首页 > 最新文献

2018 Second International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Attendance and Security Assurance using Image Processing 使用图像处理的考勤和安全保证
Raisha Shrestha, S. Pradhan, Rahul Karn, S. Shrestha
In Maximum number of educational institutions we can see prevailing system of attendance where attendance of students are taken manually by the professors calling out the names of the students. In some universities we can find RFID system present for attendance. The manual system of attendance is very time consuming and may not be much efficient as well. Whereas RFID based attendance is also not much reliable as we don't know if the RFID card is actually used by the student whom it belongs or not. Both existing techniques for attendance system have problems in it.So our paper has used Image Processing techniques and automated the attendance system where the attendance is taken by the system by recognizing the faces of the students. The system has dataset of known faces or students such that when any unknown face detected inside the classroom, he/she will be recognized as an intruder. This will safeguard the students from any kind of invasion or attack. In this paper we have discussed the techniques which can be used to implement image processing for automating the attendance system and assure security of the students.
在最大数量的教育机构中,我们可以看到普遍的考勤系统,学生的出勤是由教授喊出学生的名字来手动进行的。在一些大学,我们可以发现RFID系统用于考勤。手工考勤系统非常耗时,而且效率可能也不高。然而,基于RFID的考勤也不太可靠,因为我们不知道RFID卡是否真的被学生使用。现有的考勤系统技术都存在一定的问题。因此,本文采用图像处理技术实现了考勤系统的自动化,系统通过识别学生的面部来记录考勤。该系统拥有已知面孔或学生的数据集,因此当在教室内检测到任何未知面孔时,他/她将被识别为入侵者。这将保护学生免受任何形式的入侵或攻击。本文讨论了实现考勤系统自动化的图像处理技术,以保证学生的安全。
{"title":"Attendance and Security Assurance using Image Processing","authors":"Raisha Shrestha, S. Pradhan, Rahul Karn, S. Shrestha","doi":"10.1109/ICCMC.2018.8487788","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487788","url":null,"abstract":"In Maximum number of educational institutions we can see prevailing system of attendance where attendance of students are taken manually by the professors calling out the names of the students. In some universities we can find RFID system present for attendance. The manual system of attendance is very time consuming and may not be much efficient as well. Whereas RFID based attendance is also not much reliable as we don't know if the RFID card is actually used by the student whom it belongs or not. Both existing techniques for attendance system have problems in it.So our paper has used Image Processing techniques and automated the attendance system where the attendance is taken by the system by recognizing the faces of the students. The system has dataset of known faces or students such that when any unknown face detected inside the classroom, he/she will be recognized as an intruder. This will safeguard the students from any kind of invasion or attack. In this paper we have discussed the techniques which can be used to implement image processing for automating the attendance system and assure security of the students.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"544-548"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85624140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Machine Learning Based Twitter Spam Account Detection: A Review 基于机器学习的Twitter垃圾邮件账户检测:综述
Shivangi Gheewala, Rakesh Patel
Online social networks (OSNs) are emerging communication medium for people to establish and manage social relationships. In OSNs, regularly billions of users are involved in social interaction, content and opinion dissemination, networking, recommendations, scouting, alerting, and social campaigns. The popularization of OSNs open up a new perspectives and challenges to the study of social networks, being of interest to many fields. Social network is a place where social activities, business oriented activities, entertainment, and information are exchanged. It establish a worldwide connectivity environment where communities of people share their interests and activities, or who are interested in interests and activities of others Although social network has given immense benefits to people at the same time harming people with various mischievous activities that take place on social platforms. This causes significant economic loss to our society and even threaten the national security. All the social networks Facebook, Twitter, LinkedIn, etc. are highly susceptible to malware activities. Twitter is one of the biggest microblogging networking platform, it has more than half a billion tweets are posted every day in average by millions of users on Twitter. Such a versatility and wide spread of use, Twitter easily get intruded with malicious activities. Malicious activities includes malware intrusion, spam distribution, social attacks, etc. Spammers use social engineering attack strategy to send spam tweets, spam URLs, etc. This made twitter an ideal arena for proliferation of anomalous spam accounts. The impact stimulates researchers to develop a model that analyze, detects and recovers from defamatory actions in twitter. Twitter network is inundated with tens of millions of fake spam profiles which may jeopardize the normal user’s security and privacy. To improve real users safety and identification of spam profiles become key parts of the research.
