{"title":"Cell Image Classification Based on the Support Vector Machine and D-S Evidence Theory","authors":"Miao Ye, Hongbing Qiu, Yong Wang, Fan Zhang","doi":"10.1109/CIS.2017.00030","DOIUrl":"https://doi.org/10.1109/CIS.2017.00030","url":null,"abstract":"When using the support vector machine (SVM) to directly classify the cell images according to their shape and texture features, the accuracy of that classification can be affected by any imbalance in the dimensions of these two types of features. We here proposed a method of cell image classification based on the SVM and D-S evidence theory. First, we performed \"One-vs-rest\" classification on the shape and texture features of the extracted images by using the v-SVM of the posterior probabilities. We then designed a reasonable reliability assignment function for the output probability classification results and carried out two rounds of classification of information fusion of the D-S evidence theory. Through the comparative experiments performed on the actual cell image data sets, we demonstrated that this method of design can classify cell images more accurately than other methods.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133340323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wan Lei, Lihui Wang, Weijun Shan, Kun Jiang, Qing Li
{"title":"A Frequency-Based Leakage Assessment Methodology for Side-Channel Evaluations","authors":"Wan Lei, Lihui Wang, Weijun Shan, Kun Jiang, Qing Li","doi":"10.1109/CIS.2017.00137","DOIUrl":"https://doi.org/10.1109/CIS.2017.00137","url":null,"abstract":"With the constant improvement of side-channel attack technology, people pay more attention to the security of chips and many new assessment technology arise at the historic moment. Currently, one of the most prevailing evaluation technology is TVLA (Test Vector Leakage Assessment), which does not depend on the specific implementation of cryptographic algorithms and the underlying architecture of cryptographic devices, but just utilizes t test to evaluate the possibility of leakage in cryptographic algorithms. Existing TVLA methods carry out t tests on power traces at every sampling point, and evaluate whether or not the algorithms exist leakages in each cryptographic operation, which firstly requires the traces must be aligned strictly. But when the power traces are badly aligned or can't be aligned, the TVLA assessment results are meaningless. In order to resolve this issue, we propose a new leakage assessment methodology. First, we carry out frequency spectrum analysis on the power traces collected in time domain; then, evaluate whether exists a leakage by conducting t tests; finally, we verify the validity and effectiveness of this frequency-based TVLA method.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133120852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaxi Ye, Bin Zhang, Ziqing Ye, Chao Feng, Chaojing Tang
{"title":"Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases Prioritizing","authors":"Jiaxi Ye, Bin Zhang, Ziqing Ye, Chao Feng, Chaojing Tang","doi":"10.1109/CIS.2017.00126","DOIUrl":"https://doi.org/10.1109/CIS.2017.00126","url":null,"abstract":"Nowadays much attention is paid to the threat of vulnerabilities on the software security. Fuzzing and symbolic execution, complementary to each other, are two effective techniques in software testing. In this paper, we develop the prototype called FAS(Fuzzing and Symbolic) for software testing under both fuzzing and symbolic execution. In our method, the test cases are prioritized through deep-oriented strategy and large-distance-first strategy, in order to get a higher path-coverage with the condition of limited resource","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Flower Image Classification Using Sum-Product Networks","authors":"Xiaojie Shi","doi":"10.1109/CIS.2017.00031","DOIUrl":"https://doi.org/10.1109/CIS.2017.00031","url":null,"abstract":"Traditional stretch-based preprocessing method in image classification is unable to meet practical needs due to image distortion and information destruction of original structures. This paper presents a novel approach based on Sum-Product Networks (SPNs) for flower image classification. With SPNs, an image preprocessing method maintaining aspect ratio is used and an efficient feature extraction method is then applied. We performed experiments on 17 classes of flower images to examine the efficiency of the method we proposed.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133201300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"View-Normalized Gait Recognition Based on Gait Frame Difference Entropy Image","authors":"Zhanli Li, Pengrui Yuan, Fang Yang, Hong-an Li","doi":"10.1109/CIS.2017.00106","DOIUrl":"https://doi.org/10.1109/CIS.2017.00106","url":null,"abstract":"The difference of view in the gait image sequence can lead to the inconsistency of information contained in the different sequence of the same object, which affects the accuracy of feature extraction and increases the difficulty of recognition. Aiming at this problem, based on gait frame difference entropy image, this paper processes view normalization on the gait feature image using low rank optimization. Low rank optimization can keep the invariant part of the image to the maximum extent, reduce the influence of view change on feature. Finally, the nearest neighbor classification method is used to recognize. The experimental results show that the method of view normalization based on gait frame difference entropy image improves the recognition rate under cross view to a certain extent, and has some robustness to walking state and clothing change.