Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications最新文献

筛选
英文 中文
Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems 基于动态地址分配机制的工业控制系统安全保护
Chuan-Gang Liu, Chin-Jui Wu, I. Liu, Chi-Che Wu, Jung-Shian Li
{"title":"Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems","authors":"Chuan-Gang Liu, Chin-Jui Wu, I. Liu, Chi-Che Wu, Jung-Shian Li","doi":"10.1145/3440943.3444716","DOIUrl":"https://doi.org/10.1145/3440943.3444716","url":null,"abstract":"In recent years, industrial control systems (ICS) are widely used in many occasions, which makes information security of ICS an important issue. This study discusses the communication and management on ICS to make ICS intelligent. We proposed a method to avoid attack of communication, and elaborated the means of our proposed communication in which all communication parties communicate with each other without transmitting IP information. Moreover, as an intelligent ICS, the transmission module we design can detect anomaly in the system and change the transmission rule based on our algorithm, also known as a type of moving target defense. Therefore, we proposed the scheme to improve the transmission security in ICS. The experimental results also show that our scheme can be feasible in ICS.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"s3-29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding users' switching behavior of hypermarket marketing methods: An empirical study from the perspective of push-pull-mooring framework 理解大卖场营销方式的用户切换行为:推拉系泊框架视角下的实证研究
Chia-Wen Tsai, K. Chung
{"title":"Understanding users' switching behavior of hypermarket marketing methods: An empirical study from the perspective of push-pull-mooring framework","authors":"Chia-Wen Tsai, K. Chung","doi":"10.1145/3440943.3444349","DOIUrl":"https://doi.org/10.1145/3440943.3444349","url":null,"abstract":"1The retail industry is changing as the latest concepts of retail stores came out. (Diallo et al., 2015), and the sort of retail store also become more extensively diversified (Shi et al., 2018). This diversification is a result of demand heterogeneity from diverse consumer groups (González-Benito et al., 2007).The selection of retail channels is one of the important decisions which consumers make when they purchase a product or service. How to select a retail channel involves the information searching of the product, evaluation of alternatives, and making a purchasing decision regarding the product (Ansari, Mela, & Neslin, 2008). Therefore, consumers will have complex purchasing behavior when selecting retail channels in order to consider the availability of various retail channels. Consumers may finish all purchase-related activities with one stop shopping or through multiple retail channels. This study makes analysis based on push-pull-mooring theory. People can understand the crucial factors which customers change their intentions in the retail industry from the perspective of push, pull, and mooring theory. This study is analyzed through spss 22 and smart PLS3.0, then it comes out the result of analysis that the payment risk will affect the intention conversion positively, costs conversion will influence intention conversion negatively, and Corporate Social Responsibility will also effect intention conversion negatively.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications 2020年ACM智能计算及其新兴应用国际会议论文集
{"title":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","authors":"","doi":"10.1145/3440943","DOIUrl":"https://doi.org/10.1145/3440943","url":null,"abstract":"","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Digital Forensic Method for Decentralized Web Service 分布式Web服务的数字取证方法研究
Hyunpyo Choi, Jiho Shin, Jung-Taek Seo
{"title":"A Study on the Digital Forensic Method for Decentralized Web Service","authors":"Hyunpyo Choi, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444736","DOIUrl":"https://doi.org/10.1145/3440943.3444736","url":null,"abstract":"In recent years, various decentralized web services have emerged. Note, however, that websites that can be connected using decentralized web services are difficult to access through the use of general search engines. In this paper, ZeroNet, one of the decentralized web services, is analyzed to verify the information generated when used. The analyzed information is used in the digital forensic method to show an example of how to apply the method by presenting a scenario.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Implementation of IoT-based Smart Laboratory Management System 基于物联网的智能实验室管理系统的实现
Nan-Kai Hsieh, T. Kang, Tzer-Long Chen, Jhih-Chung Chang, M. Wang, Tzer-Shyong Chen, Yu-Fang Chung
{"title":"The Implementation of IoT-based Smart Laboratory Management System","authors":"Nan-Kai Hsieh, T. Kang, Tzer-Long Chen, Jhih-Chung Chang, M. Wang, Tzer-Shyong Chen, Yu-Fang Chung","doi":"10.1145/3440943.3442721","DOIUrl":"https://doi.org/10.1145/3440943.3442721","url":null,"abstract":"With the coming of information age, the laboratory and the manufacture factory begins to import smart monitor system to enhance safety. The smart monitor system can save human costs. The information system can prevent unsafety event from happening. Smart Laboratory Administrator System was developed to cooperate with IoT (Internet of things) to prevent illegal invasion and achieve internal security. If unexpected events happen, it will work and switch on an alarm to prevent objects in the laboratory from being stolen. Hence, the Smart Laboratory Administrator System can save the human cost and enhance the security of laboratory.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Development of UAV-based Air Quality Monitor System 基于无人机的空气质量监测系统的研制
Lie Yang, Shicheng Shao, Chien-Erh Weng, Yung-Cheng Yao
