{"title":"Confront Phishing Attacks — from a Perspective of Security Education","authors":"T. Takata, Kanayo Ogura","doi":"10.1109/ICAwST.2019.8923444","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923444","url":null,"abstract":"Recently, targeted attacks are drastically increasing in both indivduals and companies. For technical countermeasure against such a targeted attack, various methods such as email/web contents analysis etc., are developed and realized. However, as it is often said, attackers precisely exploit the most vulnerable part in order to achieve their goals.Therefore, spear phishing against human user is employed for such attacks in a large propotion. Moreover, in order to increase success probability of such attacks, attackers often adopt social engineering technique.In this paper, we present a current effort of our research group on combating targeted attacks employing spear phishing with using social engineering, through user education.Specifically, at first we present relationship between human psychological characteristics and vulnerability against social engineering. The result can be used for testing whether a user has vulnerability on some social engineering technique, and the testing result can be utilized for countermeasure or user’s training.Secondly, we present development of a web-based self learning material for countermeasure against social engineering which employs interactive motion picture contents.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianwei Zhang, Taiga Otomo, Lin Li, Shinsuke Nakajima
{"title":"Cyberbullying Detection on Twitter using Multiple Textual Features","authors":"Jianwei Zhang, Taiga Otomo, Lin Li, Shinsuke Nakajima","doi":"10.1109/ICAwST.2019.8923186","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923186","url":null,"abstract":"Due to the spread of PCs and smartphones and the rise of user-generated content in social networking service, cyberbullying is also increasing and has become a serious risk that social media users may encounter. In this paper, we focus on the Japanese text on Twitter and construct an optimal model for automatic detection of cyberbullying by extracting multiple textual features and investigating their effects with multiple machine learning models. The experimental evaluation shows that the best model with predictive textual features is able to obtain an accuracy of over 90%.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129255852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Dual-images based Reversible Information Hiding Scheme based on Complexity Analysis and Thresholds Controlling","authors":"T. Lu, Jau-Ji Shen, Ting-Chi Chang","doi":"10.1109/ICAwST.2019.8923492","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923492","url":null,"abstract":"Information hiding is a method that can effectively transmit secret messages on the Internet or mobile environment. Among all kinds of information hiding methods, dual-images reversible information hiding technology has been paid a lot of attention recently because it has better image quality and embedding capacity and realizes the concept of secret sharing. Lu et al. proposed a block folding based reversible dual-images hiding scheme in 2017. They split the secret information into two sections and encode them into smaller digits to improve the quality of the camouflage image. However, this method requires an additional pixel to record section numbers, that will limit the amount of information stored. This study considers the complexity of the block to analysis how many bits can be concealed in the pixel to solve the problem. Two thresholds are used to control the image quality. Experimental results show that the proposed scheme indeed improves the hiding performance.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115224541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deep Learning Model for Dimensional ValenceArousal Intensity Prediction in Stock Market","authors":"Jheng-Long Wu, Chi-Sheng Yang, Kai-Hsuan Liu, Min-Tzu Huang","doi":"10.1109/ICAwST.2019.8923244","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923244","url":null,"abstract":"This paper proposes a dimensional valence-arousal method to define sentiment status in the stock market. In the past, many kinds of research have focused on the valence sentiment on stock messages because it represents the stock trend such as upward and downward. In this case, if the stock price jumps or collapses (positive/negative trend) in the short term, the investor will necessarily need to immediately trade at this moment, but some case is not. Therefore, the valence-arousal method can be used to define the trend intensity and trading intensity for a stock message of the stock market. In order to obtain a powerful prediction model to learn the intensity of trend and trading of a stock message that we propose a keyword-based attention network into Hierarchical Attention Networks (HAN), namely HKAN model, to learn the relation between dimensional sentiments (trend and trading) and stock messages. The experimental results show that our proposed HKAN model for stock VA prediction has outperformed other baseline models such as HAN and Hierarchical Hybrid Attention Networks.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115516194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Influences of Social Network Awareness on MOOC Learner Behaviors: Case of Chulalongkorn University Free MOOC","authors":"N. Cooharojananone, Orawun Moolpun, Pitchapa Pawong, Jidapa Dilokpabhapbhat, Thanaporn Rimnong-ang, Manutsaya Choosuwan, Pattamon Bunram, Suporn Pongnumkul","doi":"10.1109/ICAwST.2019.8923422","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923422","url":null,"abstract":"In 2017, Chulalongkorn University has started an online learning platform providing many interesting courses by Chulalongkorn University lecturers that allows anyone to learn for free (Chula MOOC). However, each course is opened for certain period of time. If any courses are popular, they will be re-opened for the next batch. For each batch, a Facebook group is created to connect between learners and the instructor. However, we noticed that even in some popular courses, there are some learners who completed the course and some who did not complete the course. From this problem, we think that the data from each course Facebook group might give us some useful information related to the motivation behavior to finish the course. Therefore, in this work, we analyzed data from Facebook graph API from a popular course in three batches using statistics. Data consists of the amount of activities, instructor activities, learners’ activities and instructor and learners’ interaction activities. We also used some information from Chula MOOC platform. The result shows that the Facebook group is an area where students participate in the interaction, which has helped to motivate other learners in the group or who may not be interested to continue their learning or complete their learning. We also introduce that the chatbot could help to motivate the students to complete their course. For example, sending the messages to encourage others or asking students in the time that seem to be more dropout. Currently, we are developing the chatbot for checking the hypothesis further.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sasikala, M. Bharathi, M. Ezhilarasi, S. Arunkumar
