2017 13th International Conference on Computational Intelligence and Security (CIS)最新文献

筛选
英文 中文
A Vision-Based GPS-Spoofing Detection Method for Small UAVs 基于视觉的小型无人机gps欺骗检测方法
Y. Qiao, Yuxing Zhang, Xiao Du
{"title":"A Vision-Based GPS-Spoofing Detection Method for Small UAVs","authors":"Y. Qiao, Yuxing Zhang, Xiao Du","doi":"10.1109/CIS.2017.00074","DOIUrl":"https://doi.org/10.1109/CIS.2017.00074","url":null,"abstract":"In recent years, consumer-class UAVs have come into public view and cyber security starts to attract the attention of researchers and hackers. The tasks of positioning, navigation and return-to-home (RTH) of UAV heavily depend on GPS. However, the signal structure of civil GPS used by UAVs is completely open and unencrypted, and the signal received by ground devices is very weak. As a result, GPS signals are vulnerable to jamming and spoofing. The development of software define radio (SDR) has made GPS-spoofing easy and costless. GPS-spoofing may cause UAVs to be out of control or even hijacked. In this paper, we propose a novel method to detect GPS-spoofing based on monocular camera and IMU sensor of UAV. Our method was demonstrated on the UAV of DJI Phantom 4.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117007605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Optimal Allocation of Water Resources Based on Central Force Optimization 基于中心力优化的水资源优化配置
Jie Liu, Fei Liang
{"title":"Optimal Allocation of Water Resources Based on Central Force Optimization","authors":"Jie Liu, Fei Liang","doi":"10.1109/CIS.2017.00143","DOIUrl":"https://doi.org/10.1109/CIS.2017.00143","url":null,"abstract":"In this paper, a global optimization model of water resources allocation is proposed combined with the South - to - North water diversion in Jiangsu Province. A new evolutionary algorithm - CFO - is applied to solve this problems. Finally, the method of theory - model and example analysis are employed. Numerical results show that the mathematical model is reasonable, and the evolutionary algorithm is effective and feasible.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114570636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Verifying Data Integrity for Cloud Storage 一种云存储数据完整性验证方法
Yindong Chen, Liping Li, Ziran Chen
{"title":"An Approach to Verifying Data Integrity for Cloud Storage","authors":"Yindong Chen, Liping Li, Ziran Chen","doi":"10.1109/CIS.2017.00135","DOIUrl":"https://doi.org/10.1109/CIS.2017.00135","url":null,"abstract":"The developments of cloud computing technology and reliable modern network have been motivating users to store data in cloud servers and rendering security of cloud computing a focus of attention. While data security can be ensured by data encryption technology, data integrity is secured by certain checking algorithm. A verification method of data integrity which can be performed repeatedly is proposed after the comprehensive analysis of the feature of static data stored in a cloud server and its security requirements. The client preprocesses the data file according to the times that the data is required checking, and then upload the data file with check metadata to cloud server, so that the client can spot check the data within limited times and judge the data integrity. Through the analysis of security and performance, we show that this scheme can efficiently verify the data integrity and resist the replay attack and MitM (Man-in-the-middle attack).","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126953925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
XGBoost-Based Android Malware Detection 基于xgboost的Android恶意软件检测
Jiong Wang, Boquan Li, Yuwei Zeng
{"title":"XGBoost-Based Android Malware Detection","authors":"Jiong Wang, Boquan Li, Yuwei Zeng","doi":"10.1109/CIS.2017.00065","DOIUrl":"https://doi.org/10.1109/CIS.2017.00065","url":null,"abstract":"Malware remains the most significant security threat to smartphones in spite of the constantly upgrading of the system. In this paper, we introduce an Android malware detection method based on XGBoost model. We subsequently discuss the effect of feature selection on the classification. In the end, we verify the high efficacy and good accuracy of this model through the experiment, which achieves similar results to the SVM while spending less time.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Gravitational Search Algorithm with a New Technique 一种新的引力搜索算法
Juan Li, Ning Dong
{"title":"Gravitational Search Algorithm with a New Technique","authors":"Juan Li, Ning Dong","doi":"10.1109/CIS.2017.00120","DOIUrl":"https://doi.org/10.1109/CIS.2017.00120","url":null,"abstract":"Gravitational search algorithm (GSA) has been invented by Newton Gravitational Law to solve complex global optimization problem. Many improved GSA has been proposed by many researches to improve its performance. In this paper, a new updating mechanism has been proposed to prevent premature convergence and stagnation in evolution. The core idea of particle swarm optimization (PSO) is introduced into GSA to overcome these issues. Some nonlinear benchmark functions are chosen to verify the effectiveness of new algorithm. The numerical experimental results show that the new algorithm is robustness.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125551065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient and Constant Time Modular Inversions Over Prime Fields 素域上的高效常时间模反演
Sen Xu, Haihua Gu, Lingyun Wang, Zheng Guo, Junrong Liu, Xiangjun Lu, Dawu Gu
