2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)最新文献

筛选
英文 中文
CVSS-based Multi-Factor Dynamic Risk Assessment Model for Network System 基于cvss的网络系统多因素动态风险评估模型
Tingting Wang, Qiujian Lv, Bo Hu, Degang Sun
{"title":"CVSS-based Multi-Factor Dynamic Risk Assessment Model for Network System","authors":"Tingting Wang, Qiujian Lv, Bo Hu, Degang Sun","doi":"10.1109/ICEIEC49280.2020.9152340","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152340","url":null,"abstract":"The risk assessment model of network systems is designed to provide quantifiable evidence to assist security administrators in choosing appropriate defend methods. Most models measure the overall risk by combining CVSS base scores of system vulnerabilities. However, they merely consider the impact of dynamic risk factors including attacker capability and evolutions of vulnerabilities. To address this issue, we propose a CVSS based Multi-Factor dynamic risk assessment Model, CMFM. It uses attack paths to model an attacker’s capability, which is thus used to estimate the successful probabilities about vulnerability exploitations. Besides, we exploit both static and time-variant factors of vulnerabilities to produce a better estimation result. The final system risk assessment can then be accessed via a Bayesian attack graph. We evaluate the proposed model in two scenarios, all of which demonstrate that CMFM outperforms the state-of-the-art models in assessing the dynamic risk status of network systems.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117035097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analyze the Research of Internet of Information Collection Technology Based on Converged Communication 基于融合通信的互联网信息采集技术研究分析
Jixing Yang, N. Zhao, Yudong Fang
{"title":"Analyze the Research of Internet of Information Collection Technology Based on Converged Communication","authors":"Jixing Yang, N. Zhao, Yudong Fang","doi":"10.1109/ICEIEC49280.2020.9152312","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152312","url":null,"abstract":"With the in-depth adjustment of our country’s economic structure and the rapid development of various industries, the situation of production safety is severe and complex. There are many types of hidden dangers, the supervision departments have greater risk prevention tasks and higher requirements. The traditional safety supervision method is far from meeting the needs of the current situation. especially in the face of normal conditions for epidemic prevention and control. As an advanced information technology, the Internet of Things (IOT)which support various types of sensor data in front of high-risk industries such as hazardous chemicals, coal mines, non-coal mines (including tailings ponds), fireworks and firecrackers, uses data collection, intelligent analysis, and safe isolation modules to realize the dynamic transmission of real-time monitoring data in batches. It provides reliable and true data support for monitoring and early warning applications, and helps regulatory authorities innovate online supervision and implement the responsibility of corporate safety production.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced System for Smart Home in IPv6-Based Wireless Home Network 基于ipv6无线家庭网络的智能家居增强系统
Zicheng Wang, Bo Cui
{"title":"An Enhanced System for Smart Home in IPv6-Based Wireless Home Network","authors":"Zicheng Wang, Bo Cui","doi":"10.1109/ICEIEC49280.2020.9152362","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152362","url":null,"abstract":"The development of IPv6-based wireless local area networks is becoming increasingly mature, and it has defined no less than different standards to meet the needs of different applications. Wireless home networks are widely used because they can be seamlessly connected to daily life, especially smart home devices linked to it. There are certain security issues with smart home devices deployed in wireless home networks, such as data tampering and leakage of sensitive information. This paper proposes a smart home management system based on IPv6 wireless home network, and develops a prototype system deployed on mobile portable devices. Through this system, different roles in the wireless home network can be dynamically authorized and smart home resources can be allocated to achieve the purpose of access control and management.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on ACO-BP Based Prediction Method of The Oilfield Production Stimulation Results 基于ACO-BP的油田增产效果预测方法研究
Hongtao Hu, Juan Wu, Xin Guan
{"title":"Research on ACO-BP Based Prediction Method of The Oilfield Production Stimulation Results","authors":"Hongtao Hu, Juan Wu, Xin Guan","doi":"10.1109/ICEIEC49280.2020.9152310","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152310","url":null,"abstract":"In the process of oilfield development, production stimulation is important to stabilize the oilfield production output. In order to accurately predict the results of stimulation, and reasonably plan the stimulation actions for the oilfield, this paper proposes a prediction model that uses the ant colony algorithm ACO to optimize the back propagation neural network (BP neural network). Using Matlab to conduct ACO-BP oil field stimulation results prediction model tests, the experimental results show that the model is effective in predicting oilfield stimulation outcome; and the prediction accuracy and stability of the model are better than those of BP and FA-BP network prediction models.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129008070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Role of Traditional Features in Authorship Attribution 传统特征在作者归属中的作用
L. Shang, Lizhen Liu, Wei Song, Miaomiao Cheng
{"title":"The Role of Traditional Features in Authorship Attribution","authors":"L. Shang, Lizhen Liu, Wei Song, Miaomiao Cheng","doi":"10.1109/ICEIEC49280.2020.9152360","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152360","url":null,"abstract":"As an important direction of natural language processing, authorship attribution has been paid much attention. Nowadays, the research methods mainly based on neural network and make great progress. However, compared with traditional methods, the interpretability of these methods has certain limitations. It is difficult for us to know which features are specifically used in the classification of neural network models, and the weight distribution of these features, etc. Without an exact understanding of the model, it is difficult for us to use it in key fields. We used 162 manually defined features at 5 levels and n-grams features at the character level to conduct authorship attribution experiment on the Chinese data set, and conducted a comparative study on these features to obtain the features that the model plays an important role in authorship attribution of Chinese text.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"6 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130967420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prototypical Siamese Networks for Few-shot Learning 用于少量学习的暹罗网络原型