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parameter Estimation of Communication Signal in Alpha-stable Distribution Noise Environment","authors":"Jiai He, Panpan Du, Xing Chen","doi":"10.1109/CIS.2017.00047","DOIUrl":"https://doi.org/10.1109/CIS.2017.00047","url":null,"abstract":"The parameter estimation of communication signal is a key problem in noncooperative communication signal processing. The traditional algorithm which uses cyclic spectrum to estimate signal's parameters could not achieve the desired results in alpha-stable distribution noise environment. Therefore, in this paper, a joint estimation algorithm based on the generalized cyclic spectrum is proposed. Firstly, this paper defines the generalized cyclic spectrum through the nonlinear transformation. Then the carrier frequency and the symbol rate are estimated by detecting spectral peak of different sections of the generalized cyclic spectrum. In the end, the algorithm is simulated by the BPSK modulation signal, and the experimental results are analyzed with the normalized mean square error and the deviation. Compared with the performance of the traditional cyclic spectrum algorithm in Gaussian noise, it can be seen that the joint estimation algorithm is feasible in alpha-stable distribution noise.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"61 31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125862322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sihang Pu, Zheng Guo, Junrong Liu, Dawu Gu, Yingxuan Yang, Xiaoke Tang, Jie Gan
{"title":"Boolean Matrix Masking for SM4 Block Cipher Algorithm","authors":"Sihang Pu, Zheng Guo, Junrong Liu, Dawu Gu, Yingxuan Yang, Xiaoke Tang, Jie Gan","doi":"10.1109/CIS.2017.00059","DOIUrl":"https://doi.org/10.1109/CIS.2017.00059","url":null,"abstract":"SM4, a proposed commercial block cipher to be used in IEEE 802.11i standard, has been widely performed in the Chinese National Standard for Wireless LAN WAPI (Wired Authentication and Privacy Infrastructure). Although it provides mathematical security in theory, implementation of the algorithm can be vulnerable to some side-channel analysis, especially Differential Power Analysis (DPA). To counter this kind of attacks, various masking schemes and other countermeasures have been well developed. In this paper, we propose and implement a new masking scheme for SM4 to defend DPA-like attacks. This countermeasure is based on Boolean matrix product masking which is a provable security masking scheme and consists of both additive Boolean masking and inner product masking directions. We develop a first variant version of this full-masking scheme on SM4 and implement it particularly on ATMega2560 in pure C language. Though the security potential of this matrix masking scheme has been proved, we evaluate performance and efficiency of this masking scheme through experiments in the paper.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123679449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Local Searching Strategy for Global Optimization with a Large Number of Local Optimum","authors":"Fei Wei, Shugang Li, Jinfeng Xue","doi":"10.1109/CIS.2017.00057","DOIUrl":"https://doi.org/10.1109/CIS.2017.00057","url":null,"abstract":"For global optimization, because there are a lot of local optimal solutions in problems, differential evolution will face a huge challenge and the efficiency and effectiveness for most of them will be much reduced. In this paper, a new local searching method is proposed in designing a novel evolutionary algorithm for global optimization. Therefore, we construct a new algorithm called differential evolution with a new local searching for global optimization. The simulations are made on standard benchmark suite. The results indicate the proposed algorithm is more effective and efficient.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Memetic Particle Swarm Optimization Algorithm to Solve Multi-objective Optimization Problems","authors":"Xin Li, Jingxuan Wei, Yang Liu","doi":"10.1109/CIS.2017.00018","DOIUrl":"https://doi.org/10.1109/CIS.2017.00018","url":null,"abstract":"An improved particle swarm optimization algorithm to solve multi-objective optimization problems is proposed, called MoMPSO. Firstly, Simulated annealing is incorporated to Particle swarm optimization to enhance the search ability. Secondly, Nonuniform mutation is used to increase the diversity. The simulated results show that the proposed algorithm is better than the compared ones.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125321916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Web Email System Based on IBC","authors":"Bo-wen Huo, Yihong Long, Jinglin Wu","doi":"10.1109/CIS.2017.00134","DOIUrl":"https://doi.org/10.1109/CIS.2017.00134","url":null,"abstract":"Email clients supporting encryption and signature are mostly based on the PKI (public key infrastructure) system, and users need their own digital certificates to send secure mails. This leads to a series of complicated operation problems with digital certificates. IBC (Identity-based cryptography) is an asymmetric algorithm, with the user's unique identity information and a set of public parameters combined as a public key. It avoids the problems with PKI and is a good substitute for PKI. However, current standard applications including email clients do not support IBC algorithm. In this work, we use pseudo-RSA digital certificate technology to bridge the gap. The technology stores an IBC key in an RSA certificate structure, generates secure email in SMIME format, making the resulted email compatible with SMIME enabled software. The focus of this work is on secure web email. To achieve cross-platform applicability, non-plug-ins technology is employed for the proposed secure web email system.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125444298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}