2018 14th International Conference on Computational Intelligence and Security (CIS)最新文献

筛选
英文 中文
Robust Stability Analysis for Uncertain Time-Varying Delay Neutral Systems 不确定时变时滞中立型系统的鲁棒稳定性分析
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00054
Ruliang Wang, Xiaoli Pei
{"title":"Robust Stability Analysis for Uncertain Time-Varying Delay Neutral Systems","authors":"Ruliang Wang, Xiaoli Pei","doi":"10.1109/CIS2018.2018.00054","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00054","url":null,"abstract":"In this paper, we study the stability of a class of uncertain time-varying delay neutral systems. By constructing Lyapunov functions containing four integral integrals, using the techniques and methods of various types of inequalities, we can get the conclusion about the system Robust stability Finally, this conclusion is verified through the LMI toolbox in MATLAB.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constructing Business Simulation Training Platform Based on Workflow Management Systems 基于工作流管理系统的商务模拟培训平台构建
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00075
Ya-juan Yang, Liangliang Zhang, Quan-ju Zhang
{"title":"Constructing Business Simulation Training Platform Based on Workflow Management Systems","authors":"Ya-juan Yang, Liangliang Zhang, Quan-ju Zhang","doi":"10.1109/CIS2018.2018.00075","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00075","url":null,"abstract":"Since the concept of workflow originates from the fields of production organization and office automation in 1970s, workflow technology research and related product development have entered a more prosperous stage during the 80s. Presently, workflow management technology has been successfully applied to libraries, hospitals, insurance companies and, of the most important, to the industrial fields. This paper aims at how the workflow-based technology can be applied to the area of intelligent education. We focus the attention on some important aspects of constructing business training platform with the workflow management system technology based-on, such as the construction framework, platform functions and implementation. Mean-while, workflow reference model design is presented and the workflow-based scheduling is carried out that will be employed in the developing process. Moreover, we point out the follow-up development potentials for constructing other wisdom training platform based on the workflow management systems.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Certificateless Proxy Signcryption Using Cyclic Multiplication Groups 使用循环乘法组的无证书代理签名加密
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00101
Hui-fang Yu
{"title":"Certificateless Proxy Signcryption Using Cyclic Multiplication Groups","authors":"Hui-fang Yu","doi":"10.1109/CIS2018.2018.00101","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00101","url":null,"abstract":"Proxy signcryption is that the proxy signcrypter obtains the delegate authorization from the original signcrypter, and then signcrypts the specified message on behalf of the original signcrypter. In this paper, the author constructs a novel certificateless proxy signcryption scheme based on three cyclic multiplication groups and its security bases on the intractability of the co-bilinear Diffie-Hellman (co-BDH) and co-computational Diffie-Hellman (co-CDH) problems. Our certificateless proxy signcryption scheme is very appropriate for applications in electric commerce and electric government.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132295943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs 基于RMM的建筑楼梯中文设计规范分词方法
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00068
Jie-lan Zhang, Yi Chen, Xinhong Hei, Lei Zhu, Qingpan Zhao, Yichuan Wang
{"title":"A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs","authors":"Jie-lan Zhang, Yi Chen, Xinhong Hei, Lei Zhu, Qingpan Zhao, Yichuan Wang","doi":"10.1109/CIS2018.2018.00068","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00068","url":null,"abstract":"With the rapid development of information technology, knowledge graph extracts more and more attentions from researchers. However, Chinese knowledge graph of construction industry is still at the beginning stage, and Chinese word segmentation method, as the basis of natural language processing, plays a vital role on the process of building knowledge graph. In this paper, we study Chinese design specifications of building stairs, and proposes a reverse maximum matching (RMM) based word segmentation method to parse Chinese building specifications. The proposed method first converts the dictionary of building into a hash dictionary. And then, by traversing the design specifications of building stairs, the proposed method handles the non-Chinese symbols in the design specifications. Finally, the proposed method uses RMM algorithm to match contexts with Chinese design specifications and generate the goal results. Through performing experiments on Chinese design specifications of building stairs, the results can be shown that the proposed method is feasible.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115324538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Parallel Host Log Analysis Approach Based on Spark 基于Spark的并行主机日志分析方法
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00073
Xinpeng Li, Yong Wang, Hao Feng, Wenlong Ke
{"title":"A Parallel Host Log Analysis Approach Based on Spark","authors":"Xinpeng Li, Yong Wang, Hao Feng, Wenlong Ke","doi":"10.1109/CIS2018.2018.00073","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00073","url":null,"abstract":"Intrusion detection plays a key role in maintaining the security of computer networks. Host-based intrusion detection systems usually analyze log data to discover host abnormal behavior. In recent years, with the rapid growth of massive host log data generated by virtual machines in the cloud environment, the traditional log analysis methods are limited by factors such as single data source, independent data, large data volume, and insufficient single-point computing capability. To solve this problem, this paper proposes a Spark-based host log data processing method, which first expands the data dimension based on Spark SQL to obtain more detailed dimensional data; then accomplish the query (especially union query) and counting complex data for more comprehensive host health used Spark SQL. Series of experiments result show that our proposed method can achieve platform scalability and has well time performance in log data processing.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Security Evaluation Method for Voice-over-IP Streaming Media Information Hiding ip话音流媒体信息隐藏的安全评估方法
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00057
Xiaoyan Hu, Lejun Zhang, Tianwen Huang, Xiaoying Lei
