International Conference on Signal Processing and Communication Security最新文献

筛选
英文 中文
URL generative recognition method based on generative countermeasure network 基于生成对抗网络的URL生成识别方法
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655361
Zong-Rong Li, Denghui Ma, Nanfang Li, Xiang Li, Ning Zhang, H. Cao
{"title":"URL generative recognition method based on generative countermeasure network","authors":"Zong-Rong Li, Denghui Ma, Nanfang Li, Xiang Li, Ning Zhang, H. Cao","doi":"10.1117/12.2655361","DOIUrl":"https://doi.org/10.1117/12.2655361","url":null,"abstract":"The currently used URL identification methods require a large number of tags. The malicious URLs update quickly, and it is difficult to collect enough comprehensive URL tags, resulting in unstable identification accuracy. After calculating the boundary similarity of the URL string, the Skip-Gram model is used to embed the URL. The processed word vector is used as the generator input of the semi-supervised learning GAN to obtain the malicious URL identification result. The experimental results show that the accuracy of the URL recognition using GAN is higher than 96%, the fluctuation of the F1 value is small, and the recognition results are more reliable.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125136969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multiple target detection radar for monitoring aircraft docking 一种用于监视飞机对接的多目标探测雷达
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655585
Ling Zhang, Tao Peng, Ying Li, Xuanying Zhang, Wenxin Zhang
{"title":"A multiple target detection radar for monitoring aircraft docking","authors":"Ling Zhang, Tao Peng, Ying Li, Xuanying Zhang, Wenxin Zhang","doi":"10.1117/12.2655585","DOIUrl":"https://doi.org/10.1117/12.2655585","url":null,"abstract":"Linear Frequency Modulation Continuous Wave (LFMCW) radar is widely used for automotive applications as its high range resolution and frequency resolution. In this article, a multiple target detection radar is presented to monitor aircraft docking. The proposed radar adopts FMCW+CW mode and two receiving antennas to calculate the range, velocity and angle of the multiple targets. This method was verified by simulation and measurements.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133449276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scale matching based remote sensing image cloud detection in southwest mountainous areas 基于尺度匹配的西南山区遥感影像云检测
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655170
Lulu Dong, Yu Chen, Nan-Nan Ke, Wenqing Tu, X. Zhang, Wen Dong, Xiaojie Su
{"title":"Scale matching based remote sensing image cloud detection in southwest mountainous areas","authors":"Lulu Dong, Yu Chen, Nan-Nan Ke, Wenqing Tu, X. Zhang, Wen Dong, Xiaojie Su","doi":"10.1117/12.2655170","DOIUrl":"https://doi.org/10.1117/12.2655170","url":null,"abstract":"Sample quality is the key to automated cloud detection from regional remote sensing images, and scale is one of the major impediments to sample quality control. In this paper, we select the southwest mountainous area in China, which is fragmented, cloudy, and rainy, as the study area. We proposed a method for constructing a cloud detection dataset based on the idea of downscaling and the spectral characteristics of vegetation. Finally, we validated the dataset by the U-Net+ deep learning model. The experimental results show that the cloud detection accuracy reaches 95.11% when using the dataset constructed in this paper, which is approximately 40% higher than the cloud detection accuracy with large-scale samples. Additionally, it reduced the workload of masking a large number of samples for a specific region and realizing the possibility of efficient cloud detection in the region.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127878646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate expressions of target’s scattering information 目标散射信息的近似表达式
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655342
Manman Zhao, Dazhuan Xu, Tian Liu, Desen Zhang
{"title":"Approximate expressions of target’s scattering information","authors":"Manman Zhao, Dazhuan Xu, Tian Liu, Desen Zhang","doi":"10.1117/12.2655342","DOIUrl":"https://doi.org/10.1117/12.2655342","url":null,"abstract":"In this paper, the content related to scattering information is mainly focused in the presence of complex additive Gaussian white noise (CAGWN). In our previous works, the theoretical formula of the scattering information is already derived with integral operation. To get more brief expressions, we derive the approximate expressions in cases where the signal-to-noise ratio (SNR) is high and low separately. Noting that the a posteriori probability density function (PDF) obeys Gaussian distribution in the case of high SNR so it’s natural to derive the expression of the scattering information’s approximate expression on account of information theory. In low SNR regime, an approximate formula can be obtained with the reason of signal is submerged in the noise. Numerical results are presented to verify the effectiveness of the proposed approximation.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on lightweight encryption algorithm for IoT devices 面向物联网设备的轻量级加密算法研究
