2012 Eighth International Conference on Computational Intelligence and Security最新文献

筛选
英文 中文
Neuron-MOS Based Schmitt Trigger with Controllable Hysteresis 基于神经元- mos的可控磁滞Schmitt触发器
G. Hang, Yonghui Liao, Yang Yang, Danyan Zhang, Xiaohui Hu
{"title":"Neuron-MOS Based Schmitt Trigger with Controllable Hysteresis","authors":"G. Hang, Yonghui Liao, Yang Yang, Danyan Zhang, Xiaohui Hu","doi":"10.1109/CIS.2012.52","DOIUrl":"https://doi.org/10.1109/CIS.2012.52","url":null,"abstract":"A novel Schmitt trigger with controllable hysteresis using neuron-MOS transistors is presented. By selecting the ratio of capacitive coupling coefficients, a Schmitt trigger with different hysteresis characteristics can be achieved. By only varying the external input control signals, the hysteresis window can be conveniently moved without changing its width. The proposed Schmitt trigger has considerable simpler structure requiring only two neuron-MOS transistors and one CMOS inverter. The proposed Schmitt circuit is validated by HSPICE simulations with TSMC 0.35μm 2-ploy 4-metal CMOS technology, and the discrepancy of hysteresis values between the simulated and theoretical results is smaller than 5%.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124475083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analyzing Sequence Data Based on Conditional Random Fields with Co-training 基于协同训练的条件随机场序列数据分析
Leilei Yang, Guiquan Liu, Qi Liu, Lei Zhang, Enhong Chen
{"title":"Analyzing Sequence Data Based on Conditional Random Fields with Co-training","authors":"Leilei Yang, Guiquan Liu, Qi Liu, Lei Zhang, Enhong Chen","doi":"10.1109/CIS.2012.29","DOIUrl":"https://doi.org/10.1109/CIS.2012.29","url":null,"abstract":"Sequence data plays an important role in data analysis applications, such as sequence classification. One important aspect of sequence data analysis is to obtain the labeled sequence data and use a machine learning model to predict the sequence structures. Conditional Random Fields (CRF) is such a machine learning method which is popular used in sequential data analysis. This is because that CRF can effectively capture the data correlations in context with abundant training data. However, in real applications, the labeled training data is usually difficult to be collected. In order to reduce the requirement of the amount of the labeled training data, a novel model is proposed named Conditional Random Fields with Co-training (Co-CRF). The Co-CRF model can work well even on the reduced labeled training data. Empirical results show that Co-CRF can produce a more accurate analysis than the traditional CRF, especially with very limited training data.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124261293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Biometric Authentication Scheme with Privacy Preserving 一种新的隐私保护生物特征认证方案
Dexin Yang, Baolin Xu, Bo Yang, Jianping Wang
{"title":"A Novel Biometric Authentication Scheme with Privacy Preserving","authors":"Dexin Yang, Baolin Xu, Bo Yang, Jianping Wang","doi":"10.1109/CIS.2012.107","DOIUrl":"https://doi.org/10.1109/CIS.2012.107","url":null,"abstract":"In this paper, a novel biometric authentication scheme is proposed, which combines zero-knowledge proof, Σ - protocols and bit commitment scheme. The remote server compares biometric template using committed values, this can keep privacy of user's biometrics. To the best knowledge of us, this is the first scheme which uses Σ - protocols as a basic tool to implement biometric authentication. Compared with the previous schemes, this scheme has advantages as higher security, lower computation complexity and privacy keeping of biometric template.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image Fusion Based on NSCT and Bandelet Transform 基于NSCT和小波变换的图像融合
Q. Miao, Jingjing Lou, Pengfei Xu
{"title":"Image Fusion Based on NSCT and Bandelet Transform","authors":"Q. Miao, Jingjing Lou, Pengfei Xu","doi":"10.1109/CIS.2012.77","DOIUrl":"https://doi.org/10.1109/CIS.2012.77","url":null,"abstract":"A novel image fusion algorithm based on non-sub sampled contour let transform(NSCT) and Bandelet transform is proposed in this paper. As two different MGA tools, NSCT can give an asymptotic optimal representation of edges and contours in image by virtue of its characteristics of good multi-resolution, shift invariance, and high directionality, and Bandelet transform can take advantage of the geometrical regularity of image structure and represent sharp image transitions such as edges efficiently in image fusion. The new method, joint this two transforms to fuse image, is proposed in this paper. Firstly, two source images are decomposed into different frequency sub bands by NSCT, and then high frequency sub bands are further decomposed by Bandelet transform. Secondly\", \"the high frequency sub bands of the two images are fused with fusion rule and the fusion sub bands are reconstructed using inverse Bandelet transform. Finally, fusion low and high frequency sub bands and then the fused image is obtained by using inverse NSCT. Several different experiments are adopted to demonstrate that the fusion results based on the proposed method contain more details and smaller distortion information than any other methods does.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131500215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
DTMS: A Driving Training Management System Based on the Internet of Things DTMS:基于物联网的驾驶培训管理系统
Lingling Hu, Dazhou Wu, Xu Xu, Jie Yao
{"title":"DTMS: A Driving Training Management System Based on the Internet of Things","authors":"Lingling Hu, Dazhou Wu, Xu Xu, Jie Yao","doi":"10.1109/CIS.2012.49","DOIUrl":"https://doi.org/10.1109/CIS.2012.49","url":null,"abstract":"Shortcomings of existing training management systems have caused the decline of training quality in driving schools. This paper presents a new driving training management system based on the Internet of Things, which combines the technologies of radio frequency identification and video identification. It provides mainly functions of student attendance authentication, training timing, distance measuring and illegal behavior alarm, etc. It can be used to manage the overall driving training process visually and intelligently.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125643863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Revocable Key-Policy Attribute Based Encryption with Full Security 高效可撤销的基于密钥策略属性的全安全加密
Fengli Zhang, Qinyi Li, H. Xiong
