Xinman Zhang, Kunlei Jing, Guoqi Yan, Xuebin Xu, Weiyong Gong
{"title":"Research of Palmprint Authentication Arithmetic Based on Smartphone","authors":"Xinman Zhang, Kunlei Jing, Guoqi Yan, Xuebin Xu, Weiyong Gong","doi":"10.1145/3301326.3301382","DOIUrl":"https://doi.org/10.1145/3301326.3301382","url":null,"abstract":"Palmprint authentication technology can solve the information security problem of mobile devices effectively. Based on smartphone, a new palmprint acquisition scheme and an improved authentication algorithm are proposed in this article. Key points and ROI region of palmprint are drawn in the smartphone interface to guide acquisition. In order to overcome the high computational complexity of traditional algorithm, ROI image get in acquisition is down-scaled, then the feature vectors extraction of ROI can be down-sampled with Log-Gabor filter and encoded with a new coding method. Simulation results show that our acquisition scheme can improve the quality of palmprint sample effectively, meanwhile the improved authentication algorithm has achieved good accuracy and timeliness.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Full Duplex Network Based on Non-orthogonal Multiple Access","authors":"Kaikai Wang, Kaixin Zhang","doi":"10.1145/3301326.3301366","DOIUrl":"https://doi.org/10.1145/3301326.3301366","url":null,"abstract":"Recent researches in Non-orthogonal multiple access (NOMA) have enabled radios to transmit and receive simultaneously at the same frequency using power domain multiplex. In addition, full duplex technology can also improve spectrum efficiency. Therefore, full duplex and NOMA are considered as potential candidates for next generation wireless networks. In this paper, we deploy system model based on stochastic geometry including full duplex base stations (BSs) and user equipment (UE) that are limited in half-full duplex mode. In the downlink NOMA, succession interference cancellation (SIC) error propagation model is considered to evaluate the system's coverage probability and average achievable rate. In uplink orthogonal multiplex access (OMA), the self-interference factor is considered to analyze the performance of uplink users due to the existence of full duplex BSs. The simulation results indicate that NOMA can improve the quality of services (QoS) of cell-edge users through power domain multiplexing, and the self-interference factor affects the overall performance of the full duplex system.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114411183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Analysis of the Anti-Jamming (AJ) Spread Spectrum System Using Quantized Chaotic Sequence with LDPC for Reliable Data Link","authors":"Wei Wei, Junghwan Kim","doi":"10.1145/3301326.3301340","DOIUrl":"https://doi.org/10.1145/3301326.3301340","url":null,"abstract":"Due to the capability of interference rejection and low probability of interception (LPI), the spread spectrum technique is widely used in modern data link. However, its wideband, low power spectral density (PSD) signal may result in the degradation of the reliable data communication. To compensate this drawback, utilization of low density parity check (LDPC) can significantly reduce the required signal-to-noise ratio (SNR) per information bit for fixed bit error rate (BER), while quantized chaotic sequence makes the fixed energy-per-bit Eb for the quality of reliable data communication. In this work, toward an appropriate anti-jamming (AJ) spread spectrum system using chaotic waveform against possible jamming scenarios, the 1-bit quantized chaotic sequence generated from the chaotic waveform using the Logistic Map is utilized as the spreading code as well as the differential chaos shift keying (DCSK) as the modulation scheme. The simulation results shows that, under single-tone jamming (STJ), the power requirement of the spread spectrum requires only about -5 dB power for the fixed BER of 10-6 in additive white Gaussian noise (AWGN). Obviously, it shows that SNR per information bit requirement of the system for the targeted BER has been greatly reduced due to the use of LDPC and quantized chaotic sequence.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127533069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chengyang Li, Liping Zhu, Dandan Zhu, Jiale Chen, Z. Pan, Xue Li, Bing Wang
