Zong-Rong Li, Denghui Ma, Nanfang Li, Xiang Li, Ning Zhang, H. Cao
{"title":"URL generative recognition method based on generative countermeasure network","authors":"Zong-Rong Li, Denghui Ma, Nanfang Li, Xiang Li, Ning Zhang, H. Cao","doi":"10.1117/12.2655361","DOIUrl":"https://doi.org/10.1117/12.2655361","url":null,"abstract":"The currently used URL identification methods require a large number of tags. The malicious URLs update quickly, and it is difficult to collect enough comprehensive URL tags, resulting in unstable identification accuracy. After calculating the boundary similarity of the URL string, the Skip-Gram model is used to embed the URL. The processed word vector is used as the generator input of the semi-supervised learning GAN to obtain the malicious URL identification result. The experimental results show that the accuracy of the URL recognition using GAN is higher than 96%, the fluctuation of the F1 value is small, and the recognition results are more reliable.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125136969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ling Zhang, Tao Peng, Ying Li, Xuanying Zhang, Wenxin Zhang
{"title":"A multiple target detection radar for monitoring aircraft docking","authors":"Ling Zhang, Tao Peng, Ying Li, Xuanying Zhang, Wenxin Zhang","doi":"10.1117/12.2655585","DOIUrl":"https://doi.org/10.1117/12.2655585","url":null,"abstract":"Linear Frequency Modulation Continuous Wave (LFMCW) radar is widely used for automotive applications as its high range resolution and frequency resolution. In this article, a multiple target detection radar is presented to monitor aircraft docking. The proposed radar adopts FMCW+CW mode and two receiving antennas to calculate the range, velocity and angle of the multiple targets. This method was verified by simulation and measurements.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133449276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scale matching based remote sensing image cloud detection in southwest mountainous areas","authors":"Lulu Dong, Yu Chen, Nan-Nan Ke, Wenqing Tu, X. Zhang, Wen Dong, Xiaojie Su","doi":"10.1117/12.2655170","DOIUrl":"https://doi.org/10.1117/12.2655170","url":null,"abstract":"Sample quality is the key to automated cloud detection from regional remote sensing images, and scale is one of the major impediments to sample quality control. In this paper, we select the southwest mountainous area in China, which is fragmented, cloudy, and rainy, as the study area. We proposed a method for constructing a cloud detection dataset based on the idea of downscaling and the spectral characteristics of vegetation. Finally, we validated the dataset by the U-Net+ deep learning model. The experimental results show that the cloud detection accuracy reaches 95.11% when using the dataset constructed in this paper, which is approximately 40% higher than the cloud detection accuracy with large-scale samples. Additionally, it reduced the workload of masking a large number of samples for a specific region and realizing the possibility of efficient cloud detection in the region.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127878646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximate expressions of target’s scattering information","authors":"Manman Zhao, Dazhuan Xu, Tian Liu, Desen Zhang","doi":"10.1117/12.2655342","DOIUrl":"https://doi.org/10.1117/12.2655342","url":null,"abstract":"In this paper, the content related to scattering information is mainly focused in the presence of complex additive Gaussian white noise (CAGWN). In our previous works, the theoretical formula of the scattering information is already derived with integral operation. To get more brief expressions, we derive the approximate expressions in cases where the signal-to-noise ratio (SNR) is high and low separately. Noting that the a posteriori probability density function (PDF) obeys Gaussian distribution in the case of high SNR so it’s natural to derive the expression of the scattering information’s approximate expression on account of information theory. In low SNR regime, an approximate formula can be obtained with the reason of signal is submerged in the noise. Numerical results are presented to verify the effectiveness of the proposed approximation.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on lightweight encryption algorithm for IoT devices","authors":"Rining Wang, Guangming Guo, Zhigang Wang, Zijian Meng, Jinan Li, Jinshuai Wang","doi":"10.1117/12.2655337","DOIUrl":"https://doi.org/10.1117/12.2655337","url":null,"abstract":"In the Internet of Things (IoT) environment, embedded IoT devices have limited computing and storage resources. Their data lacks encryption protection. To solve this problem, this paper proposes a lightweight encryption algorithm based on SM4. First, this paper analyzed the encryption and decryption principle of SM4 algorithm. Then the S-box used in the encryption and decryption process was extended from high-order domain to low-order domain. The S-box component is constructed by a few logic gates to realize the lightness of the algorithm. Finally, the optimized SM4 module was embedded in the 5G communication terminal for testing. The results show that the lightweight encryption algorithm for IoT device can adapt to the data encryption of resource-constrained devices well. It is helpful to avoid the data leakage.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Greyscale correction algorithm for stripe edge of filter array multispectral image","authors":"Tong Li, Wenbang Sun, X. Bai, Di Wu, Panpan Zhao, X. Zhang","doi":"10.1117/12.2655189","DOIUrl":"https://doi.org/10.1117/12.2655189","url":null,"abstract":"Multispectral cameras of filter array are susceptible to interference streaks at the edges of each band due to the imaging mechanism and process characteristics. Aiming at the problem of interference streaks of multispectral image strips, a new method of grey correction algorithm for stripe edge is proposed. Firstly, determine the coordinates of the effective area of each strip image for strip image cropping; Secondly, a grey scale change function is fitted using the grey scale of pixels in the undisturbed area at the edges of each strip, and the grey scale of pixels in interference area at the edges of the strip is predicted to obtain the fitted pixel grey scale values; Then, the ratio of the grey value of each fitted pixel to the mean grey value of the true pixel is used as the grey correction factor for the corresponding row to eliminate edge interference stripes. Finally, the grey-scale processed images of each strip are stitched together to obtain a consistent grey-scale image of each single band. The theoretical analysis and experimental results show that this method can not only effectively solve the problem of grey-scale interference at the edges of the multispectral images of filter array, and can maintain the spectral information characteristics of the features to the maximum extent.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132068917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and implementation of network defense and non-repeated substring pattern matching algorithm","authors":"Xiaorong Duan, Chenni Dong, Xin Ma","doi":"10.1117/12.2655409","DOIUrl":"https://doi.org/10.1117/12.2655409","url":null,"abstract":"Cloud computing network and next-generation network is now widely used, which brings more security threats. Based on the process and the network tuples communication to construct defense system, the key technologies of defense under IPv4/IPv6 dual stack network are researched. It presents the NRLS Sunday based on improvement of the longest unique substring and Sunday algorithm, to avoid excessive repetitive character comparison and improve the matching efficiency of a single pattern string. Compared with BM, Sunday algorithm, the experiment shows the improved algorithm optimizes its time complexity. Under high-speed network, packet data contents is carried on rapid detection and analysis. Based on intelligent traffic restrictions for process and network, the intrusion detection and defense is conducted for network. In this paper, parallel packet detection method is studied under the high speed. Application web collaboration, and the unified arrangements and issued policies is applied in a complex network environment, proposing and realizing the effective method of defense in the complex network environment.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"City administrative region tourism route recommendation algorithm based on naive Bayes data mining","authors":"Xiao Zhou, Jiangpeng Tian, Mengyuan Liu, Xinghan Zhou","doi":"10.1117/12.2655184","DOIUrl":"https://doi.org/10.1117/12.2655184","url":null,"abstract":"Aiming at the problems existing in the current tourism route planning, this paper constructs a city administrative region tourism route recommendation algorithm based on Naive Bayes data mining. The Naive Bayes classifier model is constructed through the attribute tag data of tourists’ once-visited scenic spots, and then the scenic spots in the target city are classified. The scenic spots are sorted according to the weighted Bayesian probability value of each classification, so as to recommend the scenic spots with the highest probability value for tourists. Based on the scenic spots with the optimal probability values, this paper constructs a tourism route algorithm with the lowest cost. Combined with the different travel modes of tourists, it searches the city tourism routes with the lowest cost on traveling distance, time and fee. At the same time, it provides two tourism decision-making plans according to the actual needs of tourists. Experiment shows that the proposed algorithm can recommend the scenic spots with the highest weighted probability value and satisfy the needs of tourists, and the traveling cost on the searched tourism route is the lowest.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131179973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack research of multilayer network vulnerability in the urban transport system","authors":"Jie Cao, Jinyu Li, Liang Hou","doi":"10.1117/12.2655174","DOIUrl":"https://doi.org/10.1117/12.2655174","url":null,"abstract":"The urban public transport system comprises various networks representing different transportation modes with complex internal connections. The common single-layer complex network cannot fully describe the interior characteristics of the system. Therefore, this paper proposes a multi-layer network modeling method for the urban public transport system, which couples different traffic networks into multi-layer networks. We also proposed a centrality measurement of node transfer and designed an attack strategy called the multi-metric joint. The simulation experiment using the geographic information data of Chengdu urban public transport shows that the modeling method can completely and accurately describe the natural urban public transport system. And the multi-metric joint attack strategy is more effective than the traditional attack strategy, which will cause more severe damage to the network. This paper provides a new perspective and method for multilayer network modeling and vulnerability analysis of urban public transport systems.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"23 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132394455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin Zhong, Yingting Luo, Y. Zhang, Shimeng Yao, Yunmin Zhu
{"title":"A novel approach to maneuvering target tracking based on random motion model using random Kalman filtering","authors":"Jin Zhong, Yingting Luo, Y. Zhang, Shimeng Yao, Yunmin Zhu","doi":"10.1117/12.2655289","DOIUrl":"https://doi.org/10.1117/12.2655289","url":null,"abstract":"Traditional maneuvering target tracking algorithms assume that the target motion model is one fixed or a limited number of them. For high-speed and strong maneuvering targets, when the model set cannot cover the maneuvering mode or the deviation is large, the performance of the tracker will drop rapidly. Therefore, this paper proposes a new maneuvering target tracking method – a random motion model based on Random Kalman Filtering (RKF). This algorithm uses a random model to describe the target maneuver, which is more widely used than traditional algorithms and is more stable when the target maneuver is not covered by the model set. Compared with the traditional single model, the classic related algorithm is Kalman Filtering (KF), the new method significantly improves the tracking effect when the target is maneuvering. At the same time, when the model set of the Interacting Multiple Model algorithm (IMM) does not match the real maneuvering state, the tracking error of the new method is smaller than IMM and there is no divergence trend.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130775968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}