在线社交网络是人们建立和管理社会关系的新兴传播媒介。在osn中,通常有数十亿用户参与社交互动、内容和意见传播、网络、推荐、侦察、警报和社交活动。社交网络的普及为社交网络的研究开辟了新的视角和挑战,引起了许多领域的兴趣。社交网络是社会活动、商业活动、娱乐和信息交换的场所。它建立了一个世界范围内的连接环境,人们的社区分享他们的兴趣和活动,或者谁感兴趣的兴趣和他人的活动。尽管社交网络给人们带来了巨大的好处,同时也伤害了人们在社交平台上发生的各种恶作剧活动。这给我们的社会造成了巨大的经济损失,甚至威胁到国家安全。所有的社交网络Facebook, Twitter, LinkedIn等都很容易受到恶意软件活动的影响。推特是最大的微博网络平台之一,它有超过5亿条推文,平均每天有数百万用户在推特上发布。如此多功能性和广泛的使用,Twitter很容易受到恶意活动的入侵。恶意活动包括恶意软件入侵、垃圾邮件分发、社交攻击等。垃圾邮件发送者使用社会工程攻击策略发送垃圾推文、垃圾url等。这使得twitter成为了异常垃圾账户泛滥的理想场所。这种影响促使研究人员开发一种模型来分析、检测twitter上的诽谤行为并从中恢复。推特网络充斥着数以千万计的虚假垃圾信息,可能会危及普通用户的安全和隐私。提高真实用户的安全性和识别垃圾邮件配置文件成为研究的关键部分。
{"title":"Machine Learning Based Twitter Spam Account Detection: A Review","authors":"Shivangi Gheewala, Rakesh Patel","doi":"10.1109/ICCMC.2018.8487992","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487992","url":null,"abstract":"Online social networks (OSNs) are emerging communication medium for people to establish and manage social relationships. In OSNs, regularly billions of users are involved in social interaction, content and opinion dissemination, networking, recommendations, scouting, alerting, and social campaigns. The popularization of OSNs open up a new perspectives and challenges to the study of social networks, being of interest to many fields. Social network is a place where social activities, business oriented activities, entertainment, and information are exchanged. It establish a worldwide connectivity environment where communities of people share their interests and activities, or who are interested in interests and activities of others Although social network has given immense benefits to people at the same time harming people with various mischievous activities that take place on social platforms. This causes significant economic loss to our society and even threaten the national security. All the social networks Facebook, Twitter, LinkedIn, etc. are highly susceptible to malware activities. Twitter is one of the biggest microblogging networking platform, it has more than half a billion tweets are posted every day in average by millions of users on Twitter. Such a versatility and wide spread of use, Twitter easily get intruded with malicious activities. Malicious activities includes malware intrusion, spam distribution, social attacks, etc. Spammers use social engineering attack strategy to send spam tweets, spam URLs, etc. This made twitter an ideal arena for proliferation of anomalous spam accounts. The impact stimulates researchers to develop a model that analyze, detects and recovers from defamatory actions in twitter. Twitter network is inundated with tens of millions of fake spam profiles which may jeopardize the normal user’s security and privacy. To improve real users safety and identification of spam profiles become key parts of the research.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"42 3","pages":"79-84"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91423077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Event Based Sentiment Analysis of Twitter Data 基于事件的Twitter数据情感分析
Mamta Patil, H. K. Chavan
Everyday large volumes of data are produced. Millions of users share and dissipate most up-to-date information on twitter. Traditional text mining suffers severely from short and noisy nature of tweets. Event detection from twitter data has many new challenges when compared to event detection from traditional media. Noisy nature and limited length are the challenges imposed by twitter data. Event detection performance on twitter is negatively affected by nature of tweets. This paper proposes SegAnalysis framework to tackle these challenges. It performs tweet segmentation, event detection and sentiment analysis. Tweet segmentation is performed in a batch mode using POS (part of speech) tagger on recent online tweets fetched by the user. Segmentation of a tweet preserves the named entities and its stickiness score is calculated. Naïve Bayes classification and online clustering detect events. These events improve situational awareness and decision support. Sentiment analysis categorizes tweets as positive, negative and neutral depending on sentiment score of a tweet. SegAnalysis framework can be extended to deal with events belonging to multiple clusters.
