Phan The Duy, Tran Van Hung, Nguyen Hong Ha, Hien Do Hoang, V. Pham
{"title":"Federated learning-based intrusion detection in SDN-enabled IIoT networks","authors":"Phan The Duy, Tran Van Hung, Nguyen Hong Ha, Hien Do Hoang, V. Pham","doi":"10.1109/NICS54270.2021.9701525","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701525","url":null,"abstract":"Witnessing the explosion in the number of Internet of Things (IoTs) in industries, Software Defined Networking (SDN) is considered as a flexible, efficient, and programmable approach for network management and security policy enforcement. Particularly, it is more suitable in the context of industrial Internet of Things (IIoT) network comprising heterogeneous devices. Meanwhile, the demand of ensuring cyber threat resistance has more become the serious concern from both academia and industry due to incidents, cyberattacks, personal data breaches reported recently. Many intrusion detection systems (IDS) leverage the advances in machine learning (ML) to build the more efficient attack detector against the unknown malicious actions in the network. Such an approach requires gathering a large amount of network traffic for model training in a centralized platform. It obviously violates the data privacy protection since the network traffic is sensitive information if accessed and used by a third party. To take advantage of private network data from various sources for mutually training detection model, federated learning (FL) is recently introduced as a solution that can address the problem of violating data privacy for ML-based cybersecurity solution during training phase. Thus, this work introduces the FL approach for IDS to facilitate the privacy preserving in model training while collaboratively maintaining the efficiency of attack detection in IIoT context with the leverage of SDN.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UIT-Anomaly: A Modern Vietnamese Video Dataset for Anomaly Detection","authors":"D. Vo, T. Tran, Nguyen D. Vo, Khang Nguyen","doi":"10.1109/NICS54270.2021.9701556","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701556","url":null,"abstract":"Anomaly detection in videos is of utmost importance for numerous tasks in the field of computer vision. We introduce the UIT-Anomaly dataset captured in Vietnam with a total duration of 200 minutes. It contains 224 videos with six different types of anomalies. Moreover, we apply a method for weakly supervised video anomaly detection, called Robust Temporal Feature Magnitude learning (RTFM) based on feature magnitude learning to detect abnormal snippets. The approached method yields competitive results, compared to other state-of-the-art algorithms using publicly available datasets such as ShanghaiTech and UCF–Crime.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126542139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anh Le Thi, Hong Nguyen Thi, Trung Pham Viet, Vo Nguyen Quoc Bao
{"title":"Performance evaluation of cooperative NOMA-IRS network using particle swarm optimization","authors":"Anh Le Thi, Hong Nguyen Thi, Trung Pham Viet, Vo Nguyen Quoc Bao","doi":"10.1109/NICS54270.2021.9701464","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701464","url":null,"abstract":"In this paper, we investigate the performance of intelligent reflecting surface (IRS) aided cooperative non-orthogonal multiple access (NOMA) system in an energy-harvesting (EH) relay network. Particularly, in our proposed system, a base station communicates with two NOMA users with a help of the best EH relay employing a power-splitting (PS) architecture and IRS component. To boost the system performance, an important object is the maximization of sum data rate (SDR) which is proposed by using particle swarm optimization (PSO) based on power allocation (PA) for each destination user and phase shift of IRS. To validate the performance of PSO, another swarm intelligence technique as Genetic Algorithm (GA) and Exhaustive Search (ES) methods are considered. Finally, the outstanding performance of NOMA-supported IRS in comparison with the system without IRS is also shown in this paper.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121654720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Template Waveform Synthesize Technique for Ultra-wide band Signal in Measuring Distance","authors":"Nguyen Thi Huyen, Duong Duc Ha, Pham Thanh Hiep","doi":"10.1109/NICS54270.2021.9701521","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701521","url":null,"abstract":"With the very larger bandwidth, the ultra-wide band (UWB) technology has good resolution when used for short-range positioning techniques and the correct detection of the received UWB signals is one of the important factors affect the accuracy of the positioning technique. In this paper, a method used to improve the detection accuracy of the received UWB signal in multi-path environment based on the synthesize sample waveform at the UWB receiver is proposed. The results obtained from the mathematic analysis and computer simulation show that with the proposed technique, the ability to detect the UWB signal is improved, the effect of inter pulse interference (IPI) is eliminated, and the accuracy in measuring the distance is enhanced.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122773845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Retrieval with Text Feedback based on Transformer Deep Model","authors":"Truc Luong-Phuong Huynh, N. Ly","doi":"10.1109/NICS54270.2021.9701539","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701539","url":null,"abstract":"Image retrieval with text feedback has many potentials when applied in product retrieval for e-commerce platforms. Given an input image and text feedback, the system needs to retrieve images that not only look visually similar to the input image but also have some modified details mentioned in the text feedback. This is a tricky task as it requires a good understanding of image, text, and also their combination. In this paper, we propose a novel framework called Image-Text Modify Attention (ITMA) and a Transformer-based combining function that performs preservation and transformation features of the input image based on the text feedback and captures important features of database images. By using multiple image features at different Convolution Neural Network (CNN) depths, the combining function can have multi-level visual information to achieve an impressive representation that satisfies for effective image retrieval. We conduct quantitative and qualitative experiments on two datasets: CSS and FashionIQ. ITMA outperforms existing approaches on these datasets and can deal with many types of text feedback such as object attributes and natural language. We are also the first ones to discover the exceptional behavior of the attention mechanism in this task which ignores input image regions where text feedback wants to remove or change.