{"title":"An introduction and review of petri net unfolding technology","authors":"R. Tao, Faming Lu, Xueping Zhang, Guanye Zhu","doi":"10.1145/3290420.3290430","DOIUrl":"https://doi.org/10.1145/3290420.3290430","url":null,"abstract":"Due to its intuitive graphical representation and variety of mathematical analysis methods, Petri nets are widely used in modeling and analysis of distributed and concurrent systems. However, state explosion problem has been hampering the practical application of Petri nets. Because the state explosion problem mainly results from arbitrary interleaving of highly concurrent activities, net unfolding technology and its complete finite prefixes have been proposed to overcome the problem. Now, with the vigorous development, net unfolding technology is widely applied to many areas including soundness verification of workflow nets, verification of multi-agent system, etc. This paper presents an overview of the latest advances in Petri net unfolding technology and its application. In addition, some promising research directions in unfolding of unbounded Petri nets are proposed.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121519974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Zhuang, Chen Feng, Liang-Hung Wang, Jie Gao, Yi-Ting Yang
{"title":"Hardware implementation of real-time ECG R-wave detection with wavelet transform algorithm","authors":"T. Zhuang, Chen Feng, Liang-Hung Wang, Jie Gao, Yi-Ting Yang","doi":"10.1145/3290420.3290445","DOIUrl":"https://doi.org/10.1145/3290420.3290445","url":null,"abstract":"This paper introduces the hardware implementation architecture of real-time ECG R-wave detection with wavelet transform algorithm. According to the principle of mutation point detection based on wavelet transform, we determine the position of R-wave by the modulus maximum of the wavelet coefficients. Moreover, the proposed hardware implementation architecture is optimized based on the characteristics of the wavelet transform algorithm. The clinical data of MIT-BIH arrhythmia database is used to verify the proposed algorithm and hardware implementation architecture.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115773858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An increment detection algorithm to mitigate ISI for molecular communication based on drift diffusion","authors":"Xinlei Wang, Zhenqiang Wu, Jiawang Chen, Bo Liu","doi":"10.1145/3290420.3290440","DOIUrl":"https://doi.org/10.1145/3290420.3290440","url":null,"abstract":"In molecular communication based on drift diffusion (MCD2), the most common demodulation technique is based on a fixed threshold of the received molecule concentration. However, the random delay of molecules due to the channel with memory causes severe inter symbol interference (ISI) among consecutive signals. In this paper, we propose a detection technique for demodulating signals, the increment detection algorithm (IDA) to reduce the impact on bit error rate to improve the reliability of MCD2. And we also analyze the impact on different parameters on the bit error rate(BER). Furthermore, we make a comparison between the traditional demodulation technique and IDA. Results show that our proposed IDA successfully minimizes ISI so that a lower BER is achieved than the common demodulation technique.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123064537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A beautiful image or not: a comparative study on classical machine learning and deep learning","authors":"Ying Zhang, Zhaotong Li, Qinpei Zhao, Hongfei Fan, Weixiong Rao, Jessie Chen","doi":"10.1145/3290420.3290463","DOIUrl":"https://doi.org/10.1145/3290420.3290463","url":null,"abstract":"With the development of web services and Apps on the Internet, food images are emerging into our life. Consumers from yelp or the dianping service upload a lot of food pictures every day. The images usually express the users' feelings and are shared among the social network. There have been different researches on the images. However, there is few research on how to evaluate the food image is beautiful or not. Therefore, we came up with an idea to classify food pictures by their appearance, which is meaningful in multiple applications, especially picking beautiful pictures to help businesses attract customers. In order to realize this idea, we collected 1067 food images through web crawling and questionnaires. Each image has a unique label: beautiful or not beautiful. Machine learning methods are used in this paper to model the data. CNN models in deep learning: VGGNet, AlexNet, and ResNet can get good results, e.g., ResNet can achieve the accuracy of 95.83%. However, with a good feature engineering job, the classifiers, which are random forest and support vector machine can reach a better accuracy of 99.63%. The experimental results indicate feature engineering is a vital issue in the food image evaluation problem, which lacks of labeled data.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127233062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Route leakage detection algorithm based on new feature discovery","authors":"Liying Cheng, Pei Zhang, Yan Ma","doi":"10.1145/3290420.3290437","DOIUrl":"https://doi.org/10.1145/3290420.3290437","url":null,"abstract":"So far, machine learning has been used for BGP anomaly detection. However, the anomaly detection algorithms based on machine learning rarely detect which kind of BGP anomaly. In this paper, we consider the routing leakage, as a popular one of BGP anomalies, and we propose a detection algorithm of routing leakage based on investigating new feature. Concretely, firstly, we give a new feature about routing leakage. Then, we propose the routing leakage algorithm according to decision tree models and Adaboost algorithm. Compared with the existing algorithm, the accuracy of our algorithm with new feature increases from 82% to 91%.