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655337
Rining Wang, Guangming Guo, Zhigang Wang, Zijian Meng, Jinan Li, Jinshuai Wang
{"title":"Research on lightweight encryption algorithm for IoT devices","authors":"Rining Wang, Guangming Guo, Zhigang Wang, Zijian Meng, Jinan Li, Jinshuai Wang","doi":"10.1117/12.2655337","DOIUrl":"https://doi.org/10.1117/12.2655337","url":null,"abstract":"In the Internet of Things (IoT) environment, embedded IoT devices have limited computing and storage resources. Their data lacks encryption protection. To solve this problem, this paper proposes a lightweight encryption algorithm based on SM4. First, this paper analyzed the encryption and decryption principle of SM4 algorithm. Then the S-box used in the encryption and decryption process was extended from high-order domain to low-order domain. The S-box component is constructed by a few logic gates to realize the lightness of the algorithm. Finally, the optimized SM4 module was embedded in the 5G communication terminal for testing. The results show that the lightweight encryption algorithm for IoT device can adapt to the data encryption of resource-constrained devices well. It is helpful to avoid the data leakage.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Greyscale correction algorithm for stripe edge of filter array multispectral image 滤波阵列多光谱图像条纹边缘的灰度校正算法
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655189
Tong Li, Wenbang Sun, X. Bai, Di Wu, Panpan Zhao, X. Zhang
{"title":"Greyscale correction algorithm for stripe edge of filter array multispectral image","authors":"Tong Li, Wenbang Sun, X. Bai, Di Wu, Panpan Zhao, X. Zhang","doi":"10.1117/12.2655189","DOIUrl":"https://doi.org/10.1117/12.2655189","url":null,"abstract":"Multispectral cameras of filter array are susceptible to interference streaks at the edges of each band due to the imaging mechanism and process characteristics. Aiming at the problem of interference streaks of multispectral image strips, a new method of grey correction algorithm for stripe edge is proposed. Firstly, determine the coordinates of the effective area of each strip image for strip image cropping; Secondly, a grey scale change function is fitted using the grey scale of pixels in the undisturbed area at the edges of each strip, and the grey scale of pixels in interference area at the edges of the strip is predicted to obtain the fitted pixel grey scale values; Then, the ratio of the grey value of each fitted pixel to the mean grey value of the true pixel is used as the grey correction factor for the corresponding row to eliminate edge interference stripes. Finally, the grey-scale processed images of each strip are stitched together to obtain a consistent grey-scale image of each single band. The theoretical analysis and experimental results show that this method can not only effectively solve the problem of grey-scale interference at the edges of the multispectral images of filter array, and can maintain the spectral information characteristics of the features to the maximum extent.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132068917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and implementation of network defense and non-repeated substring pattern matching algorithm 网络防御与非重复子串模式匹配算法的研究与实现
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655409
Xiaorong Duan, Chenni Dong, Xin Ma
{"title":"Research and implementation of network defense and non-repeated substring pattern matching algorithm","authors":"Xiaorong Duan, Chenni Dong, Xin Ma","doi":"10.1117/12.2655409","DOIUrl":"https://doi.org/10.1117/12.2655409","url":null,"abstract":"Cloud computing network and next-generation network is now widely used, which brings more security threats. Based on the process and the network tuples communication to construct defense system, the key technologies of defense under IPv4/IPv6 dual stack network are researched. It presents the NRLS Sunday based on improvement of the longest unique substring and Sunday algorithm, to avoid excessive repetitive character comparison and improve the matching efficiency of a single pattern string. Compared with BM, Sunday algorithm, the experiment shows the improved algorithm optimizes its time complexity. Under high-speed network, packet data contents is carried on rapid detection and analysis. Based on intelligent traffic restrictions for process and network, the intrusion detection and defense is conducted for network. In this paper, parallel packet detection method is studied under the high speed. Application web collaboration, and the unified arrangements and issued policies is applied in a complex network environment, proposing and realizing the effective method of defense in the complex network environment.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
City administrative region tourism route recommendation algorithm based on naive Bayes data mining 基于朴素贝叶斯数据挖掘的城市行政区域旅游路线推荐算法
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655184