每天都会产生大量的数据。数以百万计的用户在twitter上分享和传播最新的信息。传统的文本挖掘受到tweet短而嘈杂的严重影响。与传统媒体的事件检测相比,twitter数据的事件检测面临着许多新的挑战。嘈杂的性质和有限的长度是推特数据带来的挑战。twitter上的事件检测性能受到tweet性质的负面影响。本文提出了SegAnalysis框架来解决这些挑战。它执行tweet分割、事件检测和情感分析。使用词性标注器对用户获取的最近在线推文进行批量分割。tweet的分割保留了命名实体并计算了其粘性分数。Naïve贝叶斯分类和在线聚类检测事件。这些事件提高了态势感知和决策支持。情绪分析根据tweet的情绪得分将tweet分类为积极,消极和中性。可以扩展SegAnalysis框架来处理属于多个集群的事件。
{"title":"Event Based Sentiment Analysis of Twitter Data","authors":"Mamta Patil, H. K. Chavan","doi":"10.1109/ICCMC.2018.8487531","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487531","url":null,"abstract":"Everyday large volumes of data are produced. Millions of users share and dissipate most up-to-date information on twitter. Traditional text mining suffers severely from short and noisy nature of tweets. Event detection from twitter data has many new challenges when compared to event detection from traditional media. Noisy nature and limited length are the challenges imposed by twitter data. Event detection performance on twitter is negatively affected by nature of tweets. This paper proposes SegAnalysis framework to tackle these challenges. It performs tweet segmentation, event detection and sentiment analysis. Tweet segmentation is performed in a batch mode using POS (part of speech) tagger on recent online tweets fetched by the user. Segmentation of a tweet preserves the named entities and its stickiness score is calculated. Naïve Bayes classification and online clustering detect events. These events improve situational awareness and decision support. Sentiment analysis categorizes tweets as positive, negative and neutral depending on sentiment score of a tweet. SegAnalysis framework can be extended to deal with events belonging to multiple clusters.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"31 1","pages":"1050-1054"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78862843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved Automatic Feature Selection Approach for Health Risk Prediction 一种改进的健康风险预测自动特征选择方法
Shreyal Gajare, S. Sonawani
With the recent advances in machines & technology, there is revolution in healthcare industry also. Thus, it gave rise to the concept of Electronic Health Record (EHR) which stores patients demographics, lab tests & results, medical history, habits etc. in electronic form. EHR is voluminous data which is difficult to store, maintain or alter. To provide extended life for people, health risk prediction model using this EHR is formulated in this work. Feature Selection is used to select only associated or relevant data from the dataset. Logistic Regression is used with improved loss functionality parameter which increases the accuracy, response time and performance of the system. Representation Learning enables formation of feature vector of the selected features thus calculating their scores. Further, risk prediction is performed by the neural network model. Deep Neural Network (DNN) is used with many hidden layers containing activation functions. Transfer learning is used to avoid re-training of the whole system every time new data enters the model. Dataset used here is of hypertension. EHR dataset is also synthetically created for analysis.
