{"title":"A Vision-Based GPS-Spoofing Detection Method for Small UAVs","authors":"Y. Qiao, Yuxing Zhang, Xiao Du","doi":"10.1109/CIS.2017.00074","DOIUrl":"https://doi.org/10.1109/CIS.2017.00074","url":null,"abstract":"In recent years, consumer-class UAVs have come into public view and cyber security starts to attract the attention of researchers and hackers. The tasks of positioning, navigation and return-to-home (RTH) of UAV heavily depend on GPS. However, the signal structure of civil GPS used by UAVs is completely open and unencrypted, and the signal received by ground devices is very weak. As a result, GPS signals are vulnerable to jamming and spoofing. The development of software define radio (SDR) has made GPS-spoofing easy and costless. GPS-spoofing may cause UAVs to be out of control or even hijacked. In this paper, we propose a novel method to detect GPS-spoofing based on monocular camera and IMU sensor of UAV. Our method was demonstrated on the UAV of DJI Phantom 4.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117007605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Allocation of Water Resources Based on Central Force Optimization","authors":"Jie Liu, Fei Liang","doi":"10.1109/CIS.2017.00143","DOIUrl":"https://doi.org/10.1109/CIS.2017.00143","url":null,"abstract":"In this paper, a global optimization model of water resources allocation is proposed combined with the South - to - North water diversion in Jiangsu Province. A new evolutionary algorithm - CFO - is applied to solve this problems. Finally, the method of theory - model and example analysis are employed. Numerical results show that the mathematical model is reasonable, and the evolutionary algorithm is effective and feasible.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114570636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Verifying Data Integrity for Cloud Storage","authors":"Yindong Chen, Liping Li, Ziran Chen","doi":"10.1109/CIS.2017.00135","DOIUrl":"https://doi.org/10.1109/CIS.2017.00135","url":null,"abstract":"The developments of cloud computing technology and reliable modern network have been motivating users to store data in cloud servers and rendering security of cloud computing a focus of attention. While data security can be ensured by data encryption technology, data integrity is secured by certain checking algorithm. A verification method of data integrity which can be performed repeatedly is proposed after the comprehensive analysis of the feature of static data stored in a cloud server and its security requirements. The client preprocesses the data file according to the times that the data is required checking, and then upload the data file with check metadata to cloud server, so that the client can spot check the data within limited times and judge the data integrity. Through the analysis of security and performance, we show that this scheme can efficiently verify the data integrity and resist the replay attack and MitM (Man-in-the-middle attack).","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126953925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XGBoost-Based Android Malware Detection","authors":"Jiong Wang, Boquan Li, Yuwei Zeng","doi":"10.1109/CIS.2017.00065","DOIUrl":"https://doi.org/10.1109/CIS.2017.00065","url":null,"abstract":"Malware remains the most significant security threat to smartphones in spite of the constantly upgrading of the system. In this paper, we introduce an Android malware detection method based on XGBoost model. We subsequently discuss the effect of feature selection on the classification. In the end, we verify the high efficacy and good accuracy of this model through the experiment, which achieves similar results to the SVM while spending less time.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gravitational Search Algorithm with a New Technique","authors":"Juan Li, Ning Dong","doi":"10.1109/CIS.2017.00120","DOIUrl":"https://doi.org/10.1109/CIS.2017.00120","url":null,"abstract":"Gravitational search algorithm (GSA) has been invented by Newton Gravitational Law to solve complex global optimization problem. Many improved GSA has been proposed by many researches to improve its performance. In this paper, a new updating mechanism has been proposed to prevent premature convergence and stagnation in evolution. The core idea of particle swarm optimization (PSO) is introduced into GSA to overcome these issues. Some nonlinear benchmark functions are chosen to verify the effectiveness of new algorithm. The numerical experimental results show that the new algorithm is robustness.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125551065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and Constant Time Modular Inversions Over Prime Fields","authors":"Sen Xu, Haihua Gu, Lingyun Wang, Zheng Guo, Junrong Liu, Xiangjun Lu, Dawu Gu","doi":"10.1109/CIS.2017.00122","DOIUrl":"https://doi.org/10.1109/CIS.2017.00122","url":null,"abstract":"As an important operation, modular inversion is crucial for high-performance public key cryptosystems (PKC), especially in Elliptic curve-based schemes over prime fields. Both security and efficiency must be considered in a specific implementation. Straightforward implementation leaks side channel information which can be used for breaking Elliptic curve signature algorithm (ECDSA) through a combination attack. Modular inversion is also the most time-consuming operation which has important impact on the performance. Therefore, efficient and constant time modular inversion is an optimal option to ensure both security and efficiency. In this paper, we describe a general principle on how to construct efficient constant time modular inversion based on Fermat's little theorem (FLT) over prime fields. We give the tight upper bounder of multiplications needed in our schemes. Improvements are obtained from both algorithm architecture and Montgomery trick. We extended our scheme to NIST and Chinese Elliptic curve standard, which can save 90% multiplications. The total improvement is a factor of 2 by comparing the straightforward implementation.