Cheong-Min Shin, Gi-Eun Kim, Kyeong-Gyu Min, Yanqiu Chen, Eugene J Choi, Chang‐Jae Yu, Jae-Hoon Kim
{"title":"Security Crypto Display that Information Disappears and Appears According to a Certain Temperature and Time","authors":"Cheong-Min Shin, Gi-Eun Kim, Kyeong-Gyu Min, Yanqiu Chen, Eugene J Choi, Chang‐Jae Yu, Jae-Hoon Kim","doi":"10.1109/IC-NIDC54101.2021.9660404","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660404","url":null,"abstract":"Security displays will be one of the important technologies of the future. So we were able to find a way during the study of displays using polarization. Emission of circularly polarized (CP) light has attracted great attention for improving device performance. The degree of CP emission is defined by the dissymmetric factor, $(q=2(I_{mathrm{L}}-I_{mathrm{R}})/(I_{mathrm{L}}+I_{mathrm{R}})$, where $I_{mathrm{L}}$ and $I_{mathrm{R}}$ denote the intensities of left-handed and right-handed CP light, respectively. Especially, high degree of CP emission was achieved in a helical configuration of mesogenic luminophore by doping a chiral agent [15] or by rubbing two different surfaces [16]. In this work, we investigate the dissymmetric factor of the intrinsic chiral luminophore as a function of elapsed time after sample fabrication. The fluorene moiety containing chirality was used for an emitting layer (EML) and annealed thermally above its mesogenic temperature after coating on the rubbed alignment layer. The EML constructed the twisted structure without any treatment after cooling down at room temperature. The twisted EML generates the CP light, whose dissymmetric factor is governed by helical twisting power (HTP) and thickness of the EML. Interestingly, the dissymmetric factor (gPL) of the photoluminescence (PL) was gradually degraded according to time elapsed after sample preparation. These degradation behaviors were observed in both rapidly and slowly cooling processes. Such phenomenon is expected to be originated from weaker HTP of the intrinsic chirality than the specific chiral dopant such as S(R)05011 [15]. Restoring process of the dissymmetric factor was also investigated. Therefore, using this phenomenon, it can be applied to military security or various security displays.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Epidemic Dynamics Model Considering Individual Movements and Urban Areas","authors":"Boxu Pan, Jie Yang, Yu Wang, Zehao Wang, Yuangeng Zhu, Zhiqiang Zhang","doi":"10.1109/IC-NIDC54101.2021.9660546","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660546","url":null,"abstract":"With the rapid spread of COVID-19, hundreds of millions of people worldwide have been infected. In order to cope with the epidemic, experts from various countries have carried out a lot of research works. Most of these works chose to use the traditional SEIR model, but the traditional model doesn't consider the individual's movement in the city. Based on the transmission characteristics of COVID-19, this paper optimized the traditional SEIR model by combining the in-depth mining and processed multiple data, such as the real epidemic data published by some official organizations, as well as data with certain credibility obtained from reference papers, journals or newspapers. Compared with the traditional SEIR model, the proposed model takes into account the impact of individuals' movement and the division of urban functional areas. The outcomes can play a certain role in the prediction and analysis of the spread of the epidemic in cities with regular individuals' movements and functions of urban areas.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The In-Robot Network Structure of Humanoid Robot for Burst Traffic Data Situations","authors":"T. Tan, Chengyu Cui, Sungkwon Park","doi":"10.1109/IC-NIDC54101.2021.9660596","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660596","url":null,"abstract":"According to the basic concept of the In-Robot Network(IRN), an IRN structure that can handle burst data is proposed. According to the existing research on humanoid robots, it can be seen that the current humanoid robots have a high degree of freedom of joints and carry various sensors at the same time to form a huge IRN network. It can be known from existing research that most of the current humanoid robots operate according to preset scenarios and plans. If a special situation occurs, the current IRN structure of a humanoid robot cannot handle a large amount of burst data in a special situation. Therefore, based on the in-vehicle network (IVN) and time-sensitive network (TSN) concepts, an IRN structure that can handle the data generated in the above-mentioned emergencies is proposed in this article. In this IRN structure, the Domain Control Unit (DCU) is used to detect the status of the data stream in each different area to distinguish whether an emergency occurs. Also, according to different emergencies, use different ways to deal with the emergent data. Meanwhile, it is verified by the OMNet++ network simulation tool.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121404030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mutual Authentication and Distributed Key Management with Permissioned Blockchain in MEC-Enabled Vehicular Networks","authors":"Cong Meng, Heli Zhang, Hong Ji, Xi Li","doi":"10.1109/IC-NIDC54101.2021.9660532","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660532","url":null,"abstract":"As a critical technology of network security, key management has attracted attention in mobile edge computing (MEC)-enabled vehicular networks. However, the traditional centralized key management methods are vulnerable to single points of failure. In this case, we propose a distributed key management scheme for MEC-enabled vehicular networks. Within this scheme, we use permissioned blockchain to store the key and present a new transaction format while key registration, update, and revocation are included. Considering the high mobility of the vehicle, we design a lightweight mutual authentication protocol to ensure that the vehicle can access MEC servers quickly and safely. Finally, the simulation results prove that our proposed scheme can achieve a lower authentication delay, less communication overhead, and higher security compared with traditional key management.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132380505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Single- and Multi-carrier Signals Using CNN Based Deep Learning","authors":"S. An, Mingyu Jang, D. Yoon","doi":"10.1109/IC-NIDC54101.2021.9660515","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660515","url":null,"abstract":"In a non-cooperative context, to recover data from the received signal, the receiver must estimate the communication parameters used in the transmitter. In this paper, we propose an algorithm for classifying single-carrier and multi-carrier signals by using convolutional neural network based deep learning and analyze classification performance. Simulation results show that the proposed algorithm outperforms the conventional methods in an additive white Gaussian noise channel and Rician fading channel.