2012 Eighth International Conference on Computational Intelligence and Security最新文献

筛选
英文 中文
Improving the Recommendation of Collaborative Filtering by Fusing Trust Network 融合信任网络改进协同过滤推荐
Bo Yang, Pengfei Zhao, Shuqiu Ping, Jing Huang
{"title":"Improving the Recommendation of Collaborative Filtering by Fusing Trust Network","authors":"Bo Yang, Pengfei Zhao, Shuqiu Ping, Jing Huang","doi":"10.1109/CIS.2012.51","DOIUrl":"https://doi.org/10.1109/CIS.2012.51","url":null,"abstract":"To accurately and actively provide users with their potentially interested information or services is the main task of a recommender system. Collaborative filtering is one of the most widely adopted recommender methods, whereas it is suffering the issue of sparse rating data that will severely degenerate the quality of recommendations. To address this issue, the article proposes a novel method, named the FTRA (Fusing Trust and Ratings), trying to improve the performance of collaborative filtering recommendation by means of elaborately integrating twofold sparse information, i.e., the conventional rating data given by users and the social trust network among the same users. The performance of FTRA is rigorously validated by comparing it with six representative methods on a real-world dataset. The experimental results show that the FTRA outperforms all other competitors in terms of both precision and recall. More importantly, our work suggests that the strategy of augmenting sparse rating data by fusing trust networks does significantly improve the quality of conventional collaborative filtering recommendation, and its quality could be further improved by means of designing more effective integrating schemes.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"2 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114112844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Application of Improved Logarithm Logistic Models in Population Prediction 改进对数逻辑模型在人口预测中的应用
Bin Li, Tianfei Wang, Liping Jia
{"title":"Application of Improved Logarithm Logistic Models in Population Prediction","authors":"Bin Li, Tianfei Wang, Liping Jia","doi":"10.1109/CIS.2012.30","DOIUrl":"https://doi.org/10.1109/CIS.2012.30","url":null,"abstract":"In this paper, improved Logistic models are given, which are called Logarithm Logistic Models. Based on U.S. Census data, the parameters of the models were estimated by applying the Least Squares Method. The experiments show that the prediction value of the new models is much closer to the actual value than the classical Logistic model. Finally, through analyzing the rationality of the maximum population capacity, the trend of Logistic curves and the rationality of prediction value, the most appropriate model is recommended.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125139932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constructing the On/Off Covert Channel on Xen 在Xen上构建开/关隐蔽通道
Yetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li
{"title":"Constructing the On/Off Covert Channel on Xen","authors":"Yetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li","doi":"10.1109/CIS.2012.133","DOIUrl":"https://doi.org/10.1109/CIS.2012.133","url":null,"abstract":"Virtualization technology is the basis of cloud computing. Multiple virtual machines on a single physical host are isolated from each other. However, covert channel breaks the isolation and leaks sensitive information covertly. In this paper, we construct one type of classic covert timing channel, the on/off channel, on the Xen hyper visor using shared memory. And then we evaluate its bit rate and transmission accuracy. The results show that this type of covert channel is a threat to virtualization technology.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126978848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Method for Judging Web-page Type 判断网页类型的方法
Xue Hong-Jun, Chen Tao, Xue Li-Min
{"title":"A Method for Judging Web-page Type","authors":"Xue Hong-Jun, Chen Tao, Xue Li-Min","doi":"10.1109/CIS.2012.28","DOIUrl":"https://doi.org/10.1109/CIS.2012.28","url":null,"abstract":"This paper introduces a concept of information entropy to judge web-page types, which associates with the method put forward by Roadrunner that pre-purifying topic pages and then using proportional relation to judge the type of pages. With some typical pages from large website home, the average precision could be reached to 96.7%, which lays foundation for further information extracting work.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116190303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Monitor and Protect Circuits against FIB Attack on Chip Security 芯片安全中FIB攻击监控与保护电路的设计
Mengmeng Ling, Liji Wu, Xiangyu Li, Xiangmin Zhang, Jinsong Hou, Yong Wang
{"title":"Design of Monitor and Protect Circuits against FIB Attack on Chip Security","authors":"Mengmeng Ling, Liji Wu, Xiangyu Li, Xiangmin Zhang, Jinsong Hou, Yong Wang","doi":"10.1109/CIS.2012.125","DOIUrl":"https://doi.org/10.1109/CIS.2012.125","url":null,"abstract":"As information security chips are more widely used in the field of information security, the security of chips becomes increasingly important, which has also been a hot research field of information security. With the advances in technology, a chip-invasive method of attack which uses laser or focused ion beam (FIB) to change the chip's internal signal line, and then probe the chip's secret information with the electron microprobe, becomes a serious threat to information security chip. Such an attack makes the shielding metal wire an effective mean to improve chip security. The protection circuit module monitoring the shielding metal line is to ensure the layer of the metal wire is undamaged, in order to ensure that the chip has not been attacked by laser or FIB. This paper studies the design and implementation of Monitor and Protect Circuits (MPC) based on RC delay, which monitor if the shielding metal wires are damaged. The circuit is designed in SMIC0.18um CMOS process and an entire layout is completed. The gate count of MPC is about 642, which is 2.9% of that of AES. And its power consumption is about 81uw.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Indexed Bottom-up Approach for Publishing Anonymized Data 一种索引自底向上的匿名数据发布方法
