{"title":"The Security Method in MQTT Protocol for Internet of Things","authors":"Chia-Fen Hsieh, Chih-Kai Chang","doi":"10.1109/taai54685.2021.00061","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00061","url":null,"abstract":"One of the most extensive protocols on the Internet of Things is Message Queuing Telemetry Transport (MQTT). However, there is no complete security method for the security of this protocol. The confidentiality and integrity of the message cannot be ensured. In the Industrial Internet of Things, there is more and more confidential or sensitive information. Therefore, it is important to deliver the message correctly. The issue of information security has gradually received attention. MQTT, which only relies on TCP/IP, does not have encryption protection. It may become the target of a man-in-the-middle attack. This paper uses a new architecture to protect MQTT in two stages. First, it uses a one-time-password as the first-stage authentication mechanism. It is an OTP-based identity verification method and an effective algorithm to protect the device from improper use. It can eliminate the risk of unauthorized users gaining access rights. The second stage is to use the simple restriction of black and white lists. It realizes the second identity verification. Finally, to prevent sensitive information from being stolen or modified after being cracked. It encrypts the payload with Advanced Encryption Standard (AES). Ensure that confidential or sensitive information will not leak out due to attacks. In this way, the confidentiality and integrity of the data can be ensured.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133908650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Housing Price Prediction by Using Generative Adversarial Networks","authors":"Chia-Fen Hsieh, Tzu-Chieh Lin","doi":"10.1109/taai54685.2021.00018","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00018","url":null,"abstract":"Housing price forecasting is a highly complex and vitally important field of research. Recent advancements in deep neural network technology allow researchers to develop highly accurate models to predict financial trends. Deep learning has recently achieved great success in many areas due to its powerful capabilities in the data processing. For instance, it has been widely used in financial areas such as stock market prediction, portfolio optimization, financial information processing, and trade execution strategies, etc. In this paper, we proposed a novel architecture of Generative Adversarial Network (GAN) with the Long Short-Term Memory (LSTM) for forecasting the price of houses. To train and evaluate our methodology. The dataset was House Sales in King County, USA, which includes several pings, floor or room age, etc. In the analysis of this input information, the network model will output the predicted house price.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128333359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Duy-An Ha, Thi-Thanh-An Nguyen, Wen-Yuan Zhu, S. Yuan
{"title":"Identifying Non-Intentional Ad Traffic on the Demand-Side in Display Advertising","authors":"Duy-An Ha, Thi-Thanh-An Nguyen, Wen-Yuan Zhu, S. Yuan","doi":"10.1109/taai54685.2021.00021","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00021","url":null,"abstract":"The ad traffic from fraudulent or invalid activities costs advertisers a significant proportion of their ad spending. For advertisers, the ad traffic from fraudulent or invalid activities is non-intentional, and this non-intentional ad traffic should not be considered for ad delivery. In this paper, we would like to safeguard the interests of advertisers by identifying the non-intentional ad traffic from the perspective of the Demand-Side Platform (DSP), which serves the advertisers by managing their advertising budget and delivering ads to the right audience in display advertising. Then, DSPs could filter out the identified non-intentional ad traffic to avoid ad spending on and ad delivery of this traffic. To identify the non-intentional ad traffic, our approach is based on Positive-Unlabeled (PU) learning. In particular, we first extract the features which represent the corresponding access behavior, and label the partial non-intentional ad traffic instances we confirmed. Then, given the labeled non-intentional ad traffic instances and the unlabeled ad traffic instances, we build a model to infer the degree of non-intention for each incoming ad request based on our feature space. Our experimental results show that our approach outperforms the baselines on various metrics on one real dataset.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124117904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyze influence factors in customer’s insurance transaction by decision tree model","authors":"Che-Nan Kuo, Yu-Da Lin, Yu-Huei Cheng","doi":"10.1109/taai54685.2021.00051","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00051","url":null,"abstract":"In recent years, the development of the digital is rapidly in the world. In a variety of technologies gradually mature, the Internet and mobile device popularization, the IOT and cloud computing services, driving the growth of all kinds of data, so that the data greatly increased and diversified. The value of these data can be used to predict the consumer’s behavior, difference the user groups to study out efficient marketing strategies, and create differentiated competitiveness.In order to predict the consumer’s behavior of buying insurance products, the research collected 4474 insurance transactions from a bank in Taiwan Tainan. After the data pre-processing, the available transaction number is 3430. In these organized transactions, we let the classification of insurance products as the dependent variable, and the attributes of customers as independent variables. Then, using the correlation analysis by chi-squared test to carry out un-relevant factors. Analyzing the influence factors by decision tree machine learning model. According to the analysis result of the decision tree model, the accuracy rate almost close to 70%, and the most important influence factors are the actual insurance fee and currency. These two influence factors can be used as a reference for the bank in Taiwan Tainan to precise the marketing.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131515797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Teaching Effectiveness of Computational Thinking Based on Service Learning","authors":"Bing-Hong Chen, Tsui-Feng Huang, Sheng-Chieh Chou","doi":"10.1109/taai54685.2021.00037","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00037","url":null,"abstract":"Computational thinking has been widely regarded as an important ability to adapt to the future. College students use the knowledge they have learned to help elementary students in the community learn computational thinking, thereby enhancing the motivation and achievement of the course. Use Scratch software tools to support the learning of computational thinking. In addition to cultivating students’ basic knowledge and abilities, it also assists the lack of learning resources in community elementary schools through practical actions of service learning, so that students can focus their learning on task-base purposes. Comprehensive research and analysis are conducted based on the evaluation of the students' completed works, the learning satisfaction scale, and the data of the key indicators of self-evaluation of computational thinking, plus the questionnaire survey of the primary school students receiving assistance. The results show that: it helps to stimulate students' desire to learn, thereby significantly improving academic performance and learning motivation. At the same time, it makes students have self-confidence and a sense of accomplishment, and makes learners aware of the inadequacy of self-learning, and promotes their willingness to learn from passive to active.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132052413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Nathaniel Purwanto, Joan Santoso, Po-Ruey Lei, Hui-Kuo Yang, Wen-Chih Peng
