2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)最新文献

筛选
英文 中文
Ransomware detection based on V-detector negative selection algorithm 基于v -检测器负选择算法的勒索软件检测
Tianliang Lu, Lu Zhang, Shunye Wang, Qi Gong
{"title":"Ransomware detection based on V-detector negative selection algorithm","authors":"Tianliang Lu, Lu Zhang, Shunye Wang, Qi Gong","doi":"10.1109/SPAC.2017.8304335","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304335","url":null,"abstract":"As a new type of malicious software, ransomware is one of the biggest security threats in recent years. Inspired by biological immune system, a ransomware detection method based on V-detector negative selection algorithm with mutation optimization is proposed, which is referred to op-RDVD. The behavioral features of ransomware are extracted through dynamic analysis, such as hard disk reading and writing, the document encryption and deletion, etc. Some of benign samples are used to build the self space. The variable-sized detectors are generated both randomly and extracted from ransomware. To improve the ransomware detection accuracy and efficiency, optimize the space distribution of detectors through clone and mutation, achieving maximized coverage of non-self space and minimized overlapping among detectors. The experimental results show that our algorithm has better detection ability than that of the previous method.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"2000 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133002166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Distracter-aware correlation filter tracking 干扰感知相关滤波器跟踪
Xiaohuan Lu, Zhenyu He
{"title":"Distracter-aware correlation filter tracking","authors":"Xiaohuan Lu, Zhenyu He","doi":"10.1109/SPAC.2017.8304244","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304244","url":null,"abstract":"We propose a distracter-aware Correlation Filters (CF) tracking algorithm, which exploits the information of dis-tracters to enhance the robustness of the tracker. Although most existing correlation filters based trackers achieve accurate tracking results, they may be less effective when similar distracters appear in the background. To this end, the proposed algorithm not only take the information of the target into consideration but also pay attention to the information of the distracters in the background. We first detect the distracters based on the response of CF model and then design a label map based on the information of the detected distracters. Unlike most existing CF based trackers which direct use a Gaussian shape label map, the proposed algorithm design a distracter-aware label map which makes the trained CF model effective to handle distracters. The proposed algorithm has several compelling advantages: it detects distracters, captures the discriminative information, which is crucial for robust tracking, enhances the robustness. We evaluate our proposed algorithm on the public OTB datasets, which including 50 sequences, and compare it with several state-of-the-art trackers. The comparable results show the effectiveness of the proposed algorithm.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilevel thresholding selection based on the fireworks algorithm for image segmentation 基于烟花算法的多级阈值选择图像分割
Hongwe Chen, Xingpeng Deng, Laiyi Yan, Z. Ye
{"title":"Multilevel thresholding selection based on the fireworks algorithm for image segmentation","authors":"Hongwe Chen, Xingpeng Deng, Laiyi Yan, Z. Ye","doi":"10.1109/SPAC.2017.8304271","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304271","url":null,"abstract":"With the increasing number of the threshold, the computation of the multilevel minimum cross entropy thresholding will increase exponentially, and the processing efficiency will be low, thus it is difficult to be applied in real-time processing. Some classical optimization algorithms, such as genetic algorithm, particle swarm algorithm has been used to deal with such problems, but it is easy for them to fall into the local optimal solution, the performance is not robust. In this paper, we use the minimum cross entropy to define the objective function of the optimal image segmentation thresholding, solve the optimization problem with the new intelligence optimization algorithm–fireworks algorithm, and compare it with other algorithm. The experimental results show that the fireworks algorithm can solve the problem of multilevel thresholds image segmentation with minimum cross entropy, which is a promising multilevel thresholding method, and it is not easy to fall into local optimal solution.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116913297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Leucorrhea-wet-film recognition based on coarse-to-fine CNN-SVM 基于粗到精CNN-SVM的白带湿膜识别
Xiang Tian, Rui Guo, Qingbin Wu, Meiqin Wang, Yuxuan Su