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125062978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CRYScanner: Finding cryptographic libraries misuse","authors":"Amit Choudhari, S. Guilley, Khaled Karray","doi":"10.1109/NICS54270.2021.9701469","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701469","url":null,"abstract":"Cryptographic libraries have become an integral part of every digital device. Studies have shown that these systems are not only vulnerable due to bugs in cryptographic libraries, but also due to misuse of these libraries. In this paper, we focus on vulnerabilities introduced by the application developer. We performed a survey on the potential misusage of wellknown libraries such as PKCS # 11. We introduced a generic tool CRYScanner, to identify such misuses during and post-development. It works on the similar philosophy of an intrusion detection system for an internal network. This tool provides verification functions needed to check the safety of the code, such as detecting incorrect call flow and input parameters. We performed a feature-wise comparison with the existing state of the art solutions. CRYScanner includes additional features, preserving the capabilities of both static and dynamic analysis tools. We also show the detection of potential vulnerabilities in the several sample codes found online.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secret Key Group Implementation Using Chain Topology","authors":"Mike Yuliana, Amang Sudarsono","doi":"10.1109/NICS54270.2021.9701561","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701561","url":null,"abstract":"The rapid development of technology is marked by the increasing use of wi-fi technology for the process of exchanging data and information. Over time, the exchange of data and information began to become insecure. Therefore, a secret key is needed. This key is needed to maintain the security and comfort of wi-fi users in exchanging data or information that is confidential and does not want other users to know. In this study, it is proposed to create a secret key group using a chain topology and received signal strength (RSS) as a source of key extraction. The advantage of secret key extraction using Received Signal Strength (RSS) is that it is easy to access to be applied to wireless devices. From the overall test results, it can be seen that scenario 1 produces the best performance in terms of correlation parameters and the number of secret keys generated. The highest correlation obtained reached 0.9064 while the number of keys obtained reached 7 keys with an approximate entropy of 0.528.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124838009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Graph Analysis Based Approach for Specification-Driven Testing of Model Transformations","authors":"Thi-Hanh Nguyen, Duc-Hanh Dang","doi":"10.1109/NICS54270.2021.9701514","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701514","url":null,"abstract":"Model transformation plays a critical role of model-driven approaches and is a significant quality factor for final products. Among current approaches to testing transformations, specification-driven testing gains much attention of research community since the black-box testing has many advantages including understandability for modelers and independence of transformation languages. One of the main challenges for this approach is how to systematically and effectively generate test cases from a transformation specification, i.e, rather than from its implementation. This paper aims to introduce a language on the one hand to precisely specify transformation requirements and on the other hand to facilitate the verification and validation of MTs. Within our approach, such a transformation specification language is defined based on triple-graph-grammar (TGG) rules and graph patterns that allow us to express transformation requirements in a visual, precise, and declarative way. Besides, we introduce a systematic testing framework to ensure many important properties of MTs such as syntactical correctness, completeness, functional behavior, and information preservation.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127198506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Evaluate Alternatives in Multi-Attribute Decision Making Problems based on Linguistic Many-Valued Logic","authors":"Phuong Le Anh, Hoai Nhan Tran, Dinh-Khang Tran","doi":"10.1109/NICS54270.2021.9701502","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701502","url":null,"abstract":"Humans are often faced with decisions, that is, have to choose between different alternatives every day. Many of these decision problems are under uncertain environments with vague and imprecise information. Thus, linguistic decision making problem is important research topic. Besides, decision making is widely applied in fields such as society, economy, medicine, management, and military affairs, etc. In the framework of the linguistic many-valued logic, both comparable and incomparable truth-values can be expressed. This paper further studies the applicability of linguistic many-valued logic for dealing with the decision making problem and proposes a linguistic many-valued reasoning approach for the decision making model. This approach can also address the reasoning of decision making directly on linguistic truth values.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Circularly Polarized Array Antenna for GPS Application","authors":"Khuat Dinh Chinh, Tran Thi Lan","doi":"10.1109/NICS54270.2021.9701530","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701530","url":null,"abstract":"The paper proposes a 2×2 array antenna for GPS (Global Positioning System) application in the L1 band (1.575 GHz). In which, the element antenna is a square patch antenna with a diagonal slot in the middle to create circular polarization (CP). The element antennas are fed sequential-phase feeding network to reduce the size of the array antenna. To extend the 3 dB axial ratio (AR) bandwidth (BW), parasitic patches are added to either side of the main radiating patch of the element antennas. The antenna is designed using FR-4 material with compact size of 182×182×1.6 mm3, impedance BW 62.2 MHz (3.95 %), 3 dB AR BW 30.3 MHz (1.92%) and high gain 10 dBi. Especially, the polarization isolation between the right-handed CP (RHCP) and left-handed CP (LHCP) is higher than 24 dB. These results show that the proposed antenna is really effective for GPS applications.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126355190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}