{"title":"FakeCLIP: Multimodal Fake Caption Detection with Mixed Languages for Explainable Visualization","authors":"Christian Nathaniel Purwanto, Joan Santoso, Po-Ruey Lei, Hui-Kuo Yang, Wen-Chih Peng","doi":"10.1109/taai54685.2021.00010","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00010","url":null,"abstract":"Existing fake news research relies on news propagation or news metadata. Waiting for propagation structure to be enough is a waste of time. Hoping for reliable metadata information is also a waste because all data can be forged. The most natural way for human when verifying a news is through the content itself. In social media, most of the circulating news are in minimal content which consist of image and its text caption. We propose FakeCLIP to examine whether a caption truly describes the corresponding image or not. As far as we know, we are the first one to tackle fake news using fake caption approach. We found mixed languages problem where one single text can consist of many different languages mixed together. We provide explainable visualization for intuitive reasoning of which part contains fake information. Moreover, we also consider alignment of what happens in the image that being discussed in the text caption while showing the fake signal over them. Our proposed method performs better than the current state-of-the-art on Twitter datasets by 11.1%.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interpolation based reversible hiding scheme by using center folding strategy and adjusting hiding operator","authors":"T. Vo, T. Lu, Somya Agrawal, Biswapati Jana","doi":"10.1109/taai54685.2021.00025","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00025","url":null,"abstract":"Reversible data hiding (RDH) scheme has been widely used in many applications. One of the techniques which used in RDH is interpolation hiding data technology (IHDT). The paper proposed an IHDT based RDH scheme by using the concept of Center Folding Strategy (CFS). To improve the image quality of the stego-image, the proposed scheme adopts the enhanced neighbor means interpolation (ENMI) technique to generate the interpolated image. Furthermore, the proposed scheme refers the original image to flexibly adjust the embedding equation such that the stego-pixel can closer to the original value. The experimental results show that the proposed scheme can get better experimental results.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128579221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Multi-Scale Models with A Comparative Framework for Semantic Segmentation","authors":"Ting-Chen Hsu, Bor-Shen Lin","doi":"10.1109/taai54685.2021.00065","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00065","url":null,"abstract":"State-of-the-art models of semantic segmentation, based on global convolutional network, ASPP, self-attention, and so on, focus on capturing context information through the fusion of multi-scale features and integrating local features with large kernels. However, these models have not been compared yet in parallel to interpret their relative efficacies. This makes it difficult to further combine or improve these models due to their complicated network structures. In this paper, a general multi-scale framework of semantic image segmentation was proposed to investigate and compare the network structures of the models in parallel. Three alternative modules were proposed to improve these methods, and the experiments show the proposed modules can give superior segmentation results and achieve outstanding performance on Pascal VOC2012 images segmentation datasets. Additionally, this framework was shown to be flexible for integrating the multi-scale features and operations from different levels. Experimental results show that the low-level operation can extract local details and the high-level operation the overall contour, so the output features from different levels complement each other to improve the performance effectively.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"73-74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Pruning Method Based on DenseNet Network for Image Classification","authors":"Ruikang Ju, Ting-Yu Lin, Jen-Shiun Chiang","doi":"10.1109/taai54685.2021.00028","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00028","url":null,"abstract":"Deep neural networks have made significant progress in the field of computer vision. Recent works have shown that depth, width and shortcut connections of the neural network architectures play a crucial role in their performance. As one of the most advanced neural network architectures, DenseNet, which achieves excellent convergence speed through dense connections. However, it still has obvious shortcomings in the use of memory. In this paper, we introduce two new pruning methods using threshold, which refers to the concept of threshold voltage in MOSFET. Now we have implemented one of the pruning methods. This work uses this method to connect blocks of different depths in different ways to reduce memory usage. We name the proposed network ThresholdNet, evaluate it and other different networks on two datasets (CIFAR-10 and STL-10). Experiments show that the proposed method is 60% faster than DenseNet, 20% faster and 10% lower error rate than HarDNet.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131894939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Locally Interpretable One-Class Anomaly Detection for Credit Card Fraud Detection","authors":"Tungyu Wu, Youting Wang","doi":"10.1109/taai54685.2021.00014","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00014","url":null,"abstract":"For the highly imbalanced credit card fraud detection problem, most existing methods either use data augmentation methods or conventional machine learning models, while anomaly-detection-based approaches are not sufficient. Furthermore, few studies have employed AI interpretability tools to investigate the feature importance of transaction data, which is crucial for the black-box fraud detection module. Considering these two points together, we propose a novel anomaly detection framework for credit card fraud detection as well as a model-explaining module responsible for prediction explanations. The fraud detection model is composed of two deep neural networks, which are trained in an unsupervised and adversarial manner. Precisely, the generator is an AutoEncoder aiming to reconstruct genuine transaction data, while the discriminator is a fully-connected network for fraud detection. The explanation module has three white-box explainers in charge of interpretations of the AutoEncoder, discriminator, and the whole detection model, respectively. Experimental results show the state-of-the-art performances of our fraud detection model on the benchmark dataset compared with baselines. In addition, prediction analyses by three explainers are presented, offering a clear perspective on how each feature of an instance of interest contributes to the final model output. Our code is available at https://github.com/tony10101105/Locally-Interpretable-One-Class-Anomaly-Detection-for-Credit-Card-Fraud-Detection.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123331484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}