Junhua Wang, Yongping Zhai
{"title":"Prototypical Siamese Networks for Few-shot Learning","authors":"Junhua Wang, Yongping Zhai","doi":"10.1109/ICEIEC49280.2020.9152261","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152261","url":null,"abstract":"We propose a novel architecture, called Prototypical Siamese Networks, for few-shot learning, where a classifier must generalize to new classes not seen in the training set, given only a few examples of each class. Prototypical Siamese Networks add a new module to siamese networks to learn a high quality prototypical representation of each class. Compared to recent methods for few-shot learning, our method achieves state-of-the-art performance on few-shot learning. Experiments on two benchmarks validate the effectiveness of the proposed method.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126674701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Indoor Precise Positioning and Navigation Technology in Emergency Evacuation Based on Simultaneous Localization and Mapping Technology 基于同步定位与绘图技术的紧急疏散室内精确定位与导航技术
Shaobiao Zhang, Wenguang Qi, W. Zhou, Lili Yang
{"title":"Indoor Precise Positioning and Navigation Technology in Emergency Evacuation Based on Simultaneous Localization and Mapping Technology","authors":"Shaobiao Zhang, Wenguang Qi, W. Zhou, Lili Yang","doi":"10.1109/ICEIEC49280.2020.9152288","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152288","url":null,"abstract":"Based on SLAM (Simultaneous localization and mapping) technology, the indoor 3D space is scanned, and detailed indoor 3D geographic information data is collected and constructed to give accurate 3D position information. By scanning the QR code posted in indoor space through a single data link for real-time spatial location analysis, the current location of people could be located, and the optimal path and navigation could be calculated according to the background data analysis. At the same time, the system can be quickly located and retrieved indoor personnel in reverse.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126816554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying Convolutional LSTM Network to Predict El Niño Events: Transfer Learning from The Data of Dynamical Model and Observation 应用卷积LSTM网络预测El Niño事件:基于动态模型和观测数据的迁移学习
Bin Mu, Shaoyang Ma, Shijin Yuan, Hui Xu
{"title":"Applying Convolutional LSTM Network to Predict El Niño Events: Transfer Learning from The Data of Dynamical Model and Observation","authors":"Bin Mu, Shaoyang Ma, Shijin Yuan, Hui Xu","doi":"10.1109/ICEIEC49280.2020.9152317","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152317","url":null,"abstract":"Neural network as a statistical method is widely used for weather forecasting. But for the prediction of El Niño grid data, the data record is short. In this paper, we use deep learning to handle spatiotemporal information and transfer learning to transfer knowledge from dynamical model (Zebiak–Cane model) data to the prediction of realistic El Niño. A ConvLSTM (Convolutional Long Short-Term Memory Network) architecture is constructed to predict the grid data of sea surface temperature and thermocline depth at lead times from 3 to 12 months. Cross-validation is used to evaluate the predictions. The entire data record from 1980 to 2018 is divided into 10 groups and used for training and validation. The experiment results show that transfer learning have a positive impact on the El Niño prediction, especially for the strong Eastern-Pacific type. Compared with the predictions of the Zebiak-Cane model, it can be inferred that the role of the model data in transfer learning is greater than the observation data.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121511673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on User Satisfaction of Video Education Application Based on Reviews 基于评论的视频教育应用用户满意度研究
Jiahui Wang, Chen Li
{"title":"Research on User Satisfaction of Video Education Application Based on Reviews","authors":"Jiahui Wang, Chen Li","doi":"10.1109/ICEIEC49280.2020.9152252","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152252","url":null,"abstract":"User satisfaction is an important factor in Customer Experience Management. Based on online reviews of video education applications in the application market, this paper determines the evaluation index of comments and establishes a user satisfaction evaluation system by using hierarchical clustering algorithm and LDA theme model. Then LSTM is applied to obtain the user satisfaction score under each index. It can provide ideas and suggestions for the Customer Experience Management of video education App by obtaining the fine-grained user satisfaction from the online comments of users.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124982071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Leakage Prevention Technology of Sensitive Data based on Artificial Intelligence 基于人工智能的敏感数据防泄漏技术研究
Donglan Liu, Xin Liu, Lei Ma, Yingxian Chang, Rui Wang, Hao Zhang, Hao Yu, Wenting Wang
{"title":"Research on Leakage Prevention Technology of Sensitive Data based on Artificial Intelligence","authors":"Donglan Liu, Xin Liu, Lei Ma, Yingxian Chang, Rui Wang, Hao Zhang, Hao Yu, Wenting Wang","doi":"10.1109/ICEIEC49280.2020.9152286","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152286","url":null,"abstract":"In recent years, network security incidents happen frequently, and each security incident is inseparable from the threat of data leakage. In order to deal with the sensitive data leakage under the new network threat, this paper proposes the sensitive data leakage prevention method based on artificial intelligence technology by studying the current data leakage prevention technology. By prefabricating a simple security policy, the detection result of the data and the data are submitted to the security manager. According to the judgment of the security inspector, the self-learning security policy is carried out with artificial intelligence algorithm to promote the update of the security policy. Data assets leakage protection system is designed to show full view data assets directory, verify the risk analysis technology in data assets for centralized cataloging and grade of risk distribution data visualization display, based on the classification properties of the data security label of the multi-function scenarios such as the technology application effect, effectively reduce the risk of data leakage.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131206197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信