A. Hoang, Minh Tran, A. Duong, I. Echizen
{"title":"An Indexed Bottom-up Approach for Publishing Anonymized Data","authors":"A. Hoang, Minh Tran, A. Duong, I. Echizen","doi":"10.1109/CIS.2012.148","DOIUrl":"https://doi.org/10.1109/CIS.2012.148","url":null,"abstract":"Sharing information is one of the most important parts of social activities. However, sharing information can leak users' information. Removing all direct identifiers is not enough. Sweeney proposed an approach that applying k-anonymity to protect users' identities from linking attack. Sweeney`s algorithm finds out the optimal anonymized dataset through minimal distortion metric. Other authors proposed other optimal algorithms but their proposals are still impractical due to their high computational cost. Another approach is to release the minimal anonymized dataset by applying some heuristics. Wang and Fung proposed Bottom-up Generalization and Top-down Specialization (TDS) to publish a minimal anonymized dataset with information loss metric, whose performance is more efficient. However, these algorithms still have some limitations. In this paper, we propose an algorithm to publish anonymized datasets through bottom-up generalization approach and information loss data metric. Our algorithm can save time by storing statistical information for later usage. The experimental results is performanced on Adult dataset, which is used in all former algorithms. Experimental results show that our algorithm can process 949,662 records dataset in 42.219s. Classification error on anonymized data, which is created by our algorithm, is lower than Wang's algorithm 3.8%.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Segmentation Algorithm Study for Infrared Images with Occluded Target Based on Artificial Immune System 基于人工免疫系统的红外目标遮挡图像分割算法研究
Dongmei Fu, Xiao Yu, Tingting Wang
{"title":"Segmentation Algorithm Study for Infrared Images with Occluded Target Based on Artificial Immune System","authors":"Dongmei Fu, Xiao Yu, Tingting Wang","doi":"10.1109/CIS.2012.85","DOIUrl":"https://doi.org/10.1109/CIS.2012.85","url":null,"abstract":"Image segmentation is an important component of image processing. The improvements of the segmentation efficiency and quality are the two significant issues for each segmentation algorithm. This paper proposed a segmentation algorithm based on the negative selection mechanism of the artificial immune system. The algorithm can extract the occluded target in an infrared image by using a template constructed from negative selection method. A segmentation algorithm combined with the information entropy and the clonal selection algorithm is introduced to avoid the drawbacks of deciding a segmentation threshold subjectively. The simulation results presented that the two proposed algorithms do have some advantages on the segmentation of the occluded target in an infrared image, especially the latter can acquire a stable result leading to an ideal effect.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130709700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research of Web Portable Technology Application Web便携技术应用研究
Haihua Xing, Shulei Wu, D. Kang, Juntao Chen, Jinmei Zhan
{"title":"Research of Web Portable Technology Application","authors":"Haihua Xing, Shulei Wu, D. Kang, Juntao Chen, Jinmei Zhan","doi":"10.1109/CIS.2012.82","DOIUrl":"https://doi.org/10.1109/CIS.2012.82","url":null,"abstract":"With regard to the analysis of Web portable technology in the application of E-Learning teaching system, this paper studied the specific application process and provided a comprehensive evaluation result. It fully demonstrated that the Web portable technology based on B/S has high value in the development and application of teaching system.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122702058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Computer Measurement and Control System of Test Device for Grain Drying Based on Virtual Instrument 基于虚拟仪器的粮食干燥试验装置计算机测控系统设计
Liu Yang, Junwen Deng, Yuyao Song
{"title":"Design of Computer Measurement and Control System of Test Device for Grain Drying Based on Virtual Instrument","authors":"Liu Yang, Junwen Deng, Yuyao Song","doi":"10.1109/CIS.2012.47","DOIUrl":"https://doi.org/10.1109/CIS.2012.47","url":null,"abstract":"A computer measurement and control system of test device for grain drying is designed by combining virtual instrument technology and computer measurement and control technology. Working done by hand or half hand system is solved by the automatic system. The hardware is designed with computer and ADAM module as its core, and the software is developed by Lab Windows/CVI. Digital incremental PID control algorithm is used in the process control. Anti-interference technology for hardware and software is applied. The result of experiment indicates that the temperature error was less than ±1°C\", \"the moisture error was less than ±2.17%and wind speed error was less than ±0.1m/s. The computer measurement and control system has a good performance and reaches the design and application requirements well.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124264161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Permanent Secure QKD Protocol Realized with Asymmetric Key Authentication 非对称密钥认证实现的永久安全QKD协议
Heyu Yin, Qiuliang Xu
{"title":"A Permanent Secure QKD Protocol Realized with Asymmetric Key Authentication","authors":"Heyu Yin, Qiuliang Xu","doi":"10.1109/CIS.2012.108","DOIUrl":"https://doi.org/10.1109/CIS.2012.108","url":null,"abstract":"This paper introduces the permanent security notation. And then by combining the computational security of the classical cryptography and the theoretical security of the one-time-pad quantum cryptography, this paper provides a permanent secure QKD protocol. The protocol authenticates the both parties for two times and could get a quantum state effective rate at 100% in an ideal environment. In addition, this protocol is permanent secure, sustainable, and easy to be deployed.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125295095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信