{"title":"Breast Cancer Detection Based on Medio-Lateral ObliqueView and Cranio-Caudal View Mammograms: An Overview","authors":"S. Sasikala, M. Bharathi, M. Ezhilarasi, S. Arunkumar","doi":"10.1109/ICAwST.2019.8923184","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923184","url":null,"abstract":"Breast cancer is a leading cause of death among women. At the early stage, no obvious symptoms were identified in breast cancer patients. Accurate detection of breast cancer at the earliest stage is very much essential to reduce mortality. Mammography has been used as a gold standard for over 40 years in diagnosing breast diseases. Interpretation of suspicious regions in screening mammograms is a subjective measure which depends on the image quality and the radiologist’s experience. Computer Aided Detection (CAD) systems are developed as an alternative to assist radiologist and clinicians in reliable and accurate diagnosis. Cranio-Caudal (CC) view and Medio-Lateral Oblique (MLO) view are commonly used for breast cancer detection and diagnosis.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122873563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Usability Design to Promote Awareness of Information Disseminated via Mobile Government Applications","authors":"Pinnaree Kureerung, L. Ramingwong","doi":"10.1109/ICAwST.2019.8923454","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923454","url":null,"abstract":"Mobile application have become the first choice for disseminating information in several situations. Many government agencies developed m-government applications, mainly for information dissemination and electronic services delivery. Information has great effects to citizen’s life in several ways. Warning messages are an obvious example. They are usually provided to people in affected or risk areas. Effective information dissemination of such information requires more than assembling them on the user interface. It requires a careful design. Designing how they are presented is not an easy task. Moreover, effective and efficient presentation can be difficult. Appropriate presentation aids in understanding of information and gives the correct clue on what to do next. This paper presents the analysis of usability factors to support design and development of m-government applications which main task is information dissemination. Existing usability models were analyzed. Hundreds of publications in related areas were reviewed. Then, usability factors to m-government applications were collected and clustered. The usability design framework is proposed to promote effective use of the usability factors in the development process. The framework is designed to support incorporation of usability factors that lead to usable interface. The factors included in the framework are Learnability Satisfaction, Memorability, Simplicity, Privacy, and Security.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117032371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of ECG based Personal Identification Performance in Different Bathtub Water Temperature by CNN","authors":"Jianbo Xu, Tianhui Li, Peng Cui, Wenxi Chen","doi":"10.1109/ICAwST.2019.8923503","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923503","url":null,"abstract":"This paper aims at exploring the variety of Electrocardiogram(ECG) interval and amplitude during different bathtub water temperature and eliminating their influence on personal identification with ECG. There are 10 subjects in the experiment, each subject collects 2 ECG recordings, each recording is at least 220 s. One recording is collected at 38±0.5 °C bathtub water temperature and the other recording is collected at 42±0.5 °C bathtub water temperature. All the raw ECG are removed baseline drift and normalized, then the R peaks are detected and all the R-R interval(RRI) and amplitude are calculated. Through statistical analysis method, we find that the median of RRI in low bathtub water temperature is bigger than in high bathtub water temperature for all subjects, and compared with low bathtub water temperature, the variety of R peaks amplitude has 3 situations in high bathtub water temperature: increase, decrease and unchanged. Then all the QRS complex are segmented and are taken as training data and test data. During the training stage, there are 3340 training datasets, 1670 training datasets are from low bathing water temperature and the other 1670 training datasets are from high bathing water temperature. In the testing stage, first we use 410 testing data which are from low bathtub water temperature to test the trained model, the best and robust identification rate is 87.07%, when we use the other 410 testing data which are from high bathtub water temperature to test the trained model, the best and robust identification rate is 87.32%. To the best of our knowledge, this is the first time to explore the variety of ECG interval and amplitude during different bathing water temperature. However, further improvements are still needed during different bathing environment.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114279950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of the Kansei Information obtained from Musical Scores via Machine Learning Algorithms : - Classification of Tempo into Two Classes Using Only Information Available in Musical Scores -","authors":"Satoshi Kawamura, Zhongda Liu, H. Yoshida","doi":"10.1109/ICAwST.2019.8923480","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923480","url":null,"abstract":"This study investigates whether machine learning algorithms can be used to accurately classify tempo into two classes based only on the musical note sequence written on musical scores. Herein, the tempo that is manually estimated by looking at the score is simulated via Kansei (emotional) information processing. The tempo threshold was set at ♩ = 120. Results showed that even after successful learning, the algorithms showed low recognition rates while classifying slow tempo class from the evaluation data and some data were erroneously recognized. In contrast, the algorithms showed high recognition rates when classifying fast tempo class from the evaluation data. The algorithms did not show any recognition error in the data.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128129308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}