随着近年来机器和技术的进步,医疗保健行业也发生了革命。因此,它产生了电子健康记录(EHR)的概念,它以电子形式存储患者的人口统计数据、实验室测试和结果、病史、习惯等。电子病历是大量的数据,难以存储、维护或更改。为了延长人们的寿命,本工作建立了基于该电子病历的健康风险预测模型。特征选择用于从数据集中只选择关联或相关的数据。采用改进损失函数参数的逻辑回归,提高了系统的精度、响应时间和性能。表示学习能够形成所选特征的特征向量,从而计算它们的分数。利用神经网络模型进行风险预测。深度神经网络(Deep Neural Network, DNN)具有许多包含激活函数的隐藏层。使用迁移学习避免了每次新数据进入模型时整个系统的重新训练。这里使用的数据集是高血压。还综合创建了EHR数据集用于分析。
{"title":"Improved Automatic Feature Selection Approach for Health Risk Prediction","authors":"Shreyal Gajare, S. Sonawani","doi":"10.1109/ICCMC.2018.8487695","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487695","url":null,"abstract":"With the recent advances in machines & technology, there is revolution in healthcare industry also. Thus, it gave rise to the concept of Electronic Health Record (EHR) which stores patients demographics, lab tests & results, medical history, habits etc. in electronic form. EHR is voluminous data which is difficult to store, maintain or alter. To provide extended life for people, health risk prediction model using this EHR is formulated in this work. Feature Selection is used to select only associated or relevant data from the dataset. Logistic Regression is used with improved loss functionality parameter which increases the accuracy, response time and performance of the system. Representation Learning enables formation of feature vector of the selected features thus calculating their scores. Further, risk prediction is performed by the neural network model. Deep Neural Network (DNN) is used with many hidden layers containing activation functions. Transfer learning is used to avoid re-training of the whole system every time new data enters the model. Dataset used here is of hypertension. EHR dataset is also synthetically created for analysis.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"816-819"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78401649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on clustering techniques in Twitter data Twitter数据聚类技术综述
R. Devika, S. Revathy, Sai surriya Priyanka U, V. Subramaniya swamy
Social networks and online news services are used by users to communicate and share messages. One such social network is Twitter. Earlier its messages were restricted to 140 characters, but from November 7, 2017 its limit was extended to 280 characters except Japanese, Korean and Chinese languages. Because of restricted characters used, it is famously called micro blogging. Mining twitter data has become popular, because it provides useful information which is being used in various fields. This paper highlights various clustering techniques that can be used in twitter data mining with advantages and limitation.
社交网络和在线新闻服务被用户用来交流和分享信息。Twitter就是这样一个社交网络。早些时候,该公司的信息限制为140个字符,但从2017年11月7日起,除日语、韩语和中文外,其限制扩大到280个字符。由于使用的字符限制,它被称为微博。挖掘twitter数据已经变得很流行,因为它提供了有用的信息,这些信息正在被用于各个领域。本文重点介绍了各种聚类技术在twitter数据挖掘中的优缺点。
{"title":"Survey on clustering techniques in Twitter data","authors":"R. Devika, S. Revathy, Sai surriya Priyanka U, V. Subramaniya swamy","doi":"10.1109/ICCMC.2018.8487969","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487969","url":null,"abstract":"Social networks and online news services are used by users to communicate and share messages. One such social network is Twitter. Earlier its messages were restricted to 140 characters, but from November 7, 2017 its limit was extended to 280 characters except Japanese, Korean and Chinese languages. Because of restricted characters used, it is famously called micro blogging. Mining twitter data has become popular, because it provides useful information which is being used in various fields. This paper highlights various clustering techniques that can be used in twitter data mining with advantages and limitation.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"1073-1077"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78581097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification Of User Preference by Sequential Pattern Mining and Recommendation of Products using Geo-tagged data 基于顺序模式挖掘的用户偏好识别和使用地理标记数据的产品推荐
R. Kanmani, V. Uma
Recommendation System provides the user with the interesting materials which are extracted from their preference. For simplifying the information retrieval and in order to provide the user with preferred result with more accuracy, recommendation system is being used. Recommendation based services are also used in social networks such as Facebook, Twitter, Instagram etc. Geo-tagged data plays a major role in case of recommendation systems as they will be providing recommendations with respect to the users locations. The semantic classification of the location is done using Support Vector Machine. By considering the location co-ordinates the nearest possible travel routes are identified by Google Maps and the shorter distance are computed using k-Nearest Neighbour. In this work, recommendation of products is given by means of considering the frequent buying pattern of the user using Prefix span algorithm, similar users ratings computed by Collaborative Filtering and the popular items available on the travel route. The proposed system has been implemented and evaluated.
推荐系统从用户的偏好中提取出他们感兴趣的材料,为用户提供推荐。为了简化信息检索,为用户提供更准确的首选结果,推荐系统应运而生。基于推荐的服务也用于社交网络,如Facebook、Twitter、Instagram等。地理标记数据在推荐系统中扮演着重要的角色,因为它们将根据用户的位置提供推荐。使用支持向量机对位置进行语义分类。通过考虑位置坐标,谷歌地图识别出最近的可能旅行路线,并使用k近邻计算出较短的距离。在这项工作中,通过使用前缀跨度算法考虑用户的频繁购买模式,通过协同过滤计算相似用户评分以及旅行路线上可用的热门商品来给出产品推荐。建议的系统已经实施和评估。
{"title":"Identification Of User Preference by Sequential Pattern Mining and Recommendation of Products using Geo-tagged data","authors":"R. Kanmani, V. Uma","doi":"10.1109/ICCMC.2018.8487238","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487238","url":null,"abstract":"Recommendation System provides the user with the interesting materials which are extracted from their preference. For simplifying the information retrieval and in order to provide the user with preferred result with more accuracy, recommendation system is being used. Recommendation based services are also used in social networks such as Facebook, Twitter, Instagram etc. Geo-tagged data plays a major role in case of recommendation systems as they will be providing recommendations with respect to the users locations. The semantic classification of the location is done using Support Vector Machine. By considering the location co-ordinates the nearest possible travel routes are identified by Google Maps and the shorter distance are computed using k-Nearest Neighbour. In this work, recommendation of products is given by means of considering the frequent buying pattern of the user using Prefix span algorithm, similar users ratings computed by Collaborative Filtering and the popular items available on the travel route. The proposed system has been implemented and evaluated.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"108-113"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72870104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Face Recognition System using various Distance Classifiers 使用不同距离分类器的人脸识别系统性能评价
Preeti, Dinesh Kumar
Face recognition applications are gaining popularity day by day. Feature extraction, selection, and recognition are the three main steps of face recognition system. Recognition is done using classifiers as these play a vital role in making the system recognize the faces accurately to the extent possible. This paper evaluates the performance of the system using four different distance classifiers over ORL databases. DCT (Discrete Cosine Transform)-PCA (Principal Component Analysis) and LDA (Linear Discriminate Analysis) methods followed by Cuckoo Search algorithm have been used for extraction and selection of important features respectively. The results demonstrate the efficiency and efficacy of the face recognition system upon using Euclidean distance classifier.
