2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)最新文献

筛选
英文 中文
A Classification Algorithm of Ultrasonic Thyroid Standard Planes Using LBP and HOG Features 基于LBP和HOG特征的超声甲状腺标准平面分类算法
Yihong Wu, Peizhong Liu
{"title":"A Classification Algorithm of Ultrasonic Thyroid Standard Planes Using LBP and HOG Features","authors":"Yihong Wu, Peizhong Liu","doi":"10.1109/ICASID.2019.8925122","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925122","url":null,"abstract":"To improve the performance of thyroid standard plane scanning, this paper proposes a classification algorithm for classifying thyroid ultrasound images using texture features. Firstly, the region of interest of ultrasound images is chosen in the preprocessing process step. Secondly, the local binary patterns (LBP) features and the histograms of oriented gradients (HOG) features of the images are extracted. Then the obtained feature vectors are spliced as the input of the support vector machine (SVM) which is used to classify the thyroid standard plane images. In the experiment, there are 4,574 thyroid standard plane images are used in this paper, which are divided into 8 categories, of which 3,655 pictures for training, and 919 pictures for testing. The experimental results show that the classification accuracy is up to 88.58%, which show a fact that the proposed algorithm has a good discriminating ability for the standard eight-category thyroid plane images, which can assist the doctor to diagnose to a certain extent.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115412016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Differentially Private DBScan Clustering Algorithm for Vehicular Crowdsensing 一种改进的差分私有DBScan聚类算法用于车辆人群感知
Yuzhen Jin, Shuyu Li
{"title":"An Improved Differentially Private DBScan Clustering Algorithm for Vehicular Crowdsensing","authors":"Yuzhen Jin, Shuyu Li","doi":"10.1109/icasid.2019.8925098","DOIUrl":"https://doi.org/10.1109/icasid.2019.8925098","url":null,"abstract":"In response to the risks of privacy leakage caused by uploading vehicle participants' sensing data (such as location data or task sensing data) in the vehicle crowdsensing environment, an improved DBSCAN Clustering Algorithm (I-DP-DBScan) is proposed in the paper. The proposed algorithm is improved by optimizing the parameters Eps and MinPts, and differential privacy is adopted for guaranteeing participants' privacy. Laplace noise is added to the Euclidean distance of sensing data. Experimental results show that the I-DP-DBScan algorithm not only protects data privacy but also has good clustering efficiency.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128328934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A State-Configurable IIC Bus Design 一种状态可配置的IIC总线设计
Zicong Yang, Lixin Yang, Y. Xing, Zhijie Chen, Peiyuan Wan
{"title":"A State-Configurable IIC Bus Design","authors":"Zicong Yang, Lixin Yang, Y. Xing, Zhijie Chen, Peiyuan Wan","doi":"10.1109/ICASID.2019.8925136","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925136","url":null,"abstract":"This paper presents a design of IIC bus with configurable state and readable flexibility. Based on the proposed design, the working state of IIC can be read at all times, and simultaneously can be configured through APB bus. The implementation of finite state machine design is adopted, in which a small state machine is embedded into a large state machine, and state information is updated in IIC registers in real time. Through RTL simulation and FPGA verification, reliable data transmission in slave devices with IIC bus interface is realized. This proposed design has good flexibility, and suitable for chip measurement and system debugging, and has been successfully applied in engineering practice.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"143 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128802201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NB-IOT Pipeline Water Leakage Automatic Monitoring System Based on Cloud Platform 基于云平台的NB-IOT管道漏水自动监测系统
Zhiyuan Shi, Mingkang Wang, Huiwen Lin, Hezhi Lin, Zhibin Gao, Lianfeng Huang
{"title":"NB-IOT Pipeline Water Leakage Automatic Monitoring System Based on Cloud Platform","authors":"Zhiyuan Shi, Mingkang Wang, Huiwen Lin, Hezhi Lin, Zhibin Gao, Lianfeng Huang","doi":"10.1109/ICASID.2019.8925228","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925228","url":null,"abstract":"In this paper, the cloud-based NB-IOT pipeline water leakage automatic monitoring system is designed to realize cloud traffic data management and online remote water leakage diagnosis, and provides an API interface for client access. Leakage diagnosis is performed by comparing the flow data at both ends of the pipeline. The software client can request the flow data of the day and draw a display chart. When a leak occurs, an alarm can be issued. The system automatically detects and displays the leak level and the leak position. The system has the following characteristics: real-time online monitoring of the flow of each water pipe, ultrasonic probe to obtain water pipe data, to avoid damage to existing pipelines and the entire system circuit are designed with low power consumption, the system continues to work for a long time.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123508694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modeling Digital Low-Dropout Regulator with a Multiple Sampling Frequency Circuit Technology 基于多采样频率电路技术的数字低差稳压器建模
Jiarong Geng, Baodong Yu, Chongfei Shen, Hongda Zhang, Zhaozhe Liu, Peiyuan Wan, Zhijie Chen
{"title":"Modeling Digital Low-Dropout Regulator with a Multiple Sampling Frequency Circuit Technology","authors":"Jiarong Geng, Baodong Yu, Chongfei Shen, Hongda Zhang, Zhaozhe Liu, Peiyuan Wan, Zhijie Chen","doi":"10.1109/ICASID.2019.8925294","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925294","url":null,"abstract":"The digital low dropout regulators are widely used because it can operate at low supply voltage. In the digital low drop-out regulators, the high sampling frequency circuit has a short setup time, but it will produce overshoot, and then the output can be stabilized; although the low sampling frequency circuit output can be directly stabilized, the setup time is too long. This paper proposes a two sampling frequency circuit model, which aims to include the high and low sampling frequencies in the same circuit. By controlling the sampling frequency of the circuit under different conditions, this allows the circuit to combine the advantages of the circuit operating at different sampling frequencies. This shortens the circuit setup time and the stabilization time at the same time.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Practical Side-Channel Attack of a LoRaWAN Module Using Deep Learning 基于深度学习的LoRaWAN模块侧信道攻击
Jiming Xu, You Tang, Yujian Wang, