{"title":"A Novel Approach for Detecting Malware in Android Applications Using Deep Learning","authors":"Prashant Kaushik, P. Yadav","doi":"10.1109/IC3.2018.8530668","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530668","url":null,"abstract":"Detection of android malware depends on the feature vector extraction of android applications statically and dynamically. Static analysis has advantage over dynamic analysis as it covers all source code from byte code and manifest files which contains the permission for applications whereas dynamic analysis of the APK files includes the features like the no. of system calls an application makes, network url it access etc. Feature vector updation in the dataset due to version updates of application creates a challenge for the existing tool to classify the application as malicious or benign. This work creates an combination of neural network and automated tool which collects and updates the feature vectors in the training dataset. This dataset is used by the neural network for its reinforcement training for better classification and classify the application in three classes malicious, benign and can't say. Tensor flow is used for making a neural network which learn from the data extracted in the form of feature vector and classify the applications in the category of malicious, benign or can't say. The work has been able to achieve accuracy of over 80% for a dataset of 1000 sample applications with over 15 different feature vector extracted using designed automated feature vector collection modules.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"138 1 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study of Spam SMS Detection Using Machine Learning Classifiers","authors":"Mehul Gupta, Aditya Bakliwal, Shubhangi Agarwal, Pulkit Mehndiratta","doi":"10.1109/IC3.2018.8530469","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530469","url":null,"abstract":"With technological advancements and increment in content based advertisement, the use of Short Message Service (SMS) on phones has increased to such a significant level that devices are sometimes flooded with a number of spam SMS. These spam messages can lead to loss of private data as well. There are many content-based machine learning techniques which have proven to be effective in filtering spam emails. Modern day researchers have used some stylistic features of text messages to classify them to be ham or spam. SMS spam detection can be greatly influenced by the presence of known words, phrases, abbreviations and idioms. This paper aims to compare different classifying techniques on different datasets collected from previous research works, and evaluate them on the basis of their accuracies, precision, recall and CAP Curve. The comparison has been performed between traditional machine learning techniques and deep learning methods.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"36 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123278485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching Methodology for IoT Workshop Course Using Node-RED","authors":"R. Krishnamurthi","doi":"10.1109/IC3.2018.8530664","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530664","url":null,"abstract":"In recent years, due to the expected exponential growth of Internet of Things (IoT), there is huge demand for adapting IoT in many key situations like day to day life, Industries, Healthcare systems, education systems, smart cites, smart grid, etc. It is also clearly evident that, IoT technology generates huge demand for job opportunities and revenues particularly in the Information technology sector. Thus, there is definite raising demand for IoT professionals. This aspect is highly motivating to teach IoT course as one the major courses for undergraduate engineering students at Universities. IoT is an amalgamation of hardware and software, the students should be exposed to learn and harness their skills in both concepts and technology thoroughly. In this paper, we proposed once such state-of-art laboratory based IoT course named IoT workshop and is offered for the undergraduate engineering students. In this paper, we discuss our experience to highlight need for IoT course, using Node-RED visual programming language, course content, learning objectives, assessment of course, and project ideas.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Influence Maximization in Social Networks Using Parallel Reverse Reachability Set Computations","authors":"Mridul Haque, D. Banerjee","doi":"10.1109/IC3.2018.8530640","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530640","url":null,"abstract":"Influence Maximization (IM) is the problem of finding a small subset of nodes from a large social network which can potentially spread influence in the maximally. IM finds widespread applications in viral marketing, targeted advertisement, control of epidemics and feed recommendations. In recent years several novel solutions have been proposed [9], [13], [14] for solving IM which have progressively given asymptotically superior results than the previous. In general IM algorithms can take up to several days to find the maximal influence nodes on billion scale social networks. In this work, we carefully observe the execution profile of a state-of-the-art solution (Stop and Stare (SSA) [14]) and investigate opportunities for parallelization. IM algorithms typically involve randomization, and we propose to exploit some of the architectural and programming benefits offered by modern processors so as to achieve quicker execution. We propose a new algorithm for parallel generation and storage of random samples in the SSA algorithm and implement them on both multi-core and many-core processors. We show that our solution provides nearly 1.8x improvement in running times on a large social network, while ensuring that the maximal influence computed using our technique is at par with the original solution.