Maria Krommyda, E. Sdongos, S. Tamascelli, A. Tsertou, Geli Latsa, A. Amditis
{"title":"Towards Citizen-Powered Cyberworlds for Environmental Monitoring","authors":"Maria Krommyda, E. Sdongos, S. Tamascelli, A. Tsertou, Geli Latsa, A. Amditis","doi":"10.1109/CW.2018.00090","DOIUrl":"https://doi.org/10.1109/CW.2018.00090","url":null,"abstract":"ICT advances in emerging domains such as Internet of Things (IoT), Augmented Reality/ Virtual Reality (AR/VR), big data analytics, cyber-physical systems and cloud computing have revolutionized and boosted the creation of cyberworlds as information spaces that allow us to augment the way we interact with each other and with the physical world. Naturally, other than businesses cyberworlds can benefit modern hyper connected societies at their entirety (transport, mobility, health, smart living, etc.) and further to that the physical world around us can also be part of such process. In the present paper the focus is given on citizen-powered cyberworlds for Environmental Monitoring which are created from crowdsourced observations engaging, through gamification, citizens and communities. The means of engagement include serious gaming, collection of geo-tagged IoT, such as images, video and sensor measurements as well as management and storage of diverse IoT as OGC compliant observations all conveyed into a dedicated information space.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116938792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abir Mhenni, E. Cherrier, C. Rosenberger, N. Amara
{"title":"User Dependent Template Update for Keystroke Dynamics Recognition","authors":"Abir Mhenni, E. Cherrier, C. Rosenberger, N. Amara","doi":"10.1109/CW.2018.00066","DOIUrl":"https://doi.org/10.1109/CW.2018.00066","url":null,"abstract":"Regarding the fact that individuals have different interactions with biometric authentication systems, several techniques have been developed in the literature to model different users categories. Doddington Zoo is a concept of categorizing users behaviors into animal groups to reflect their characteristics with respect to biometric systems. This concept was developed for different biometric modalities including keystroke dynamics. The present study extends this biometric classification, by proposing a novel adaptive strategy based on the Doddinghton Zoo, for the recognition of the user's keystroke dynamics. The obtained results demonstrate competitive performances on significant keystroke dynamics datasets.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124880644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational Analysis of Smile Weight Distribution across the Face for Accurate Distinction between Genuine and Posed Smiles","authors":"Ahmad Al-dahoud, H. Ugail","doi":"10.1109/CW.2018.00044","DOIUrl":"https://doi.org/10.1109/CW.2018.00044","url":null,"abstract":"In this paper, we report the results of our recent research into the understanding of the exact distribution of a smile across the face, especially the distinction in the weight distribution of a smile between a genuine and a posed smile. To do this, we have developed a computational framework for the analysis of the dynamic motion of various parts of the face during a facial expression, in particular, for the smile expression. The heart of our dynamic smile analysis framework is the use of optical flow intensity variation across the face during a smile. This can be utilised to efficiently map the dynamic motion of individual regions of the face such as the mouth, cheeks and areas around the eyes. Thus, through our computational framework, we infer the exact distribution of weights of the smile across the face. Further, through the utilisation of two publicly available datasets, namely the CK+ dataset with 83 subjects expressing posed smiles and the MUG dataset with 35 subjects expressing genuine smiles, we show there is a far greater activity or weight distribution around the regions of the eyes in the case of a genuine smile.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125305110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personas and Emotional Design for Public Service Robots: A Case Study with Autonomous Vehicles in Public Transportation","authors":"P. Kong, H. Cornet, F. Frenkler","doi":"10.1109/CW.2018.00058","DOIUrl":"https://doi.org/10.1109/CW.2018.00058","url":null,"abstract":"Emerging technologies for future mobility will drastically change the way humans interact with machines and the environment. The common denominator in technologies such as autonomous vehicles (AVs) and artificial intelligence is the absence of the human, which can be addressed with a service robot designed to appeal to human emotion. As service robots tend to operate in environments where there is a diversity of users and thus user requirements, there lies a gap in the definition of how these interactions should be designed. This paper discusses the use of personas in the development of service robots for multi-stakeholder environments through a case study on AVs for public transportation in Singapore.