人脸识别应用日益普及。特征提取、选择和识别是人脸识别系统的三个主要步骤。识别是使用分类器完成的,因为分类器在使系统尽可能准确地识别人脸方面起着至关重要的作用。本文在ORL数据库上使用四种不同的距离分类器来评估系统的性能。分别采用DCT (Discrete Cosine Transform)-PCA (Principal Component Analysis)和LDA (Linear discriminative Analysis)方法结合布谷鸟搜索算法进行重要特征的提取和选择。实验结果表明,采用欧氏距离分类器的人脸识别系统是高效有效的。
{"title":"Performance Evaluation of Face Recognition System using various Distance Classifiers","authors":"Preeti, Dinesh Kumar","doi":"10.1109/ICCMC.2018.8487835","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487835","url":null,"abstract":"Face recognition applications are gaining popularity day by day. Feature extraction, selection, and recognition are the three main steps of face recognition system. Recognition is done using classifiers as these play a vital role in making the system recognize the faces accurately to the extent possible. This paper evaluates the performance of the system using four different distance classifiers over ORL databases. DCT (Discrete Cosine Transform)-PCA (Principal Component Analysis) and LDA (Linear Discriminate Analysis) methods followed by Cuckoo Search algorithm have been used for extraction and selection of important features respectively. The results demonstrate the efficiency and efficacy of the face recognition system upon using Euclidean distance classifier.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"322-327"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84977551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple Sensitive Attributes Based Privacy Preserving Data Publishing 基于多敏感属性的隐私保护数据发布
Jasmina N Vanasiwala, Nirali R. Nanavati
The advances in digital information applications facilitates the collection of huge amount of data about governments, healthcare, other organizations and individuals. To make this data available for researchers, businesses and other users, it needs to be released. This in turn increases the demand of exchanging and publishing this collected data. However, data in its original form, typically contains sensitive information about individuals and/or organizations, and publishing such data will violate individual or organizational privacy. Hence, Privacy Preserving Data Publishing (PPDP) provides methods and tools for publishing useful information while preserving data privacy. Before data is published to the concerned users, it is altered to maintain its privacy without compromising data utility, using various anonymization techniques. Real-time datasets contain different types of Multiple Sensitive Attributes (MSAs) (which could be numerical or categorical). Anonymization for only Single Sensitive Attribute is not suitable for functional usage. Thus, it is important to maintain the association between these MSAs and to preserve the privacy of Mixed (numerical and categorical) MSAs efficiently while working with high dimensional data. The main focus of this paper is to analyse the different schemes proposed in literature for PPDP of MSAs.
数字信息应用程序的进步有助于收集有关政府、医疗保健、其他组织和个人的大量数据。为了让研究人员、企业和其他用户可以使用这些数据,需要将其发布。这反过来又增加了交换和发布收集到的数据的需求。然而,原始形式的数据通常包含有关个人和/或组织的敏感信息,发布此类数据将侵犯个人或组织的隐私。因此,隐私保护数据发布(PPDP)提供了在保护数据隐私的同时发布有用信息的方法和工具。在将数据发布给相关用户之前,使用各种匿名化技术对其进行修改,以在不损害数据效用的情况下维护其隐私。实时数据集包含不同类型的多敏感属性(msa)(可以是数值的或分类的)。仅对单个敏感属性进行匿名化不适合用于功能用途。因此,在处理高维数据时,重要的是维护这些msa之间的关联,并有效地保护混合(数值和分类)msa的私密性。本文的主要重点是分析文献中提出的msa PPDP的不同方案。
{"title":"Multiple Sensitive Attributes Based Privacy Preserving Data Publishing","authors":"Jasmina N Vanasiwala, Nirali R. Nanavati","doi":"10.1109/ICCMC.2018.8487483","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487483","url":null,"abstract":"The advances in digital information applications facilitates the collection of huge amount of data about governments, healthcare, other organizations and individuals. To make this data available for researchers, businesses and other users, it needs to be released. This in turn increases the demand of exchanging and publishing this collected data. However, data in its original form, typically contains sensitive information about individuals and/or organizations, and publishing such data will violate individual or organizational privacy. Hence, Privacy Preserving Data Publishing (PPDP) provides methods and tools for publishing useful information while preserving data privacy. Before data is published to the concerned users, it is altered to maintain its privacy without compromising data utility, using various anonymization techniques. Real-time datasets contain different types of Multiple Sensitive Attributes (MSAs) (which could be numerical or categorical). Anonymization for only Single Sensitive Attribute is not suitable for functional usage. Thus, it is important to maintain the association between these MSAs and to preserve the privacy of Mixed (numerical and categorical) MSAs efficiently while working with high dimensional data. The main focus of this paper is to analyse the different schemes proposed in literature for PPDP of MSAs.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"22 1","pages":"394-400"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85396597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EAACK - Enhanced Adaptive Acknowledgment 增强的自适应承认
V. Sanju, G. Venu, Reenu Sara Joseph, M. Stephen, Melvin Mathew
Wireless networks are currently dominating over wired networks in many applications.Mobility and scalability are some of the features that has led to make wireless networks more popular. Out of the many wireless network Mobile Ad-Hoc network (MANET) are the most popular. They have a highly dynamic and random topology. Essentially the ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network. MANET is used in many military applications because of its self configuring nature. However Mobile Ad-Hoc Network (MANET) has much vulnerability towards security attacks due to its features of open medium, limited physical security, dynamic changing topology, lack of centralized monitoring and organization point.
