2021 International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
[Title page] (标题页)
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/iccst49569.2021.9717389
{"title":"[Title page]","authors":"","doi":"10.1109/iccst49569.2021.9717389","DOIUrl":"https://doi.org/10.1109/iccst49569.2021.9717389","url":null,"abstract":"","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Current Trends in Cyber Security for Drones 无人机网络安全的当前趋势
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717376
C. Kumar, Sanket Mohanty
{"title":"Current Trends in Cyber Security for Drones","authors":"C. Kumar, Sanket Mohanty","doi":"10.1109/ICCST49569.2021.9717376","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717376","url":null,"abstract":"With many of the functionalities of Drones being controlled by highly sophisticated Computers through wired and wireless networks, Cyber security is playing a vital role in ensuring the safety and security of these. There are many incidents being reported about the breach of Cyber Security involving Drones thus bringing to focus existing vulnerabilities and threats. The attackers may be remotely launching the attacks. The successful attacks can have a high impact leading to serious incidents. In this paper, several case studies are discussed illustrating the Cyber related incidents in Drones. The latest developments in Cyber Security are presented applicable to the Drone industry. The Cyber Security best practices, countermeasures, attack detection and mitigations techniques are presented which are specific to UAVs.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Concept of a Software Tool with an Interactive Map for Identification and Determination of Soft Targets of Transport Infrastructure 交通基础设施软目标识别和确定的交互式地图软件工具的概念
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717375
Dora Kotkova, M. Hromada, Martina Malanikova, Stanislav Kovar
{"title":"The Concept of a Software Tool with an Interactive Map for Identification and Determination of Soft Targets of Transport Infrastructure","authors":"Dora Kotkova, M. Hromada, Martina Malanikova, Stanislav Kovar","doi":"10.1109/ICCST49569.2021.9717375","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717375","url":null,"abstract":"The article discusses theoretical problems of identification and determination of soft targets described by legislative documents. Currently, the definition of soft targets is not clear, so a methodology has been developed that eliminates this problem. To ensure the user-friendliness of the methodology, a software tool will be designed to assist users in distinguishing between soft, hard targets and critical infrastructure elements. This is a complicated task; therefore, the problem will be simplified only to the transport sector where could be covered almost all options. The article will describe the concept of the software tool, including user requirements and criteria.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132469191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigating Fairness of Ocular Biometrics Among Young, Middle-Aged, and Older Adults 调查年轻人、中年人和老年人眼部生物识别的公平性
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-04 DOI: 10.1109/ICCST49569.2021.9717383
Anoop Krishnan, Ali Almadan, A. Rattani
{"title":"Investigating Fairness of Ocular Biometrics Among Young, Middle-Aged, and Older Adults","authors":"Anoop Krishnan, Ali Almadan, A. Rattani","doi":"10.1109/ICCST49569.2021.9717383","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717383","url":null,"abstract":"A number of studies suggest bias of the face biometrics, i.e., face recognition and soft-biometric estimation methods, across gender, race, and age-groups. There is a recent urge to investigate the bias of different biometric modalities toward the deployment of fair and trustworthy biometric solutions. Ocular biometrics has obtained increased attention from academia and industry due to its high accuracy, security, privacy, and ease of use in mobile devices. A recent study in 2020 also suggested the fairness of ocular-based user recognition across males and females. This paper aims to evaluate the fairness of ocular biometrics in the visible spectrum among age-groups; young, middle, and older adults. Thanks to the availability of the latest large-scale 2020 UFPR ocular biometric dataset, with subjects acquired in the age range 18–79 years, to facilitate this study. Experimental results suggest the overall equivalent performance of ocular biometrics across gender and age-groups in user verification and gender-classification. Performance difference for older adults at lower false match rate and young adults was noted at user verification and age-classification, respectively. This could be attributed to inherent characteristics of the biometric data from these age-groups impacting specific applications, which suggest a need for advancement in sensor technology and software solutions.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124648267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Experimental Evaluation on Deepfake Detection using Deep Face Recognition 基于深度人脸识别的深度伪造检测实验评估
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-04 DOI: 10.1109/ICCST49569.2021.9717407
Sreeraj Ramachandran, Aakash Varma Nadimpalli, A. Rattani
{"title":"An Experimental Evaluation on Deepfake Detection using Deep Face Recognition","authors":"Sreeraj Ramachandran, Aakash Varma Nadimpalli, A. Rattani","doi":"10.1109/ICCST49569.2021.9717407","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717407","url":null,"abstract":"Significant advances in deep learning have obtained hallmark accuracy rates for various computer vision applications. However, advances in deep generative models have also led to the generation of very realistic fake content, also known as deepfakes, causing a threat to privacy, democracy, and national security. Most of the current deepfake detection methods are deemed as a binary classification problem in distinguishing authentic images or videos from fake ones using two-class convolutional neural networks (CNNs). These methods are based on detecting visual artifacts, temporal or color inconsistencies produced by deep generative models. However, these methods require a large amount of real and fake data for model training and their performance drops significantly in cross dataset evaluation with samples generated using advanced deepfake generation techniques. In this paper, we thoroughly evaluate the efficacy of deep face recognition in identifying deepfakes, using different loss functions and deepfake generation techniques. Experimental investigations on challenging Celeb-DF and FaceForensics++ deepfake datasets suggest the efficacy of deep face recognition in identifying deepfakes over two-class CNNs and the ocular modality. Reported results suggest a maximum Area Under Curve (AUC) of 0.98 and Equal Error Rate (EER) of 7.1% in detecting deepfakes using face recognition on the Celeb-DF dataset. This EER is lower by 16.6% compared to the EER obtained for the two-class CNN and the ocular modality on the Celeb-DF dataset. Further on the FaceForensics++ dataset, an AUC of 0.99 and EER of 2.04% were obtained. The use of biometric facial recognition technology has the advantage of bypassing the need for a large amount of fake data for model training and obtaining better generalizability to evolving deepfake creation techniques.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信