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-focus Image Performance Evaluation Method Based on the Extraction and Combination of Multiple Metrics","authors":"Weitong Li, Yu Cheng, Yuehui Sun, Shaoqiu Xu","doi":"10.1109/CIS.2017.00036","DOIUrl":"https://doi.org/10.1109/CIS.2017.00036","url":null,"abstract":"In multi-focus image fusion, some objective metrics were proposed to evaluate the fused images and compare the corresponding fusion algorithms further. For an image, some metrics can acquire satisfied results, while others can't give credible conclusions. Single objective metric can't assess an image correctly and comprehensively, so multiple metrics may be combined to evaluate the fused images. In this paper, a method named multiple metrics extraction and combination is studied. First, a total set with some popularly cited and representative metrics is formed. Second, for each group of images, the appropriate metrics are extracted from the total set to construct an evaluation set. Therefore two sets of images may have diverse evaluation sets. Third, for each image of the same group, the extracted metrics are combined into three scalars with three measurement methods respectively. Finally, the consistency of measurement results is verified with the scalars. The simulations show that our method outperforms single metric and provides a new way to the research of performance evaluation.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116537861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Heterogeneity Analysis of Complex Diseases Based on Clustering Algorithm","authors":"Xiong Li, Che Wang, Liyue Liu, Xuewen Xia","doi":"10.1109/CIS.2017.00041","DOIUrl":"https://doi.org/10.1109/CIS.2017.00041","url":null,"abstract":"There are lots of methods designed for epistasis analysis, but some of them neglect the heterogeneity phenomena of complex diseases. In some cases, the results of association studies may be hard to be interpreted. In this study, we propose a three-step method for heterogeneity analysis. (1) A feature selection step is applied for recognizing multiple combinations of epistatic SNPs which may contribute to different subtypes of complex diseases. (2) A filter step based on Bonferroni-corrected significance level is used to remove those false positive epistatic SNPs combinations. (3) Several clustering algorithms are designed to illustrate and visualize the potential clusters, which are helpful for recognizing the different subtypes of complex diseases. The experimental results show that our method has practical meanings in heterogeneity analysis.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116581421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics of a Stochastic SIS Epidemic Model with Birth Pulses and Pulse Treatments","authors":"Guoqiang Deng, Aimin Tang, Miaomiao Xing, Lin Ling, Guirong Jiang, Wentao Huang","doi":"10.1109/CIS.2017.00101","DOIUrl":"https://doi.org/10.1109/CIS.2017.00101","url":null,"abstract":"In this paper, a stochastic SIS epidemic model with birth pulses and pulse treatments is constructed and investigated. By applying Floquet theory and qualitative theory of stochastic differential equations, the existence and stability of trivial solution and infection-free periodic solution are discussed. A special endemic solution and the boundedness of infective individuals are investigated. Numerical results for phase portraits, which are illustrated with two examples, are in good agreement with the theoretical analysis.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130746201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-objective Framework for Location Recommendation Based on User Preference","authors":"Shanfeng Wang, Maoguo Gong, Can Qin, Junwei Yang","doi":"10.1109/CIS.2017.00017","DOIUrl":"https://doi.org/10.1109/CIS.2017.00017","url":null,"abstract":"Location recommendation has attracted increasing attention in recent years. This paper proposes a novel multi-objective framework for location recommendation based on user preference. Under this framework, user preference can be separated into common preference and individual preference. Then two contradictory objective functions are designed to describe these two kinds of preferences. It is difficult to optimize these two objective functions simultaneously. In this paper, a novel multi-objective evolutionary algorithm is proposed to optimize these two objective functions. The proposed algorithm can make a good balance between these two objective functions. Experiments on two real application recommendation scenarios: Foursquare dataset and Gowalla dataset show that the proposed algorithm is effective to recommend locations.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134107983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}