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Multiple-View Matrix Based 3D Reconstruction from Multiple-View Images","authors":"Huimin Huang, Ruibin Zhao, Mingyong Pang","doi":"10.1109/CW.2018.00030","DOIUrl":"https://doi.org/10.1109/CW.2018.00030","url":null,"abstract":"In this paper, we propose a multiple-view matrix based 3D reconstruction algorithm for generating a 3D point cloud model for a scene or an object from several sequence images. The algorithm first extracts a group of SIFT (Scale Invariant Feature Transform) feature points from each image, and divides the points into different groups according to the matching degrees among the points. Secondly, a set of 3D point clouds are reconstructed from the feature points with a calculated a multiple-view matrix. Then, a complete result is generated by merging the point clouds with an incremental algorithm and the estimated camera parameters. Furthermore, our result is optimized by employing a BA (Bundle Adjustment) method. Owing to the introduction of the multiple-view matrix and the group-based SIFT matching, our algorithm has the ability to accurately reconstruct a 3D point cloud model only with several images. The performance of our algorithm is evaluated on a group of benchmark datasets, and is compared to two state-of-the-art methods.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122385509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the Security of Transformation Based Biometric Template Protection Schemes","authors":"Loubna Ghammam, Morgan Barbier, C. Rosenberger","doi":"10.1109/CW.2018.00065","DOIUrl":"https://doi.org/10.1109/CW.2018.00065","url":null,"abstract":"Template protection is a crucial issue in biometrics. Many algorithms have been proposed in the literature among secure computing approaches, crypto-biometric algorithm and feature transformation schemes. The BioHashing algorithm belongs to this last category and has very interesting properties. Among them, we can cite its genericity since it could be applied on any biometric modality, the possible cancelability of the generated BioCode and its efficiency when the secret is not stolen by an impostor. Its main drawback is its weakness face to a combined attack (zero effort with the stolen secret scenario). In this paper, we propose a transformation-based biometric template protection scheme as an improvement of the BioHashing algorithm where the projection matrix is generated by combining the secret and the biometric data. Experimental results on two biometric modalities, namely digital fingerprint and finger knuckle print images, show the benefits of the proposed method face to attacks while keeping a good efficiency.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Keystroke Dynamics for the Generation of Synthetic Datasets","authors":"Denis Migdal, C. Rosenberger","doi":"10.1109/CW.2018.00068","DOIUrl":"https://doi.org/10.1109/CW.2018.00068","url":null,"abstract":"Biometrics is an emerging technology more and more present in our daily life. However, building biometric systems requires a large amount of data that may be difficult to collect. Collecting such sensitive data is also very time consuming and constrained, s.a. GDPR legislation. In the case of keystroke dynamics, existing databases have less than 200 users. For these reasons, we aim at generating a keystroke dynamics synthetic dataset. This paper presents the generation of keystroke data from known users as a first step towards the generation of synthetic datasets, and could also be used to impersonate users' identity.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128242654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong Jin, Kunitaka Kakoi, N. Yamai, Naoya Kitagawa, M. Tomoishi
{"title":"A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature","authors":"Yong Jin, Kunitaka Kakoi, N. Yamai, Naoya Kitagawa, M. Tomoishi","doi":"10.1109/CW.2018.00070","DOIUrl":"https://doi.org/10.1109/CW.2018.00070","url":null,"abstract":"Malware has become one of the most critical targets of network security solutions nowadays. Many types of malware receive further instructions from the C&C servers and the attack targets may be instructed by IP addresses which causes direct attacks without DNS name resolution from the malware-infected computers. In the meanwhile, several programs that are hidden from the users (e.g. malware, virus, etc.) may perform DNS name resolutions for cyber attacks or other communications. In this paper, we propose a client based anomaly traffic detection and blocking mechanism by monitoring DNS name resolution per application program. In the proposed mechanism, by the collaboration of DNS proxy and packet filter, DNS traffic is monitored on the client and the traffic destined to the IP addresses obtained without DNS name resolution or the traffic from unrecognized programs will be detected and blocked. In addition, in order to mitigate false positive detection, an alert-window will be shown to let the users decide whether to allow the traffic or not. We implemented a prototype system on a Windows 7 client and confirmed that the proposed mechanism worked as expected.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}