Xiao Zhou, Jiangpeng Tian, Mengyuan Liu, Xinghan Zhou
{"title":"City administrative region tourism route recommendation algorithm based on naive Bayes data mining","authors":"Xiao Zhou, Jiangpeng Tian, Mengyuan Liu, Xinghan Zhou","doi":"10.1117/12.2655184","DOIUrl":"https://doi.org/10.1117/12.2655184","url":null,"abstract":"Aiming at the problems existing in the current tourism route planning, this paper constructs a city administrative region tourism route recommendation algorithm based on Naive Bayes data mining. The Naive Bayes classifier model is constructed through the attribute tag data of tourists’ once-visited scenic spots, and then the scenic spots in the target city are classified. The scenic spots are sorted according to the weighted Bayesian probability value of each classification, so as to recommend the scenic spots with the highest probability value for tourists. Based on the scenic spots with the optimal probability values, this paper constructs a tourism route algorithm with the lowest cost. Combined with the different travel modes of tourists, it searches the city tourism routes with the lowest cost on traveling distance, time and fee. At the same time, it provides two tourism decision-making plans according to the actual needs of tourists. Experiment shows that the proposed algorithm can recommend the scenic spots with the highest weighted probability value and satisfy the needs of tourists, and the traveling cost on the searched tourism route is the lowest.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131179973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack research of multilayer network vulnerability in the urban transport system 城市交通系统中多层网络漏洞攻击研究
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655174
Jie Cao, Jinyu Li, Liang Hou
{"title":"Attack research of multilayer network vulnerability in the urban transport system","authors":"Jie Cao, Jinyu Li, Liang Hou","doi":"10.1117/12.2655174","DOIUrl":"https://doi.org/10.1117/12.2655174","url":null,"abstract":"The urban public transport system comprises various networks representing different transportation modes with complex internal connections. The common single-layer complex network cannot fully describe the interior characteristics of the system. Therefore, this paper proposes a multi-layer network modeling method for the urban public transport system, which couples different traffic networks into multi-layer networks. We also proposed a centrality measurement of node transfer and designed an attack strategy called the multi-metric joint. The simulation experiment using the geographic information data of Chengdu urban public transport shows that the modeling method can completely and accurately describe the natural urban public transport system. And the multi-metric joint attack strategy is more effective than the traditional attack strategy, which will cause more severe damage to the network. This paper provides a new perspective and method for multilayer network modeling and vulnerability analysis of urban public transport systems.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"23 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132394455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach to maneuvering target tracking based on random motion model using random Kalman filtering 一种基于随机运动模型的机动目标跟踪新方法
International Conference on Signal Processing and Communication Security Pub Date : 2022-11-02 DOI: 10.1117/12.2655289
Jin Zhong, Yingting Luo, Y. Zhang, Shimeng Yao, Yunmin Zhu
{"title":"A novel approach to maneuvering target tracking based on random motion model using random Kalman filtering","authors":"Jin Zhong, Yingting Luo, Y. Zhang, Shimeng Yao, Yunmin Zhu","doi":"10.1117/12.2655289","DOIUrl":"https://doi.org/10.1117/12.2655289","url":null,"abstract":"Traditional maneuvering target tracking algorithms assume that the target motion model is one fixed or a limited number of them. For high-speed and strong maneuvering targets, when the model set cannot cover the maneuvering mode or the deviation is large, the performance of the tracker will drop rapidly. Therefore, this paper proposes a new maneuvering target tracking method – a random motion model based on Random Kalman Filtering (RKF). This algorithm uses a random model to describe the target maneuver, which is more widely used than traditional algorithms and is more stable when the target maneuver is not covered by the model set. Compared with the traditional single model, the classic related algorithm is Kalman Filtering (KF), the new method significantly improves the tracking effect when the target is maneuvering. At the same time, when the model set of the Interacting Multiple Model algorithm (IMM) does not match the real maneuvering state, the tracking error of the new method is smaller than IMM and there is no divergence trend.","PeriodicalId":105577,"journal":{"name":"International Conference on Signal Processing and Communication Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130775968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信