{"title":"The Development of UAV-based Air Quality Monitor System","authors":"Lie Yang, Shicheng Shao, Chien-Erh Weng, Yung-Cheng Yao","doi":"10.1145/3440943.3444350","DOIUrl":"https://doi.org/10.1145/3440943.3444350","url":null,"abstract":"This paper proposes the development of real-time air quality monitor system based on unmanned aerial vehicle (UAV), which can effectively compensate for the lack of mobility and immediateness of air pollution monitoring operations. The system includes a detection sampling site and a ground receiving station, using wireless communication to performs data transmission and remote control. And the detection sampling terminal uses an unmanned aerial vehicle equipped with a microcontroller, volatile organic compounds, temperature and humidity sensing modules. The detection sampling terminal can detect air quality, and carries a gas sampling tank to collect air samples. The ground receiving station can remotely control the detection sampling terminal, display and record the received air data.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121541201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Injection Method for Hardware-implemented AES without Artificial Triggering 硬件实现AES无人工触发的故障注入方法
HanSeop Lim, Taeho Lee, Seong-Yong Lim, Jaeseong Han, Bo-Yeon Sim, Dong‐Guk Han
{"title":"Fault Injection Method for Hardware-implemented AES without Artificial Triggering","authors":"HanSeop Lim, Taeho Lee, Seong-Yong Lim, Jaeseong Han, Bo-Yeon Sim, Dong‐Guk Han","doi":"10.1145/3440943.3444739","DOIUrl":"https://doi.org/10.1145/3440943.3444739","url":null,"abstract":"The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understand the public insurance purchase orientation through the triangle theory of love 通过爱的三角理论来理解大众保险的购买取向
Ying-Chi Chen, K. Chung
{"title":"Understand the public insurance purchase orientation through the triangle theory of love","authors":"Ying-Chi Chen, K. Chung","doi":"10.1145/3440943.3444348","DOIUrl":"https://doi.org/10.1145/3440943.3444348","url":null,"abstract":"1In today's Taiwanese society, all citizens must have national health insurance, which allows people across the country to not have to bear huge medical expenses when registering for medical treatment. An analysis of Taiwan's data over the past 10 years shows that a 1% increase in the previous period's CPI will result in a decrease of 3.2% to 4.4% in the next period of premium income. We also found that there is a considerable degree of positive correlation between the growth rate of premium income (both life insurance and property insurance) and the economic growth rate over the same period. The Baoxian industry has a great influence on our economic development. This research is analyzed through Smart PLS and SPSS. The results of the research show that the three components of this research show the complexity of the emotional boundary through the relationship-oriented service industry of the triangle of love transaction, which is reflected in the emotional structure. The research results show that the insurance industry will focus more on relationship marketing on the emotional side. In the insurance industry, the nature of customer sentiment towards companies is driven by commitment in the relationship-oriented service industry. This discovery can help insurance practitioners to reduce time and money losses in developing relationship marketing research.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121772811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis 基于混合云的网络威胁情报共享模型需求分析研究
Jae-Wook Heo, Yonas Engida Gebremariam, Hoonyong Park, Bonam Kim, I. You
{"title":"Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis","authors":"Jae-Wook Heo, Yonas Engida Gebremariam, Hoonyong Park, Bonam Kim, I. You","doi":"10.1145/3440943.3444737","DOIUrl":"https://doi.org/10.1145/3440943.3444737","url":null,"abstract":"Because of the phenomenal growth of internet connectivity and unceasing improvements over hardware and software technology, everything is connected without any boundaries creating the Internet of Things, which becomes part of cyberspace. As the volume of cyberspace is overgrowing, the attackers' capabilities and strategies to find new vulnerabilities are increasing too. In order to defend the attackers from stealing and poisoning critical information of cyberspace, it is crucial to implement Cyber Threat Intelligence (CTI). However, it is not a straightforward process to implement CTI for individuals and organizations because of the resource constraints such as time, capability, and cost. Hence, different stakeholders (individuals or organizations) can collaborate and create a CTI sharing platform to improve their security stances and other organizations. It is well-known that when connected devices are rapidly intensifying in IoT, the cyber threat to information will also rise. So, to own a reliable, scalable, and high-speed CTI sharing platform, the deployment model should be wisely studied. This research carefully analyzed different forms of CTI sharing deployment models: private cloud, public cloud, hybrid cloud, and on-premises. Finally, we suggest the hybrid cloud-based deployment model as a convenient solution for CTI sharing due to its desirable features such as scalability, security, reliability, and high speed.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing a Model to Explore Consumer Buying Behaviors through Long Short-Term Memory 建立一个通过长短期记忆探索消费者购买行为的模型
Yueh-Shiu Lee, I-Yun Chen, Tsung-Yao Lin, Yen-Chiao Chuang, Hsu-Jung Liu
{"title":"Developing a Model to Explore Consumer Buying Behaviors through Long Short-Term Memory","authors":"Yueh-Shiu Lee, I-Yun Chen, Tsung-Yao Lin, Yen-Chiao Chuang, Hsu-Jung Liu","doi":"10.1145/3440943.3444748","DOIUrl":"https://doi.org/10.1145/3440943.3444748","url":null,"abstract":"1This article aspires to develop a model to explore consumer buying behaviors through Long Short-Term Memory (LSTM); from building a marketing system and integrating online and offline information, marketers can employ diverse approaches to execute their marketing strategies and attract more customers for improving the overall sales.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127209689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信