International Conference on Critical Infrastructure Protection最新文献

筛选
英文 中文
An introduction and review of petri net unfolding technology petri网展开技术的介绍与综述
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290430
R. Tao, Faming Lu, Xueping Zhang, Guanye Zhu
{"title":"An introduction and review of petri net unfolding technology","authors":"R. Tao, Faming Lu, Xueping Zhang, Guanye Zhu","doi":"10.1145/3290420.3290430","DOIUrl":"https://doi.org/10.1145/3290420.3290430","url":null,"abstract":"Due to its intuitive graphical representation and variety of mathematical analysis methods, Petri nets are widely used in modeling and analysis of distributed and concurrent systems. However, state explosion problem has been hampering the practical application of Petri nets. Because the state explosion problem mainly results from arbitrary interleaving of highly concurrent activities, net unfolding technology and its complete finite prefixes have been proposed to overcome the problem. Now, with the vigorous development, net unfolding technology is widely applied to many areas including soundness verification of workflow nets, verification of multi-agent system, etc. This paper presents an overview of the latest advances in Petri net unfolding technology and its application. In addition, some promising research directions in unfolding of unbounded Petri nets are proposed.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121519974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware implementation of real-time ECG R-wave detection with wavelet transform algorithm 基于小波变换算法的实时心电r波检测的硬件实现
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290445
T. Zhuang, Chen Feng, Liang-Hung Wang, Jie Gao, Yi-Ting Yang
{"title":"Hardware implementation of real-time ECG R-wave detection with wavelet transform algorithm","authors":"T. Zhuang, Chen Feng, Liang-Hung Wang, Jie Gao, Yi-Ting Yang","doi":"10.1145/3290420.3290445","DOIUrl":"https://doi.org/10.1145/3290420.3290445","url":null,"abstract":"This paper introduces the hardware implementation architecture of real-time ECG R-wave detection with wavelet transform algorithm. According to the principle of mutation point detection based on wavelet transform, we determine the position of R-wave by the modulus maximum of the wavelet coefficients. Moreover, the proposed hardware implementation architecture is optimized based on the characteristics of the wavelet transform algorithm. The clinical data of MIT-BIH arrhythmia database is used to verify the proposed algorithm and hardware implementation architecture.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115773858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An increment detection algorithm to mitigate ISI for molecular communication based on drift diffusion 基于漂移扩散的分子通信ISI增量检测算法
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290440
Xinlei Wang, Zhenqiang Wu, Jiawang Chen, Bo Liu
{"title":"An increment detection algorithm to mitigate ISI for molecular communication based on drift diffusion","authors":"Xinlei Wang, Zhenqiang Wu, Jiawang Chen, Bo Liu","doi":"10.1145/3290420.3290440","DOIUrl":"https://doi.org/10.1145/3290420.3290440","url":null,"abstract":"In molecular communication based on drift diffusion (MCD2), the most common demodulation technique is based on a fixed threshold of the received molecule concentration. However, the random delay of molecules due to the channel with memory causes severe inter symbol interference (ISI) among consecutive signals. In this paper, we propose a detection technique for demodulating signals, the increment detection algorithm (IDA) to reduce the impact on bit error rate to improve the reliability of MCD2. And we also analyze the impact on different parameters on the bit error rate(BER). Furthermore, we make a comparison between the traditional demodulation technique and IDA. Results show that our proposed IDA successfully minimizes ISI so that a lower BER is achieved than the common demodulation technique.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123064537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A beautiful image or not: a comparative study on classical machine learning and deep learning 美不美:经典机器学习与深度学习的比较研究
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290463
Ying Zhang, Zhaotong Li, Qinpei Zhao, Hongfei Fan, Weixiong Rao, Jessie Chen
{"title":"A beautiful image or not: a comparative study on classical machine learning and deep learning","authors":"Ying Zhang, Zhaotong Li, Qinpei Zhao, Hongfei Fan, Weixiong Rao, Jessie Chen","doi":"10.1145/3290420.3290463","DOIUrl":"https://doi.org/10.1145/3290420.3290463","url":null,"abstract":"With the development of web services and Apps on the Internet, food images are emerging into our life. Consumers from yelp or the dianping service upload a lot of food pictures every day. The images usually express the users' feelings and are shared among the social network. There have been different researches on the images. However, there is few research on how to evaluate the food image is beautiful or not. Therefore, we came up with an idea to classify food pictures by their appearance, which is meaningful in multiple applications, especially picking beautiful pictures to help businesses attract customers. In order to realize this idea, we collected 1067 food images through web crawling and questionnaires. Each image has a unique label: beautiful or not beautiful. Machine learning methods are used in this paper to model the data. CNN models in deep learning: VGGNet, AlexNet, and ResNet can get good results, e.g., ResNet can achieve the accuracy of 95.83%. However, with a good feature engineering job, the classifiers, which are random forest and support vector machine can reach a better accuracy of 99.63%. The experimental results indicate feature engineering is a vital issue in the food image evaluation problem, which lacks of labeled data.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127233062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Route leakage detection algorithm based on new feature discovery 基于新特征发现的路由泄漏检测算法
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290437
Liying Cheng, Pei Zhang, Yan Ma