{"title":"Efficient Revocable Key-Policy Attribute Based Encryption with Full Security","authors":"Fengli Zhang, Qinyi Li, H. Xiong","doi":"10.1109/CIS.2012.113","DOIUrl":"https://doi.org/10.1109/CIS.2012.113","url":null,"abstract":"In this paper, an efficient and fully secure revocable key policy ABE scheme is proposed. In our scheme, each user is assigned a key according to its attributes and unique identity. A sender can specify the list of revoked users and attributes of the cipher text explicitly. If the users have been revoked, they can not decrypt the message no matter whether their attributes satisfies the access formula or they combine their keys. The security of the proposed scheme can be reduced to three static intractable complexity assumptions through dual system encryption approach in the fully secure model. Comparing with the existing schemes, our scheme enjoys high security level and efficiency simultaneously.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Multi-server Architecture Authentication Protocol Using Smart Card 基于智能卡的多服务器架构认证协议
Jie Yu, Qingqi Pei
{"title":"A Multi-server Architecture Authentication Protocol Using Smart Card","authors":"Jie Yu, Qingqi Pei","doi":"10.1109/CIS.2012.121","DOIUrl":"https://doi.org/10.1109/CIS.2012.121","url":null,"abstract":"When user wants to access a network service, he/she must authenticate his/herself to the server. With the increasing of the different network services, it is extremely hard for user to remember the different ID and password, so the multi-server authentication protocols have been proposed to solve this problem. There are some authentication protocols for multi-server architecture using smart cards, but there are some serious secure problems in their schemes. The protocols they proposed cannot resist the replay attack, the impersonation attack, etc. So we propose a multi-server architecture authentication protocol with dynamic identify and smart card based on Lee et al.'s scheme. Our protocol can resist several kinds of attacks and remove the aforementioned weaknesses of their protocol. In this paper, we first provide a brief view of the multi-server architecture which is used in the authentication protocol, then we propose our multi-server architecture authentication protocol and give a security analysis of our proposed protocol, finally we make a comparison with our protocol and some other multi-server architecture authentication protocols.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Customers E-trust for Online Retailers: A Case in China 消费者对网络零售商的电子信任:以中国为例
W. Ruimei, Wang Shengxiong, Wu Tianzhen, Zhang Xiling
{"title":"Customers E-trust for Online Retailers: A Case in China","authors":"W. Ruimei, Wang Shengxiong, Wu Tianzhen, Zhang Xiling","doi":"10.1109/CIS.2012.134","DOIUrl":"https://doi.org/10.1109/CIS.2012.134","url":null,"abstract":"Online retailers are facing increasing competitions, thus, it is very important for them to attract and retain online customers. However, many factors can affect customer trust in online retailing (E-satisfaction) environment. This paper investigates the factors and their impacts on customer E-trust in online retail (B to C, C to C) in China. Based on the literature review and an exploratory study with 50 online customers, we identified a number of key factors that potentially impact on customer E-trust and proposed a conceptual model for E-trust. This model was used to examine how the factors in B to C and C to C e-retailing context influence E-trust. A large scale survey was conducted with 387 online customers. The analytical results demonstrated that customer perceived reputation has a direct positive influence on E-trust while customer perceived security impacts E-trust indirectly through customers' perceived reputation.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"471 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116581338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Key-Phrase Extraction Based on a Combination of CRF Model with Document Structure 基于CRF模型和文档结构相结合的关键短语提取
Feng Yu, H. Xuan, Dequan Zheng
{"title":"Key-Phrase Extraction Based on a Combination of CRF Model with Document Structure","authors":"Feng Yu, H. Xuan, Dequan Zheng","doi":"10.1109/CIS.2012.97","DOIUrl":"https://doi.org/10.1109/CIS.2012.97","url":null,"abstract":"Key-Phrase should not only reflect the main content of a document, but also reflect the specialty of this document. Key-Phrase extraction is an important technique in the field of text information processing. With the advent of the Internet age, on-line file shows an astonishing increase in geometry and information explosion has became the main character of this age. Searching and making use of network information becomes more difficult. Therefore, automatically extraction on keyword is required. This paper uses the idea of classification to complete the task of Key-Phrase extraction, which uses SVM to build classification model and uses CRF to extract Key-Phrases. The testing result shows that, the mentioned extraction approach has improved dramatically compared with previous methods in precision and recall rate.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132022799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Statistical Image Upsampling Method Based on CUDA 基于CUDA的统计图像上采样方法
Xin Zheng, Qingqing Xu, Peipei Pan, Ping Guo
{"title":"Statistical Image Upsampling Method Based on CUDA","authors":"Xin Zheng, Qingqing Xu, Peipei Pan, Ping Guo","doi":"10.1109/CIS.2012.86","DOIUrl":"https://doi.org/10.1109/CIS.2012.86","url":null,"abstract":"In many application fields, an appropriate high-quality fast image upsampling method is required. Although many interpolation-based upsampling methods have been proposed, the quality of result images is not satisfactory. Some of them are very fast, but produce poor quality images, the others can produce high quality images, but the methods in them are slow. In our paper, we proposed a fast statistical image upsampling method based on CUDA, it can obtain high quality images based on reducing the input resolution-grids dependency artifacts. Thus, we can rebuild low resolution images' sharp edges fast and get high-quality upsampled images in real time. We have applied this method in the multi-resolution texture generation of large scale terrain rendering. Experiments prove that our method can receive ideal effects in real time.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133478561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信