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Portable computer vision-based cardiac estimation as a teaching aid","authors":"D. Haar","doi":"10.1145/3162957.3163006","DOIUrl":"https://doi.org/10.1145/3162957.3163006","url":null,"abstract":"The prevalence of pervasive computing has made computing platforms more portable and has introduced an array of sensors that are useful for many applications. The potential of these sensors are finally being realized in many fields. One area that is especially benefiting from these sensors is the field of the biometrics. However, we are still grappling with user acceptance issues such as intrusiveness and hygiene problems, which stifle the uptake of the technology. This study investigates the potential of using one of the more common sensors, a portable device camera, and using it to assist educators. By implementing a system that captures heart rate in a novel manner, a basic affective biometric system is formed that requires no contact and is portable. The system segments relevant areas that highlight blood flow in the face, extrapolates heart rate variability through color space changes. By analyzing the extent of color change, a cardiac waveform can be formed with a QRS complex derivative, which can be used for the task of sentiment classification. The sentiment derived can then be used by an educator to inform them of any potential uncertainty during their teaching in real-time. Abrupt changes in sentiment can then be addressed during the class, thereby improving the potential uptake of concepts taught in a classroom. The study validates that it is possible to derive heart rate variability using a camera, it also shows that using this heart rate for basic sentiment classification is feasible using a portable device even with limited resources and it warrants more attention.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132428107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Text Mining to Evaluation for Online Shopping Rural Fruits and Vegetables","authors":"Chien-Hua Wang, Chia-Hsuan Yeh, Chin-Tzong Pang","doi":"10.1145/3571662.3571671","DOIUrl":"https://doi.org/10.1145/3571662.3571671","url":null,"abstract":"Online purchasing has become a new front in the conflict between agricultural products with the Internet's rapid expansion. Besides the cost saving because of no physical store, the adoption of Internet marketing is an inevitable trend. The development of several marketing strategies and physical channels has also changed traditional customers' purchasing habits. As user-generated information with analytical value grows rapidly, so does the percentage of unstructured data in the enormous data set. By mining unknown and hidden data of customer opinions, enterprises can gain valuable feedback and keep track of the benefits or drawbacks of products. Unstructured text mining technology is used for analysis in order to understand the factors that affect the evaluation of online shopping for rural fruits and vegetables. In order to achieve the sustainable development of agricultural products, this study examines the hidden issues buried beneath the heat of the rural revitalization plan using the unique fruit of the Maoming region, Shatangju, as the research object.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"62 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124047995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaijie Liu, Wei Hu, Jianyi Liu, Jie Cheng, Yating Gao, Jin Pang
{"title":"Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec","authors":"Kaijie Liu, Wei Hu, Jianyi Liu, Jie Cheng, Yating Gao, Jin Pang","doi":"10.1145/3571662.3571676","DOIUrl":"https://doi.org/10.1145/3571662.3571676","url":null,"abstract":"In recent years, network security has become the main factor that threatens the development of the Internet. Among the network security threats, advanced persistent threat (APT) is one of the most representative attacks and has brought unprecedented security challenges. APT attacks mainly depend on malicious code. At present, the homology analysis of malicious code for APT mainly converts the malicious code into a gray image or semantic fragment, which is realized by pre-training models such as neural network. The effect of the method based on pre-training depends heavily on the training process of the model and the form of the data set, which may lead to misjudgment of the organization of the malicious code in an APT real-time attack. In this paper, we propose a homology analysis of malicious code for APT groups based on Asm2Vec. The basic function blocks are obtained by disassembling and removing unimportant functions from the malicious code. The semantic representation model Asm2Vec is used to analyze and find out the possible APT group for targeted malware. The experimental results show that the Energetic Bear group classification accuracy of this paper is 91.30% and the F1-Score is 95.46%.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"120 27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}