{"title":"End-to-end Multiplayer Violence Detection based on Deep 3D CNN","authors":"Chengyang Li, Liping Zhu, Dandan Zhu, Jiale Chen, Z. Pan, Xue Li, Bing Wang","doi":"10.1145/3301326.3301367","DOIUrl":"https://doi.org/10.1145/3301326.3301367","url":null,"abstract":"Numerous behavior recognition researches have focused on UCF-101 video dataset, such as sports, cooking and other simple routines. Yet these studies are less useful in real-life surveillance scenarios. Violence detection in crowded scenes (such as shopping malls, banks, and stadiums) is significantly important but little research has been done. Based on this situation, this paper proposes a multiplayer violence detection method based on deep three-dimensional convolutional neural network (3D CNN), which extracts the spatiotemporal feature information of multiplayer violence. Our method directly detects violence in an input video by end-to-end. The experimental results show that the accuracy of our method is higher than the methods of artificially extracting features in violence detection.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"101-B 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Machine Learning Models for Android Malware Detection: A Comparison Study","authors":"M. Rana, Charan Gudla, A. Sung","doi":"10.1145/3301326.3301390","DOIUrl":"https://doi.org/10.1145/3301326.3301390","url":null,"abstract":"Android is the most popular mobile operating system having billions of active users worldwide that attracted advertisers, hackers, and cybercriminals to develop malware for various purposes. In recent years, wide-ranging researches have been conducted on malware analysis and detection for Android devices while Android has also implemented various security controls to deal with the malware problems, including unique user ID (UID) for each application, system permissions, and its distribution platform Google Play. In this paper, we optimize and evaluate different types of machine learning algorithms by implementing a classifier based on static analysis in order to detect malware in applications running on the Android OS. In our evaluation, we use 11,120 applications with 5,560 malware samples and 5,560 benign samples of the DREBIN dataset, and the accuracy we achieved is higher than 94%; therefore, the study has demonstrated the effectiveness of using machine learning classifiers for detecting Android malware.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"378 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114887662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Copy-Move Forgery Detection using Blur and Rotation Invariant Technique","authors":"Ankita Verma, V. Kapoor, Sangita Roy","doi":"10.1145/3301326.3301327","DOIUrl":"https://doi.org/10.1145/3301326.3301327","url":null,"abstract":"Altering an original picture in order to create fake image by means of any fraud or other reason is known to be image forgery. As per the process involved in fake image creation, image forgery scenarios can be divided into three groups --- Image retouching, image splicing and copy-move attack. Numerous types of techniques of image forensics are used to detect forgery. These types can be helpful in active and passive protection. There are many existing techniques or approaches used to detect the forgery in an image but provides less accurate result. The proposed work here deals with image forgery detection using rotation invariant technique with blur-invariant copy-move forgery detection. The proposed mechanism firstly rotates the inbuilt object of an image and then divides the image into small blocks. After dividing the image into small sized blocks, fast Fourier transformation is applied and then detected. The simulations are performed in MATLAB tool. The method is more accurate and provide accuracy rate between 90-95%.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133336439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Di Xue, Jingmei Li, Weifei Wu, Jiaxiang Wang, Xiaoyun Wang
{"title":"An Instruction Blocking Methods for Disk Data Protection","authors":"Di Xue, Jingmei Li, Weifei Wu, Jiaxiang Wang, Xiaoyun Wang","doi":"10.1145/3301326.3301334","DOIUrl":"https://doi.org/10.1145/3301326.3301334","url":null,"abstract":"Disk data is frequently subject to malicious tampering attacks, causing huge losses to computer users. The existing disk data protection technology mainly protects data at the file system layer, the general block layer, the driver layer, and the hardware layer, and cannot protect against attacks at the disk controller layer. Aiming at this phenomenon, this paper proposes an instruction blocking method for disk data protection based on disk controller. By acquiring and analyzing computer runtime instructions, the method combines disk controller and binary cartridge techniques to modify and block malicious instructions that write to protected disk sectors, making them non-malicious. Experimental results show that this method can effectively protect the data in the specified area of the disk from malicious tampering.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129970206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Liu, Dandan Zhu, Hao Liu, A. Du, Dong Chen, Zhihui Ye