{"title":"Route leakage detection algorithm based on new feature discovery","authors":"Liying Cheng, Pei Zhang, Yan Ma","doi":"10.1145/3290420.3290437","DOIUrl":"https://doi.org/10.1145/3290420.3290437","url":null,"abstract":"So far, machine learning has been used for BGP anomaly detection. However, the anomaly detection algorithms based on machine learning rarely detect which kind of BGP anomaly. In this paper, we consider the routing leakage, as a popular one of BGP anomalies, and we propose a detection algorithm of routing leakage based on investigating new feature. Concretely, firstly, we give a new feature about routing leakage. Then, we propose the routing leakage algorithm according to decision tree models and Adaboost algorithm. Compared with the existing algorithm, the accuracy of our algorithm with new feature increases from 82% to 91%.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Portable computer vision-based cardiac estimation as a teaching aid 基于便携式计算机视觉的心脏评估教具
International Conference on Critical Infrastructure Protection Pub Date : 2017-11-24 DOI: 10.1145/3162957.3163006
D. Haar
{"title":"Portable computer vision-based cardiac estimation as a teaching aid","authors":"D. Haar","doi":"10.1145/3162957.3163006","DOIUrl":"https://doi.org/10.1145/3162957.3163006","url":null,"abstract":"The prevalence of pervasive computing has made computing platforms more portable and has introduced an array of sensors that are useful for many applications. The potential of these sensors are finally being realized in many fields. One area that is especially benefiting from these sensors is the field of the biometrics. However, we are still grappling with user acceptance issues such as intrusiveness and hygiene problems, which stifle the uptake of the technology. This study investigates the potential of using one of the more common sensors, a portable device camera, and using it to assist educators. By implementing a system that captures heart rate in a novel manner, a basic affective biometric system is formed that requires no contact and is portable. The system segments relevant areas that highlight blood flow in the face, extrapolates heart rate variability through color space changes. By analyzing the extent of color change, a cardiac waveform can be formed with a QRS complex derivative, which can be used for the task of sentiment classification. The sentiment derived can then be used by an educator to inform them of any potential uncertainty during their teaching in real-time. Abrupt changes in sentiment can then be addressed during the class, thereby improving the potential uptake of concepts taught in a classroom. The study validates that it is possible to derive heart rate variability using a camera, it also shows that using this heart rate for basic sentiment classification is feasible using a portable device even with limited resources and it warrants more attention.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132428107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Text Mining to Evaluation for Online Shopping Rural Fruits and Vegetables 基于文本挖掘的农村果蔬网上购物评价
International Conference on Critical Infrastructure Protection Pub Date : 1900-01-01 DOI: 10.1145/3571662.3571671
Chien-Hua Wang, Chia-Hsuan Yeh, Chin-Tzong Pang
{"title":"Using Text Mining to Evaluation for Online Shopping Rural Fruits and Vegetables","authors":"Chien-Hua Wang, Chia-Hsuan Yeh, Chin-Tzong Pang","doi":"10.1145/3571662.3571671","DOIUrl":"https://doi.org/10.1145/3571662.3571671","url":null,"abstract":"Online purchasing has become a new front in the conflict between agricultural products with the Internet's rapid expansion. Besides the cost saving because of no physical store, the adoption of Internet marketing is an inevitable trend. The development of several marketing strategies and physical channels has also changed traditional customers' purchasing habits. As user-generated information with analytical value grows rapidly, so does the percentage of unstructured data in the enormous data set. By mining unknown and hidden data of customer opinions, enterprises can gain valuable feedback and keep track of the benefits or drawbacks of products. Unstructured text mining technology is used for analysis in order to understand the factors that affect the evaluation of online shopping for rural fruits and vegetables. In order to achieve the sustainable development of agricultural products, this study examines the hidden issues buried beneath the heat of the rural revitalization plan using the unique fruit of the Maoming region, Shatangju, as the research object.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"62 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124047995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec 基于Asm2Vec的高级持续威胁恶意代码分类方法
International Conference on Critical Infrastructure Protection Pub Date : 1900-01-01 DOI: 10.1145/3571662.3571676
Kaijie Liu, Wei Hu, Jianyi Liu, Jie Cheng, Yating Gao, Jin Pang
{"title":"Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec","authors":"Kaijie Liu, Wei Hu, Jianyi Liu, Jie Cheng, Yating Gao, Jin Pang","doi":"10.1145/3571662.3571676","DOIUrl":"https://doi.org/10.1145/3571662.3571676","url":null,"abstract":"In recent years, network security has become the main factor that threatens the development of the Internet. Among the network security threats, advanced persistent threat (APT) is one of the most representative attacks and has brought unprecedented security challenges. APT attacks mainly depend on malicious code. At present, the homology analysis of malicious code for APT mainly converts the malicious code into a gray image or semantic fragment, which is realized by pre-training models such as neural network. The effect of the method based on pre-training depends heavily on the training process of the model and the form of the data set, which may lead to misjudgment of the organization of the malicious code in an APT real-time attack. In this paper, we propose a homology analysis of malicious code for APT groups based on Asm2Vec. The basic function blocks are obtained by disassembling and removing unimportant functions from the malicious code. The semantic representation model Asm2Vec is used to analyze and find out the possible APT group for targeted malware. The experimental results show that the Energetic Bear group classification accuracy of this paper is 91.30% and the F1-Score is 95.46%.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"120 27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书