10.1109/ICAIC60265.2024.10433802","url":null,"abstract":"Besides biometrics, face authentication is quite popular on smart devices like smartphones and other electronic gadgets to verify and authenticate individuals. In the face authentication method, there is a chance of spoofing attacks, in which a static image or recorded video can be substituted for a real person’s face to breach security and gain access. To solve this problem, smart devices use additional hardware like a dual camera or an infrared sensor, which adds extra cost, weight, and incompatibility to different gadgets. Alternatively, software-based methods may be confused with a video of the user to gain the access. To overcome these problems, in this paper, we present a framework, YSAF, that combines Yolo v8 object detection, spatial attention, and fast Fourier transform (FFT) to restrict facial-based spoofing attacks without additional hardware. In YSAF, spatial attention is first used to focus on relevant features and reduce noise in the input image. Next, frequency analysis through FFT is applied to embed information in the collected images to help the classification model differentiate live faces from static ones. As a final step, Yolo detects whether the object present in the collected images is real or fake (spoof). The YSAF is trained using real images collected by volunteers from different sources and pre-processed with spatial attention and FFT before training with Yolo. The results show that the YSAF accurately blocks spoofing attacks with still images/videos in real-time.","PeriodicalId":517265,"journal":{"name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","volume":"258 6","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139896085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1