{"title":"Efficient and Constant Time Modular Inversions Over Prime Fields","authors":"Sen Xu, Haihua Gu, Lingyun Wang, Zheng Guo, Junrong Liu, Xiangjun Lu, Dawu Gu","doi":"10.1109/CIS.2017.00122","DOIUrl":"https://doi.org/10.1109/CIS.2017.00122","url":null,"abstract":"As an important operation, modular inversion is crucial for high-performance public key cryptosystems (PKC), especially in Elliptic curve-based schemes over prime fields. Both security and efficiency must be considered in a specific implementation. Straightforward implementation leaks side channel information which can be used for breaking Elliptic curve signature algorithm (ECDSA) through a combination attack. Modular inversion is also the most time-consuming operation which has important impact on the performance. Therefore, efficient and constant time modular inversion is an optimal option to ensure both security and efficiency. In this paper, we describe a general principle on how to construct efficient constant time modular inversion based on Fermat's little theorem (FLT) over prime fields. We give the tight upper bounder of multiplications needed in our schemes. Improvements are obtained from both algorithm architecture and Montgomery trick. We extended our scheme to NIST and Chinese Elliptic curve standard, which can save 90% multiplications. The total improvement is a factor of 2 by comparing the straightforward implementation.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-focus Image Performance Evaluation Method Based on the Extraction and Combination of Multiple Metrics 基于多指标提取与组合的多焦点图像性能评价方法
Weitong Li, Yu Cheng, Yuehui Sun, Shaoqiu Xu
{"title":"Multi-focus Image Performance Evaluation Method Based on the Extraction and Combination of Multiple Metrics","authors":"Weitong Li, Yu Cheng, Yuehui Sun, Shaoqiu Xu","doi":"10.1109/CIS.2017.00036","DOIUrl":"https://doi.org/10.1109/CIS.2017.00036","url":null,"abstract":"In multi-focus image fusion, some objective metrics were proposed to evaluate the fused images and compare the corresponding fusion algorithms further. For an image, some metrics can acquire satisfied results, while others can't give credible conclusions. Single objective metric can't assess an image correctly and comprehensively, so multiple metrics may be combined to evaluate the fused images. In this paper, a method named multiple metrics extraction and combination is studied. First, a total set with some popularly cited and representative metrics is formed. Second, for each group of images, the appropriate metrics are extracted from the total set to construct an evaluation set. Therefore two sets of images may have diverse evaluation sets. Third, for each image of the same group, the extracted metrics are combined into three scalars with three measurement methods respectively. Finally, the consistency of measurement results is verified with the scalars. The simulations show that our method outperforms single metric and provides a new way to the research of performance evaluation.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116537861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method for Heterogeneity Analysis of Complex Diseases Based on Clustering Algorithm 基于聚类算法的复杂疾病异质性分析方法
Xiong Li, Che Wang, Liyue Liu, Xuewen Xia
{"title":"A Method for Heterogeneity Analysis of Complex Diseases Based on Clustering Algorithm","authors":"Xiong Li, Che Wang, Liyue Liu, Xuewen Xia","doi":"10.1109/CIS.2017.00041","DOIUrl":"https://doi.org/10.1109/CIS.2017.00041","url":null,"abstract":"There are lots of methods designed for epistasis analysis, but some of them neglect the heterogeneity phenomena of complex diseases. In some cases, the results of association studies may be hard to be interpreted. In this study, we propose a three-step method for heterogeneity analysis. (1) A feature selection step is applied for recognizing multiple combinations of epistatic SNPs which may contribute to different subtypes of complex diseases. (2) A filter step based on Bonferroni-corrected significance level is used to remove those false positive epistatic SNPs combinations. (3) Several clustering algorithms are designed to illustrate and visualize the potential clusters, which are helpful for recognizing the different subtypes of complex diseases. The experimental results show that our method has practical meanings in heterogeneity analysis.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116581421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamics of a Stochastic SIS Epidemic Model with Birth Pulses and Pulse Treatments 具有出生脉冲和脉冲处理的随机SIS流行病模型动力学
Guoqiang Deng, Aimin Tang, Miaomiao Xing, Lin Ling, Guirong Jiang, Wentao Huang
{"title":"Dynamics of a Stochastic SIS Epidemic Model with Birth Pulses and Pulse Treatments","authors":"Guoqiang Deng, Aimin Tang, Miaomiao Xing, Lin Ling, Guirong Jiang, Wentao Huang","doi":"10.1109/CIS.2017.00101","DOIUrl":"https://doi.org/10.1109/CIS.2017.00101","url":null,"abstract":"In this paper, a stochastic SIS epidemic model with birth pulses and pulse treatments is constructed and investigated. By applying Floquet theory and qualitative theory of stochastic differential equations, the existence and stability of trivial solution and infection-free periodic solution are discussed. A special endemic solution and the boundedness of infective individuals are investigated. Numerical results for phase portraits, which are illustrated with two examples, are in good agreement with the theoretical analysis.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130746201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-objective Framework for Location Recommendation Based on User Preference 基于用户偏好的多目标位置推荐框架
Shanfeng Wang, Maoguo Gong, Can Qin, Junwei Yang
{"title":"A Multi-objective Framework for Location Recommendation Based on User Preference","authors":"Shanfeng Wang, Maoguo Gong, Can Qin, Junwei Yang","doi":"10.1109/CIS.2017.00017","DOIUrl":"https://doi.org/10.1109/CIS.2017.00017","url":null,"abstract":"Location recommendation has attracted increasing attention in recent years. This paper proposes a novel multi-objective framework for location recommendation based on user preference. Under this framework, user preference can be separated into common preference and individual preference. Then two contradictory objective functions are designed to describe these two kinds of preferences. It is difficult to optimize these two objective functions simultaneously. In this paper, a novel multi-objective evolutionary algorithm is proposed to optimize these two objective functions. The proposed algorithm can make a good balance between these two objective functions. Experiments on two real application recommendation scenarios: Foursquare dataset and Gowalla dataset show that the proposed algorithm is effective to recommend locations.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134107983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信