{"title":"A Security Evaluation Method for Voice-over-IP Streaming Media Information Hiding","authors":"Xiaoyan Hu, Lejun Zhang, Tianwen Huang, Xiaoying Lei","doi":"10.1109/CIS2018.2018.00057","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00057","url":null,"abstract":"Ensuring the security of a communication system is the key step of information hiding. With the rapid development of Internet technology and the increasingly complex network environment, more and more secret information needs to be transmitted over the network. Voice over IP (VoIP) is based on the IP network of digital transmission technology, taking voice services in VoIP as a steganographic carrier is one of the important methods for secure transmission of secret information. In this paper, we will start with the communication principle of VoIP streaming media information hiding, and gives the definition of imperceptibility, undetectability, irreducibility, unattackable, and insensitivity of VoIP streaming information hiding, and then analyze the covert communication process of steganography for VoIP. Finally, a security evaluation method based on information hiding of VoIP streaming media is proposed.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improvement Evolutionary Algorithm Based on Grid-Based Pareto Dominance for Many-Objective Optimization 基于网格Pareto优势的多目标优化改进进化算法
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00012
Cai Dai, Yanjun Ji, Juan Li
{"title":"An Improvement Evolutionary Algorithm Based on Grid-Based Pareto Dominance for Many-Objective Optimization","authors":"Cai Dai, Yanjun Ji, Juan Li","doi":"10.1109/CIS2018.2018.00012","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00012","url":null,"abstract":"Pareto dominance based Multi-objective Evolutionary Algorithms (MOEAs) is an effective method for solving multi-objective problems with two or three objectives. However, in many-objective problems, the determination of the solution set scale is a challenge which highly limits the performance of existing MOEAs. The small quantity of solution set in MOEA may lead to large non-dominance area which dramatically reduces the selection pressure, while large scale solution set will inevitably increases the time and memory consumption. In order to solve this problem, in this paper, a grid-based Pareto dominance approach is proposed for many-objective problem. In this approach, one single solution is used to create the non-dominance area which approximates that used to be determined by a set of solutions in MOEA. Moreover, in this approach, both the selection pressure, diversity of solutions and time and memory consumption are taken into consideration by utilizing the smallest number of virtual solutions to determine whether a solution is a non-dominance solution. In this paper, a new MOEA based on the grid-based Pareto dominance is designed for many-objective problems. In the experiment, the well-known algorithms and relaxed forms of Pareto dominance are used to compare with the algorithm and the grid-based Pareto dominance. The experimental results show that the proposed approaches can guide the search for many-objective spaces to converge to the true PF and maintain the diversity of solutions.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Improved Weighted Local Linear Embedding Algorithm 一种改进的加权局部线性嵌入算法
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00090
Qing Wu, Zongxian Qi, Zhicang Wang, Yu Zhang
{"title":"An Improved Weighted Local Linear Embedding Algorithm","authors":"Qing Wu, Zongxian Qi, Zhicang Wang, Yu Zhang","doi":"10.1109/CIS2018.2018.00090","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00090","url":null,"abstract":"Local linear embedding has the characteristics of nonlinearity and simple implementation, but it cannot accurately handle the selection of neighborhoods under the conditions of noise, large curvature and sparse sampling. To solve this problem, an improved weighted local linear embedding method (WLE-LLE) is proposed. In WLE-LLE, the dimensionality reduction objective function is reconstructed by utilizing Laplacian Eigenmaps, which can effectively represent the manifold structure of nonlinear data. Theoretical analyses show the proposed method is better than LLE algorithm in preserving the original manifold structure of the data. And numerical experiments show its classification recognition rate is greatly improved, which is 2%-8% higher than LLE.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115991114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Influence of Distributed Generation Connection on Dynamic Characteristics of Power Grid 分布式发电并网对电网动态特性的影响
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00085
Kangshun Li, Yi Wang
{"title":"Influence of Distributed Generation Connection on Dynamic Characteristics of Power Grid","authors":"Kangshun Li, Yi Wang","doi":"10.1109/CIS2018.2018.00085","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00085","url":null,"abstract":"The power grid is an artificial network. Studying the complex power grid with distributed generation is of great significance to people's life, production and social stability. This paper studies synchronous and operational reliability of power grid when distributed generation enter the network from the dynamic point of view. It is found that the more the power output of distributed generation is, the more easy the power grid is to synchronize and the stronger the resistance to disturbance when distributed generation is connected to a single power grid. When distributed generation is connected to interconnected power grids through small degree load nodes or a large sub network, the synchronization capability of interconnected power grids will be enhanced. No matter single power grid or interconnected power grids, the more distributed generation connected to the grid there are, the more the synchronization ability of power grid will be improved.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Filtering Out Infrequent Events by Expectation from Business Process Event Logs 根据期望从业务流程事件日志中过滤掉不频繁的事件
2018 14th International Conference on Computational Intelligence and Security (CIS) Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00089
Ying Huang, Yingxu Wang, Yiwang Huang
{"title":"Filtering Out Infrequent Events by Expectation from Business Process Event Logs","authors":"Ying Huang, Yingxu Wang, Yiwang Huang","doi":"10.1109/CIS2018.2018.00089","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00089","url":null,"abstract":"Process discovery, one of the key steps in process management, aims at discovering process models from process execution data stored in event logs. Most discovery algorithms assume that all data in an event log fully comply with the process execution specification. However, in real event logs, noise and irrelevant infrequent behaviour are often present. In this paper, we propose a novel filtering method that the removal of infrequent behavior from event logs. The method has been evaluated in detail and it is shown that its application in existing process discovery algorithms significantly improves the quality of the discovered process models and that it scales well to large datasets.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信