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tunable Routing Algorithm for Integerated Terrestrial-Satellite Networks Based on the Space-Time Graph","authors":"Yingjie Deng, Yu Liu","doi":"10.1109/IC-NIDC54101.2021.9660472","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660472","url":null,"abstract":"Integrated terrestrial-satellite networks have the advantages of wide coverage, long communication distance, strong mobile access capability, which form a good complementary relationship with 5G cellular network and have a bright future. However, integrated terrestrial-satellite network is a typical DTN network with time varying topology, in which whole end-to-end paths are hardly to be established. It is significant to design a routing algorithm for the integrated terrestrial-satellite networks. In order to solve the routing problem of satellite network, in this paper, a space-time graph model is first constructed. Inspired by the minimum-cost constrained multipath routing (MCMP) algorithm, a minimum-delay constrained multipath routing (MDMP) algorithm is proposed to minimize routing delay. Furthermore, a tunable minimum-delay-cost constrained multipath routing (TMMP) algorithm is proposed, which considers the optimization of both routing delay and energy cost with linear weighting method. Simulation results prove the effectiveness of MDMP algorithm and TMMP algorithm.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131435576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Integrated Attestation Scheme for Embedded Devices","authors":"Jiangnan Lin, Qiuxin Wu","doi":"10.1109/IC-NIDC54101.2021.9660438","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660438","url":null,"abstract":"With the development of the Internet of Things, embedded devices have become increasingly frequent in people's daily use. However, with the influx of a huge amount of heterogeneous embedded devices, its security has become an important issue. To face with such problems, remote attestation is undoubtedly a suitable security technology. Nevertheless, traditional remote attestation is limited to verifying the performance of devices as large and heterogeneous devices enter daily life. Therefore, this paper proposes a many-to-one swarm attestation and recovery scheme. Besides, the reputation mechanism and Merkel tree measurement method are introduced to reduce the attestation and recovery time of the scheme, and greatly reducing the energy consumption.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ming Zhou, Zhen Yang, Haiyang Yu, Yingxu Lai, Zhanyu Ma
{"title":"Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation","authors":"Ming Zhou, Zhen Yang, Haiyang Yu, Yingxu Lai, Zhanyu Ma","doi":"10.1109/IC-NIDC54101.2021.9660520","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660520","url":null,"abstract":"As many countries have promulgated laws on the protection of user data privacy, how to legally use user data has become a hot topic. With the emergence of collaborative learning, also known as federated learning, multiple participants can create a common, robust, and secure machine learning model aimed at addressing such critical issues of data sharing as privacy, security, and access, etc. Unfortunately, existing research shows that collaborative learning is not as secure as it claims, and the gradient leakage is still a key problem. To deal with this problem, a collaborative learning solution based on chained secure multi-party computing has been proposed recently. However, there are two security issues in this scheme that remain unsolved. First, if semi-honest users collude, the honest users' gradient also leaks. Second, if one of the users fails, it also cannot guarantee the correctness of the aggregation results. In this paper, we propose a privacy-preserving and verifiable chain collaborative learning scheme to solve this problem. First, we design a gradient encryption method, which can solve the problem of gradient leakage. Second, we create a verifiable method based on homomorphic hash technology. This method can ensure the correctness of users' aggregation results. At the same time, it can also track users who aggregate wrong. Compared with other solutions, our scheme is more efficient.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Thermal Face Detection for High-Speed AI Thermometer","authors":"W. Lee, Hyucksung Kwon, Jungwook Choi","doi":"10.1109/IC-NIDC54101.2021.9660583","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660583","url":null,"abstract":"In the era of COVID-19, temperature measurement becomes a crucial procedure for protecting public spaces against the virus. Artificial intelligence techniques such as object detection deep neural networks (DNNs) have been adopted to enhance the accuracy of contactless temperature measurement. However, the computation-demanding nature of DNNs, along with the time-consuming fusion of video and thermal camera frames, raises hurdles for the cost-effective deployment of such AI thermometer systems. In this work, we propose a high-speed and cost-effective implementation of an AI thermometer. We develop a thermal face detection network to detect faces for temperature measurement without a video camera. We optimize the proposed network's precision and structure to exploit high-throughput reduced-precision computations available in the embedded AI platforms. The resulting AI thermometer system demonstrates a live temperature measurement with a speed of 160 frames per second.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"17 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132149633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Building Age Prediction from Street View Images","authors":"Maoran Sun, Fan Zhang, Fábio Duarte","doi":"10.1109/IC-NIDC54101.2021.9660554","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660554","url":null,"abstract":"Building age is a key factor for building energy efficiency, valuation of real estate objects and urban planning, while previous research has been limited by the available building age data and efficient ways to estimate building age information. This paper presents an automated workflow for estimating building age from street view images. A building age dataset consisting of street view images that are labeled with the date of construction is created for Amsterdam. We designed a deep convolutional neural network for the estimation of building age and achieved a total accuracy of 81%. This research utilizes publicly available data, street view images, and construction dates of buildings, to perform the estimation of building age with an automated manner.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131679466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}