{"title":"A Deep Learning Based Geosteering Method Assembled with \"Wide-angle Eye\"","authors":"Yi Liu, Dandan Zhu, Hao Liu, A. Du, Dong Chen, Zhihui Ye","doi":"10.1145/3301326.3301370","DOIUrl":"https://doi.org/10.1145/3301326.3301370","url":null,"abstract":"The intelligent guided drilling system adopts the precise guided drilling geological system and a new rotary steering drilling tool to achieve deep drilling intelligent cruise. It can increase the amount of oil and gas exploration and ensure safety in production. However, the geosteering problem in deep wells and ultra-deep wells is still an outstanding issue due to the hostile environment for signal transmission. In this research, an autonomous geosteering method based on deep learning model is proposed, which is able to make the strategic decision of the drill bit direction in downhole operating mode. According to the characteristics of the Logging While Drilling (LWD) data, the \"Wide-angle Eye\" mechanism is embedded to feel the future change of stratum ahead and give preview information to the drill bit. Consequencely, the Drilling Decision Model is designed to be a Convolutional Neural Network (ConvNet). The performance of the proposed model was validated in simulation, and the experimental results indicate that the proposed method has high accuracy and robustness, appearing an enhanced capacity to predict stratigraphic changes.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maik Benndorf, M. Kaden, Frederic Ringsleben, Christian Roschke, Rico Thomanek, M. Gaedke, T. Haenselmann
{"title":"Investigating the Influence of CPU Load, Memory Usage and Environmental Conditions on the Jittering of Android Devices","authors":"Maik Benndorf, M. Kaden, Frederic Ringsleben, Christian Roschke, Rico Thomanek, M. Gaedke, T. Haenselmann","doi":"10.1145/3301326.3301361","DOIUrl":"https://doi.org/10.1145/3301326.3301361","url":null,"abstract":"Over the last decade, the smartphone has become an important part of our everyday lives and is used even in the most rural regions. The use cases of this device go far beyond communication for which they were mainly designed. It can, e.g., be used for activity recognition or serve as a measuring device. However, for these use cases, smartphones might suffer difficulties such as jittering. Jittering is the deviation between the time an event occurs and the time the event is reported by the device. In this paper, we investigate the influence of environmental conditions such as heat as well as the processor load and memory usage on jittering. With this work, we want to contribute to a better understanding of jittering and its influencing factors.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131750602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao Liu, Dandan Zhu, Yi Liu, A. Du, Dong Chen, Zhihui Ye
{"title":"A Reinforcement Learning Based 3D Guided Drilling Method: Beyond Ground Control","authors":"Hao Liu, Dandan Zhu, Yi Liu, A. Du, Dong Chen, Zhihui Ye","doi":"10.1145/3301326.3301374","DOIUrl":"https://doi.org/10.1145/3301326.3301374","url":null,"abstract":"The current drilling guide operation relies on the two-way transmission of signals between the downhole drilling tools and the ground control center. However, the downhole environment is sometimes not conducive to such real-time signal transmission, and the analysis and decision-making in the ground involves complex human expert analysis and fine management. To deal with these problems, this paper proposes a downhole self-steering guided drilling method based on a reinforcement learning framework to achieve the 3D well trajectory design and control in real-time. In every time interval of the drilling process, the proposed system evaluates the drilling status and gives the adjustment action of drill bit in 3D space according to the received data, guiding the drill bit to the target reservoir without the involvement of human. The main module is a modified deep Q network using Sarsa algorithm for online self-learning. The experimental results show that after training, the drill bit is increasingly able to select control actions closer to the target reservoir. The frequency of effective actions is approximately 258% higher after the algorithm converges. The proposed system has the ability of online self-learning, which can automatically adjust the evaluation and decision models without manual monitoring.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121637086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}