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Influence Maximization Using Genetic Algorithm with Dynamic Probabilities","authors":"Sakshi Agarwal, S. Mehta","doi":"10.1109/IC3.2018.8530626","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530626","url":null,"abstract":"The previous decades have observed the exponential growth of online social networks, where billions of users exchange information with each other and generate tremendously large quantity of the content. This dominance of social networks in our daily life has encouraged more consideration of researcher in the field of information diffusion, where a small bit of information could widespread through “world of mouth” effect. One of the key research problems in information diffusion is influence maximization, which is a NP-hard problem. Influence Maximization (IM) is the problem to find k number of nodes that are most influential nodes of the network, which can maximize the information propagation in the network. Various heuristics available to find most influencing nodes of the network include random, high degree, single discount, general greedy and genetic algorithm with weighted cascade etc. In this paper, we proposed dynamic probability based genetic approach using topic affinity propagation (TAP) method to find the optimal set of influential nodes of the network. The efficiency of the proposed approach is analyzed on two large-scale networks. Results express that the proposed algorithm is able to improve the influence spread by 6% to 13% with respect to various influence maximization heuristics.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134114877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommendation Systems: Past, Present and Future","authors":"S. Nehete, S. Devane","doi":"10.1109/IC3.2018.8530620","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530620","url":null,"abstract":"Every customer want to buy his product having preferred by all his friends in surrounding environment. User communicates to the surrounding people regarding all purchases and give extreme importance to these people's choice, views and preferences. In today's world of competitive environment, surplus amount of products information is available in terms of ratings and reviews on all shopping sites. Before purchasing product, People often like to go through product reviews mentioned on websites. This data of reviews has increased terrifically and it is not easy to collect, store and analyse these reviews within a “tolerable elapsed time”. Therefore, optimal recommendation system is required which will analyse product data based on ratings and reviews. Collaborative filtering will make use of user-item rating matrix given by the user to calculate user and item similarity. Alongwith the analysis of clustered reviews of user's neighbours, these rating similarities will help to give optimized recommendation. Thus it will give strong confirmation to avoid irrelevant recommendation. Also it will provide strong solution to cold start problem.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131493836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Stacked Technique for Gender Recognition Through Voice","authors":"Pramit Gupta, Somya Goel, Archana Purwar","doi":"10.1109/IC3.2018.8530520","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530520","url":null,"abstract":"Detecting the gender of a person (male or female) through their voice seems to be a very trivial task for humans. Our minds are trained over the course of time to detect the differences in voices of males and females. Our ears work as the front end, receiving the audio signals which our brain processes and makes the decision. But it is a challenging problem for computers. Gender classification has applications like, it is able to improve the intelligence of a surveillance system, analyze the customer's demands for store management, and allow the robots to perceive gender etc. This paper proposes a stacked machine learning algorithm to determine gender using the acoustic parameters of voice sample and compares its performance with existing classifiers as CART, Random forest and neural network.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigation and Detection of DDoS Attacks in Software Defined Networks","authors":"Shariq Murtuza, Krishna Asawa","doi":"10.1109/IC3.2018.8530514","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530514","url":null,"abstract":"The Software Defined Networking (SDN) paradigm is expected to heavily integrate into future networks. Enterprises have already started migrating their networks to SDNs. Billions of smart devices constituting the Internet of Things will be connected to these high speed networks and will be communicating over these networks. The ubiquity of these networks along with the user devices connected to them becomes of paramount importance for the end users. This work presents a SDN switch based module to detect a Denial Of Service attack on the network and its connected components. The module analyzes each packet that comes to the switch and allocates a fitness score to each packet. The packets are labeled as safe, risky or dangerous and then they are either allowed to pass, proxied via a buffering system, or dropped immediately respectively.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127172553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sharma, Sumit K. Vohra, Tarun Gupta, Vipul Goyal
{"title":"Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted Trees","authors":"D. Sharma, Sumit K. Vohra, Tarun Gupta, Vipul Goyal","doi":"10.1109/IC3.2018.8530473","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530473","url":null,"abstract":"The amount of code written has increased significantly in recent years and it has become one of the major tasks to judge the time-complexities of these codes. Multi-Class classification using machine learning enables us to categorize these algorithms into classes with the help of machine learning tools like gradient boosted trees. It also increases the accuracy of predicting the asymptotic-time complexities of the algorithms, thereby considerably reducing the manual effort required to do this task, at the same time increasing the accuracies of prediction. A novel concept of predicting time complexity using gradient boosted trees in a supervised manner is introduced in this paper.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Dependency Based Collaborative Method for Requirement Prioritization","authors":"Ankita Gupta, Chetna Gupta","doi":"10.1109/IC3.2018.8530542","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530542","url":null,"abstract":"This paper proposes a dependency based collaborative requirement prioritization method which takes into account multiple criteria's for obtaining individual preference in the form of initial ranking from both stakeholders and developers. The proposed approach is an effective mechanism to extract relevant knowledge in terms of initial priority given by stakeholders and analysis of requirement inter relationships expressed as the initial priority from developers and final ranking computed through a weighted score.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}