无线网络目前在许多应用中都超过了有线网络。移动性和可扩展性是使无线网络更受欢迎的一些特性。在众多的无线网络中,移动自组网(MANET)最为流行。它们具有高度动态和随机的拓扑结构。从本质上讲,自组织网络是通过形成多跳网络相互通信的节点的集合。由于其自配置特性,MANET在许多军事应用中得到了应用。然而,由于移动自组织网络(MANET)具有介质开放、物理安全性有限、拓扑结构动态变化、缺乏集中监控和组织点等特点,使其极易受到安全攻击。
{"title":"EAACK - Enhanced Adaptive Acknowledgment","authors":"V. Sanju, G. Venu, Reenu Sara Joseph, M. Stephen, Melvin Mathew","doi":"10.1109/ICCMC.2018.8487752","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487752","url":null,"abstract":"Wireless networks are currently dominating over wired networks in many applications.Mobility and scalability are some of the features that has led to make wireless networks more popular. Out of the many wireless network Mobile Ad-Hoc network (MANET) are the most popular. They have a highly dynamic and random topology. Essentially the ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network. MANET is used in many military applications because of its self configuring nature. However Mobile Ad-Hoc Network (MANET) has much vulnerability towards security attacks due to its features of open medium, limited physical security, dynamic changing topology, lack of centralized monitoring and organization point.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"118 1","pages":"140-148"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87617771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilayered Risk analysis of Mobile systems and Apps 移动系统和应用程序的多层风险分析
R. Katarya, Chhavi Jain
Mobile systems and applications face a number of vulnerabilities that can lead to a breach of confidentiality of information. Users these days rely more on mobile systems and various applications for their day to day activities. Different applications can pose different risks to the security of mobile systems and can sometimes become the cause of other vulnerabilities as well. This paper presents and reviews risk analysis done at various levels in mobile systems, namely, the static analysis layer, dynamic analysis layer and the behavioral analysis layer. Risk can propagate through these layers and various techniques and approaches have been proposed to evaluate such potential risks. These strategies can help improve the security of mobile applications as well as the entire mobile applications.
移动系统和应用程序面临着许多漏洞,这些漏洞可能导致信息机密性的泄露。如今的用户在日常活动中更多地依赖于移动系统和各种应用程序。不同的应用程序可能对移动系统的安全性构成不同的风险,有时也可能成为其他漏洞的原因。本文介绍并回顾了移动系统中各个层次的风险分析,即静态分析层、动态分析层和行为分析层。风险可以通过这些层传播,已经提出了各种技术和方法来评估这些潜在风险。这些策略有助于提高移动应用程序以及整个移动应用程序的安全性。
{"title":"Multilayered Risk analysis of Mobile systems and Apps","authors":"R. Katarya, Chhavi Jain","doi":"10.1109/ICCMC.2018.8487535","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487535","url":null,"abstract":"Mobile systems and applications face a number of vulnerabilities that can lead to a breach of confidentiality of information. Users these days rely more on mobile systems and various applications for their day to day activities. Different applications can pose different risks to the security of mobile systems and can sometimes become the cause of other vulnerabilities as well. This paper presents and reviews risk analysis done at various levels in mobile systems, namely, the static analysis layer, dynamic analysis layer and the behavioral analysis layer. Risk can propagate through these layers and various techniques and approaches have been proposed to evaluate such potential risks. These strategies can help improve the security of mobile applications as well as the entire mobile applications.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"64-67"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81888954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 Second International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1