{"title":"Leucorrhea-wet-film recognition based on coarse-to-fine CNN-SVM","authors":"Xiang Tian, Rui Guo, Qingbin Wu, Meiqin Wang, Yuxuan Su","doi":"10.1109/SPAC.2017.8304338","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304338","url":null,"abstract":"Candida and leukocyte are two important indicators in the diagnosis of gynecological inflammation in microscopic images using the leucorrhea wet film. However, in the microscopic image of leucorrhea wet films, insignificant contrast between target and background, slight differences in texture, weak edges, drab gray on the whole, etc., make intelligent detection of white blood cells and Candida in the microscopic image of leucorrhea wet film extremely difficult. To tackle the problem, we propose a detection method based on coarse-to-fine CNN-SVM, in which the films are pre-filtered with a morphological opening operator, and then white blood cells are identified by using Hough circle detection, and finally, the feature extraction and classification of Candida are implemented based on coarse-to-fine CNN-SVM. Experminents results are also provide to demonstrate the performance of the proposed method.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"59 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116927982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved label noise identification by exploiting unlabeled data 利用未标记数据改进标签噪声识别
Hongqiang Wei, Qi Zhu, D. Guan, Weiwei Yuan, A. Khattak, Francis Chow
{"title":"Improved label noise identification by exploiting unlabeled data","authors":"Hongqiang Wei, Qi Zhu, D. Guan, Weiwei Yuan, A. Khattak, Francis Chow","doi":"10.1109/SPAC.2017.8304291","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304291","url":null,"abstract":"In machine learning, the available training samples are not always perfect and some labels can be corrupted which are called label noises. This may cause the reduction of accuracy. Meanwhile it will also increase the complexity of model. To mitigate the detrimental effect of label noises, noise filtering has been widely used which tries to identify label noises and remove them prior to learning. Almost all existing works only focus on the mislabeled training dataset and ignore the existence of unlabeled data. In fact, unlabeled data are easily accessible in many applications. In this work, we explore how to utilize these unlabeled data to increase the noise filtering effect. To this end, we have proposed a method named MFUDCM (Multiple Filtering with the aid of Unlabeled Data using Confidence Measurement). This method applies the novel multiple soft majority voting idea to make use unlabeled data. In addition, MFUDCM is expected to have a higher accuracy of identifying mislabeled data by using the concept of multiple voting. Finally, the validity of the proposed method MFUDCM is confirmed by experiments and the comparison results with other methods.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The extended collaborative representation-based classification 扩展的协作式基于表示的分类
Jianping Gou, Bing Hou, Weihua Ou, Jia Ke, Hebiao Yang, Yong Liu
{"title":"The extended collaborative representation-based classification","authors":"Jianping Gou, Bing Hou, Weihua Ou, Jia Ke, Hebiao Yang, Yong Liu","doi":"10.1109/SPAC.2017.8304260","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304260","url":null,"abstract":"Collaborative representation (CR), one of the well-known representation methods, has been widely used in pattern recognition. The collaborative representation-based classification (CRC) is to represent a test sample by the collaborative subspace of all the training samples from all classes. As an effective extension of CRC, the probabilistic collaborative representation-based classification (PCRC) calculates the probability of a test sample belonging to the collaborative subspace of all classes for classification. In the related CRC works, the representation fidelity is often measured by the ℓ2-norm of coding residual, but the ℓ1-norm fidelity is used very little. In fact, the representation fidelity with different coding residuals has a great effect on the CR-based classification performance. In this paper, to further improve the CR-based classification accuracy, we propose the extended CRC and PCRC by jointing the ℓ1-norm and ℓ2-norm of coding residuals on the representation fidelity. Besides, the extension of CRC is introduced by constraining the coding residual with ℓ1-norm. The experiments on four popular face databases show that the proposed extensions of CRC and PCRC perform very well.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123178163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SafeBox: A scheme for searching and sharing encrypted data in cloud applications SafeBox:一种在云应用程序中搜索和共享加密数据的方案
Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang
{"title":"SafeBox: A scheme for searching and sharing encrypted data in cloud applications","authors":"Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang","doi":"10.1109/SPAC.2017.8304356","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304356","url":null,"abstract":"Confidential data is often encrypted before it is uploaded to cloud servers. However, client-controlled encryption often poses a major barrier towards the full functionalities of cloud services. This paper presents SafeBox, a new Cloud Access Security Broker (CASB)-based approach that protects sensitive information against attackers with full control of cloud servers, and allows clients to search and share encrypted data transparently. It addresses the following challenges: First, SafeBox brings almost no loss of functionalities for protecting sensitive information in cloud applications. It safeguards not only textual input data but also uploaded files. Second, it allows a server to perform keyword-based searching over encrypted contents, and does not modify the current cloud interfaces or users' habits. Finally, it enables encrypted data sharing between different brokers efficiently. Our experimental evaluations on multiple cloud applications show that SafeBox has modest overheads and can be applied to practical use.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128356440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Thermal infrared object tracking via Siamese convolutional neural networks 基于暹罗卷积神经网络的热红外目标跟踪
Qiao Liu, Di Yuan, Zhenyu He
{"title":"Thermal infrared object tracking via Siamese convolutional neural networks","authors":"Qiao Liu, Di Yuan, Zhenyu He","doi":"10.1109/SPAC.2017.8304241","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304241","url":null,"abstract":"In this paper, we propose a novel thermal infrared (TIR) tracker via a deep Siamese convolutional neural network (CNN), named Siamesetir. Different from the most existing discriminative TIR tracking methods which treat the tracking problem as a classification problem, we treat the TIR tracking problem as a similarity verification problem. Specifically, we design a novel Siamese convolutional neural network which coalesces the multiple convolution layers to obtain richer information for tracking. Then, we train this network end to end on a large video detection dataset to learn the similarity of two arbitrary objects. Next, this pre-trained Siamese network is regarded as a similarity function simply used to evaluate the similarity between the initial target and candidates. Finally, we locate the most similar one without any adapting in the tracking process. To evaluate the performance of our TIR tracker, we conduct the experiments on the TIR tracking benchmark VOT-TIR2016. The experimental results show that the proposed method achieves very competitive performance.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The prediction on the election of representatives 对众议员选举的预测
Binyang Li, Dongdong Guo, M. Chang, Meng Li, Anny Bian
{"title":"The prediction on the election of representatives","authors":"Binyang Li, Dongdong Guo, M. Chang, Meng Li, Anny Bian","doi":"10.1109/SPAC.2017.8304299","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304299","url":null,"abstract":"The Senate and House of Representatives (SHR) are the decision-making departments of its national policy and development strategy. It is very significant to predict the election of SHR, so that one can understand the political trending of the nation and judge the bilateral relationship with other nations. In this paper, two types of datasets towards SHR election are constructed, including 4 election results of the Senate and the House of Representatives, and the questionnaire data of the senators and representatives collected by the University of Tokyo. Based on the above datasets, this paper conducts experiments on the prediction of SHR election and the analysis via classic methods, involving decision tree model, naive Bayesian classification model, and the support vector machine model. According to the results, the support vector machine model achieves the best performance on the election dataset with the F1 score of 88.11% on the senate election prediction, which will be further improved to 89.37% when combining with the questionnaires data set.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133955822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Height estimation of 3D surface based PMS in the natural environment 自然环境下基于PMS的三维表面高度估计
Ziqi Zhou, Zhenyu Guo, Xiaoting Sun
{"title":"Height estimation of 3D surface based PMS in the natural environment","authors":"Ziqi Zhou, Zhenyu Guo, Xiaoting Sun","doi":"10.1109/SPAC.2017.8304353","DOIUrl":"https://doi.org/10.1109/SPAC.2017.8304353","url":null,"abstract":"Height estimation of 3D surface based PMS is generally performed in the condition of distance point lighting source and certain ambient light; the intensity of the ambient light is far lower than lighting condition. Due to 3D shape perception of human eyes is more accurate in natural environment. This paper puts forward a new application of using three images to estimate its 3D shape under the natural environment. Experimental results shown that 3D shape estimation of object under the natural environment is accurate, moreover it reduces the complexity of the equipment and the restructured surface is allowed to have certain shading.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信