2018 Eleventh International Conference on Contemporary Computing (IC3)最新文献

筛选
英文 中文
A Novel Approach for Detecting Malware in Android Applications Using Deep Learning 一种利用深度学习检测Android应用中恶意软件的新方法
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530668
Prashant Kaushik, P. Yadav
{"title":"A Novel Approach for Detecting Malware in Android Applications Using Deep Learning","authors":"Prashant Kaushik, P. Yadav","doi":"10.1109/IC3.2018.8530668","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530668","url":null,"abstract":"Detection of android malware depends on the feature vector extraction of android applications statically and dynamically. Static analysis has advantage over dynamic analysis as it covers all source code from byte code and manifest files which contains the permission for applications whereas dynamic analysis of the APK files includes the features like the no. of system calls an application makes, network url it access etc. Feature vector updation in the dataset due to version updates of application creates a challenge for the existing tool to classify the application as malicious or benign. This work creates an combination of neural network and automated tool which collects and updates the feature vectors in the training dataset. This dataset is used by the neural network for its reinforcement training for better classification and classify the application in three classes malicious, benign and can't say. Tensor flow is used for making a neural network which learn from the data extracted in the form of feature vector and classify the applications in the category of malicious, benign or can't say. The work has been able to achieve accuracy of over 80% for a dataset of 1000 sample applications with over 15 different feature vector extracted using designed automated feature vector collection modules.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"138 1 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Comparative Study of Spam SMS Detection Using Machine Learning Classifiers 基于机器学习分类器的垃圾短信检测比较研究
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530469
Mehul Gupta, Aditya Bakliwal, Shubhangi Agarwal, Pulkit Mehndiratta
{"title":"A Comparative Study of Spam SMS Detection Using Machine Learning Classifiers","authors":"Mehul Gupta, Aditya Bakliwal, Shubhangi Agarwal, Pulkit Mehndiratta","doi":"10.1109/IC3.2018.8530469","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530469","url":null,"abstract":"With technological advancements and increment in content based advertisement, the use of Short Message Service (SMS) on phones has increased to such a significant level that devices are sometimes flooded with a number of spam SMS. These spam messages can lead to loss of private data as well. There are many content-based machine learning techniques which have proven to be effective in filtering spam emails. Modern day researchers have used some stylistic features of text messages to classify them to be ham or spam. SMS spam detection can be greatly influenced by the presence of known words, phrases, abbreviations and idioms. This paper aims to compare different classifying techniques on different datasets collected from previous research works, and evaluate them on the basis of their accuracies, precision, recall and CAP Curve. The comparison has been performed between traditional machine learning techniques and deep learning methods.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"36 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123278485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Teaching Methodology for IoT Workshop Course Using Node-RED 基于Node-RED的物联网工作坊课程教学方法
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530664
R. Krishnamurthi
{"title":"Teaching Methodology for IoT Workshop Course Using Node-RED","authors":"R. Krishnamurthi","doi":"10.1109/IC3.2018.8530664","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530664","url":null,"abstract":"In recent years, due to the expected exponential growth of Internet of Things (IoT), there is huge demand for adapting IoT in many key situations like day to day life, Industries, Healthcare systems, education systems, smart cites, smart grid, etc. It is also clearly evident that, IoT technology generates huge demand for job opportunities and revenues particularly in the Information technology sector. Thus, there is definite raising demand for IoT professionals. This aspect is highly motivating to teach IoT course as one the major courses for undergraduate engineering students at Universities. IoT is an amalgamation of hardware and software, the students should be exposed to learn and harness their skills in both concepts and technology thoroughly. In this paper, we proposed once such state-of-art laboratory based IoT course named IoT workshop and is offered for the undergraduate engineering students. In this paper, we discuss our experience to highlight need for IoT course, using Node-RED visual programming language, course content, learning objectives, assessment of course, and project ideas.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing Influence Maximization in Social Networks Using Parallel Reverse Reachability Set Computations 利用并行反向可达集计算增强社交网络中的影响最大化
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530640
Mridul Haque, D. Banerjee
{"title":"Enhancing Influence Maximization in Social Networks Using Parallel Reverse Reachability Set Computations","authors":"Mridul Haque, D. Banerjee","doi":"10.1109/IC3.2018.8530640","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530640","url":null,"abstract":"Influence Maximization (IM) is the problem of finding a small subset of nodes from a large social network which can potentially spread influence in the maximally. IM finds widespread applications in viral marketing, targeted advertisement, control of epidemics and feed recommendations. In recent years several novel solutions have been proposed [9], [13], [14] for solving IM which have progressively given asymptotically superior results than the previous. In general IM algorithms can take up to several days to find the maximal influence nodes on billion scale social networks. In this work, we carefully observe the execution profile of a state-of-the-art solution (Stop and Stare (SSA) [14]) and investigate opportunities for parallelization. IM algorithms typically involve randomization, and we propose to exploit some of the architectural and programming benefits offered by modern processors so as to achieve quicker execution. We propose a new algorithm for parallel generation and storage of random samples in the SSA algorithm and implement them on both multi-core and many-core processors. We show that our solution provides nearly 1.8x improvement in running times on a large social network, while ensuring that the maximal influence computed using our technique is at par with the original solution.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Influence Maximization Using Genetic Algorithm with Dynamic Probabilities 动态概率遗传算法的社会影响最大化
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530626
Sakshi Agarwal, S. Mehta
