2018 International Conference on Cyberworlds (CW)最新文献

筛选
英文 中文
Towards Citizen-Powered Cyberworlds for Environmental Monitoring 迈向以市民为动力的环境监测网络世界
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/CW.2018.00090
Maria Krommyda, E. Sdongos, S. Tamascelli, A. Tsertou, Geli Latsa, A. Amditis
{"title":"Towards Citizen-Powered Cyberworlds for Environmental Monitoring","authors":"Maria Krommyda, E. Sdongos, S. Tamascelli, A. Tsertou, Geli Latsa, A. Amditis","doi":"10.1109/CW.2018.00090","DOIUrl":"https://doi.org/10.1109/CW.2018.00090","url":null,"abstract":"ICT advances in emerging domains such as Internet of Things (IoT), Augmented Reality/ Virtual Reality (AR/VR), big data analytics, cyber-physical systems and cloud computing have revolutionized and boosted the creation of cyberworlds as information spaces that allow us to augment the way we interact with each other and with the physical world. Naturally, other than businesses cyberworlds can benefit modern hyper connected societies at their entirety (transport, mobility, health, smart living, etc.) and further to that the physical world around us can also be part of such process. In the present paper the focus is given on citizen-powered cyberworlds for Environmental Monitoring which are created from crowdsourced observations engaging, through gamification, citizens and communities. The means of engagement include serious gaming, collection of geo-tagged IoT, such as images, video and sensor measurements as well as management and storage of diverse IoT as OGC compliant observations all conveyed into a dedicated information space.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116938792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
User Dependent Template Update for Keystroke Dynamics Recognition 用户依赖的模板更新击键动力学识别
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/CW.2018.00066
Abir Mhenni, E. Cherrier, C. Rosenberger, N. Amara
{"title":"User Dependent Template Update for Keystroke Dynamics Recognition","authors":"Abir Mhenni, E. Cherrier, C. Rosenberger, N. Amara","doi":"10.1109/CW.2018.00066","DOIUrl":"https://doi.org/10.1109/CW.2018.00066","url":null,"abstract":"Regarding the fact that individuals have different interactions with biometric authentication systems, several techniques have been developed in the literature to model different users categories. Doddington Zoo is a concept of categorizing users behaviors into animal groups to reflect their characteristics with respect to biometric systems. This concept was developed for different biometric modalities including keystroke dynamics. The present study extends this biometric classification, by proposing a novel adaptive strategy based on the Doddinghton Zoo, for the recognition of the user's keystroke dynamics. The obtained results demonstrate competitive performances on significant keystroke dynamics datasets.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124880644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Computational Analysis of Smile Weight Distribution across the Face for Accurate Distinction between Genuine and Posed Smiles 面部微笑权重分布的计算分析,用于准确区分真实微笑和做作微笑
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/CW.2018.00044
Ahmad Al-dahoud, H. Ugail
{"title":"Computational Analysis of Smile Weight Distribution across the Face for Accurate Distinction between Genuine and Posed Smiles","authors":"Ahmad Al-dahoud, H. Ugail","doi":"10.1109/CW.2018.00044","DOIUrl":"https://doi.org/10.1109/CW.2018.00044","url":null,"abstract":"In this paper, we report the results of our recent research into the understanding of the exact distribution of a smile across the face, especially the distinction in the weight distribution of a smile between a genuine and a posed smile. To do this, we have developed a computational framework for the analysis of the dynamic motion of various parts of the face during a facial expression, in particular, for the smile expression. The heart of our dynamic smile analysis framework is the use of optical flow intensity variation across the face during a smile. This can be utilised to efficiently map the dynamic motion of individual regions of the face such as the mouth, cheeks and areas around the eyes. Thus, through our computational framework, we infer the exact distribution of weights of the smile across the face. Further, through the utilisation of two publicly available datasets, namely the CK+ dataset with 83 subjects expressing posed smiles and the MUG dataset with 35 subjects expressing genuine smiles, we show there is a far greater activity or weight distribution around the regions of the eyes in the case of a genuine smile.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125305110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personas and Emotional Design for Public Service Robots: A Case Study with Autonomous Vehicles in Public Transportation 公共服务机器人的人物角色和情感设计:以公共交通中的自动驾驶汽车为例
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/CW.2018.00058
P. Kong, H. Cornet, F. Frenkler
{"title":"Personas and Emotional Design for Public Service Robots: A Case Study with Autonomous Vehicles in Public Transportation","authors":"P. Kong, H. Cornet, F. Frenkler","doi":"10.1109/CW.2018.00058","DOIUrl":"https://doi.org/10.1109/CW.2018.00058","url":null,"abstract":"Emerging technologies for future mobility will drastically change the way humans interact with machines and the environment. The common denominator in technologies such as autonomous vehicles (AVs) and artificial intelligence is the absence of the human, which can be addressed with a service robot designed to appeal to human emotion. As service robots tend to operate in environments where there is a diversity of users and thus user requirements, there lies a gap in the definition of how these interactions should be designed. This paper discusses the use of personas in the development of service robots for multi-stakeholder environments through a case study on AVs for public transportation in Singapore.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On Multiple-View Matrix Based 3D Reconstruction from Multiple-View Images 基于多视图矩阵的多视图图像三维重建研究
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/CW.2018.00030
Huimin Huang, Ruibin Zhao, Mingyong Pang