{"title":"Social Influence Maximization Using Genetic Algorithm with Dynamic Probabilities","authors":"Sakshi Agarwal, S. Mehta","doi":"10.1109/IC3.2018.8530626","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530626","url":null,"abstract":"The previous decades have observed the exponential growth of online social networks, where billions of users exchange information with each other and generate tremendously large quantity of the content. This dominance of social networks in our daily life has encouraged more consideration of researcher in the field of information diffusion, where a small bit of information could widespread through “world of mouth” effect. One of the key research problems in information diffusion is influence maximization, which is a NP-hard problem. Influence Maximization (IM) is the problem to find k number of nodes that are most influential nodes of the network, which can maximize the information propagation in the network. Various heuristics available to find most influencing nodes of the network include random, high degree, single discount, general greedy and genetic algorithm with weighted cascade etc. In this paper, we proposed dynamic probability based genetic approach using topic affinity propagation (TAP) method to find the optimal set of influential nodes of the network. The efficiency of the proposed approach is analyzed on two large-scale networks. Results express that the proposed algorithm is able to improve the influence spread by 6% to 13% with respect to various influence maximization heuristics.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134114877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Recommendation Systems: Past, Present and Future 推荐系统:过去、现在和未来
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530620
S. Nehete, S. Devane
{"title":"Recommendation Systems: Past, Present and Future","authors":"S. Nehete, S. Devane","doi":"10.1109/IC3.2018.8530620","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530620","url":null,"abstract":"Every customer want to buy his product having preferred by all his friends in surrounding environment. User communicates to the surrounding people regarding all purchases and give extreme importance to these people's choice, views and preferences. In today's world of competitive environment, surplus amount of products information is available in terms of ratings and reviews on all shopping sites. Before purchasing product, People often like to go through product reviews mentioned on websites. This data of reviews has increased terrifically and it is not easy to collect, store and analyse these reviews within a “tolerable elapsed time”. Therefore, optimal recommendation system is required which will analyse product data based on ratings and reviews. Collaborative filtering will make use of user-item rating matrix given by the user to calculate user and item similarity. Alongwith the analysis of clustered reviews of user's neighbours, these rating similarities will help to give optimized recommendation. Thus it will give strong confirmation to avoid irrelevant recommendation. Also it will provide strong solution to cold start problem.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131493836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Stacked Technique for Gender Recognition Through Voice 语音性别识别的堆叠技术
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530520
Pramit Gupta, Somya Goel, Archana Purwar
{"title":"A Stacked Technique for Gender Recognition Through Voice","authors":"Pramit Gupta, Somya Goel, Archana Purwar","doi":"10.1109/IC3.2018.8530520","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530520","url":null,"abstract":"Detecting the gender of a person (male or female) through their voice seems to be a very trivial task for humans. Our minds are trained over the course of time to detect the differences in voices of males and females. Our ears work as the front end, receiving the audio signals which our brain processes and makes the decision. But it is a challenging problem for computers. Gender classification has applications like, it is able to improve the intelligence of a surveillance system, analyze the customer's demands for store management, and allow the robots to perceive gender etc. This paper proposes a stacked machine learning algorithm to determine gender using the acoustic parameters of voice sample and compares its performance with existing classifiers as CART, Random forest and neural network.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Mitigation and Detection of DDoS Attacks in Software Defined Networks 软件定义网络中DDoS攻击的缓解和检测
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530514
Shariq Murtuza, Krishna Asawa
{"title":"Mitigation and Detection of DDoS Attacks in Software Defined Networks","authors":"Shariq Murtuza, Krishna Asawa","doi":"10.1109/IC3.2018.8530514","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530514","url":null,"abstract":"The Software Defined Networking (SDN) paradigm is expected to heavily integrate into future networks. Enterprises have already started migrating their networks to SDNs. Billions of smart devices constituting the Internet of Things will be connected to these high speed networks and will be communicating over these networks. The ubiquity of these networks along with the user devices connected to them becomes of paramount importance for the end users. This work presents a SDN switch based module to detect a Denial Of Service attack on the network and its connected components. The module analyzes each packet that comes to the switch and allocates a fitness score to each packet. The packets are labeled as safe, risky or dangerous and then they are either allowed to pass, proxied via a buffering system, or dropped immediately respectively.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127172553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted Trees 基于梯度提升树的多类分类单参数算法时间复杂度预测
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530473
D. Sharma, Sumit K. Vohra, Tarun Gupta, Vipul Goyal
{"title":"Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted Trees","authors":"D. Sharma, Sumit K. Vohra, Tarun Gupta, Vipul Goyal","doi":"10.1109/IC3.2018.8530473","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530473","url":null,"abstract":"The amount of code written has increased significantly in recent years and it has become one of the major tasks to judge the time-complexities of these codes. Multi-Class classification using machine learning enables us to categorize these algorithms into classes with the help of machine learning tools like gradient boosted trees. It also increases the accuracy of predicting the asymptotic-time complexities of the algorithms, thereby considerably reducing the manual effort required to do this task, at the same time increasing the accuracies of prediction. A novel concept of predicting time complexity using gradient boosted trees in a supervised manner is introduced in this paper.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Dependency Based Collaborative Method for Requirement Prioritization 基于依赖的需求优先级协作方法研究
2018 Eleventh International Conference on Contemporary Computing (IC3) Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530542
Ankita Gupta, Chetna Gupta
{"title":"Towards Dependency Based Collaborative Method for Requirement Prioritization","authors":"Ankita Gupta, Chetna Gupta","doi":"10.1109/IC3.2018.8530542","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530542","url":null,"abstract":"This paper proposes a dependency based collaborative requirement prioritization method which takes into account multiple criteria's for obtaining individual preference in the form of initial ranking from both stakeholders and developers. The proposed approach is an effective mechanism to extract relevant knowledge in terms of initial priority given by stakeholders and analysis of requirement inter relationships expressed as the initial priority from developers and final ranking computed through a weighted score.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信