{"title":"On Multiple-View Matrix Based 3D Reconstruction from Multiple-View Images","authors":"Huimin Huang, Ruibin Zhao, Mingyong Pang","doi":"10.1109/CW.2018.00030","DOIUrl":"https://doi.org/10.1109/CW.2018.00030","url":null,"abstract":"In this paper, we propose a multiple-view matrix based 3D reconstruction algorithm for generating a 3D point cloud model for a scene or an object from several sequence images. The algorithm first extracts a group of SIFT (Scale Invariant Feature Transform) feature points from each image, and divides the points into different groups according to the matching degrees among the points. Secondly, a set of 3D point clouds are reconstructed from the feature points with a calculated a multiple-view matrix. Then, a complete result is generated by merging the point clouds with an incremental algorithm and the estimated camera parameters. Furthermore, our result is optimized by employing a BA (Bundle Adjustment) method. Owing to the introduction of the multiple-view matrix and the group-based SIFT matching, our algorithm has the ability to accurately reconstruct a 3D point cloud model only with several images. The performance of our algorithm is evaluated on a group of benchmark datasets, and is compared to two state-of-the-art methods.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122385509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing the Security of Transformation Based Biometric Template Protection Schemes 增强基于转换的生物识别模板保护方案的安全性
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/CW.2018.00065
Loubna Ghammam, Morgan Barbier, C. Rosenberger
{"title":"Enhancing the Security of Transformation Based Biometric Template Protection Schemes","authors":"Loubna Ghammam, Morgan Barbier, C. Rosenberger","doi":"10.1109/CW.2018.00065","DOIUrl":"https://doi.org/10.1109/CW.2018.00065","url":null,"abstract":"Template protection is a crucial issue in biometrics. Many algorithms have been proposed in the literature among secure computing approaches, crypto-biometric algorithm and feature transformation schemes. The BioHashing algorithm belongs to this last category and has very interesting properties. Among them, we can cite its genericity since it could be applied on any biometric modality, the possible cancelability of the generated BioCode and its efficiency when the secret is not stolen by an impostor. Its main drawback is its weakness face to a combined attack (zero effort with the stolen secret scenario). In this paper, we propose a transformation-based biometric template protection scheme as an improvement of the BioHashing algorithm where the projection matrix is generated by combining the secret and the biometric data. Experimental results on two biometric modalities, namely digital fingerprint and finger knuckle print images, show the benefits of the proposed method face to attacks while keeping a good efficiency.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analysis of Keystroke Dynamics for the Generation of Synthetic Datasets 合成数据集生成的击键动力学分析
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/CW.2018.00068
Denis Migdal, C. Rosenberger
{"title":"Analysis of Keystroke Dynamics for the Generation of Synthetic Datasets","authors":"Denis Migdal, C. Rosenberger","doi":"10.1109/CW.2018.00068","DOIUrl":"https://doi.org/10.1109/CW.2018.00068","url":null,"abstract":"Biometrics is an emerging technology more and more present in our daily life. However, building biometric systems requires a large amount of data that may be difficult to collect. Collecting such sensitive data is also very time consuming and constrained, s.a. GDPR legislation. In the case of keystroke dynamics, existing databases have less than 200 users. For these reasons, we aim at generating a keystroke dynamics synthetic dataset. This paper presents the generation of keystroke data from known users as a first step towards the generation of synthetic datasets, and could also be used to impersonate users' identity.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128242654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Poster Track Chair Message 海报轨道椅留言
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/cw.2018.00014
{"title":"Poster Track Chair Message","authors":"","doi":"10.1109/cw.2018.00014","DOIUrl":"https://doi.org/10.1109/cw.2018.00014","url":null,"abstract":"","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125600490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
General Track Chair Message 一般轨道主席信息
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/cw.2018.00010
{"title":"General Track Chair Message","authors":"","doi":"10.1109/cw.2018.00010","DOIUrl":"https://doi.org/10.1109/cw.2018.00010","url":null,"abstract":"","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121904759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature 基于客户端的DNS域名解析异常流量检测与阻断机制
2018 International Conference on Cyberworlds (CW) Pub Date : 2018-10-01 DOI: 10.1109/CW.2018.00070
Yong Jin, Kunitaka Kakoi, N. Yamai, Naoya Kitagawa, M. Tomoishi
{"title":"A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature","authors":"Yong Jin, Kunitaka Kakoi, N. Yamai, Naoya Kitagawa, M. Tomoishi","doi":"10.1109/CW.2018.00070","DOIUrl":"https://doi.org/10.1109/CW.2018.00070","url":null,"abstract":"Malware has become one of the most critical targets of network security solutions nowadays. Many types of malware receive further instructions from the C&C servers and the attack targets may be instructed by IP addresses which causes direct attacks without DNS name resolution from the malware-infected computers. In the meanwhile, several programs that are hidden from the users (e.g. malware, virus, etc.) may perform DNS name resolutions for cyber attacks or other communications. In this paper, we propose a client based anomaly traffic detection and blocking mechanism by monitoring DNS name resolution per application program. In the proposed mechanism, by the collaboration of DNS proxy and packet filter, DNS traffic is monitored on the client and the traffic destined to the IP addresses obtained without DNS name resolution or the traffic from unrecognized programs will be detected and blocked. In addition, in order to mitigate false positive detection, an alert-window will be shown to let the users decide whether to allow the traffic or not. We implemented a prototype system on a Windows 7 client and confirmed that the proposed mechanism worked as expected.","PeriodicalId":388539,"journal":{"name":"2018 International Conference on Cyberworlds (CW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信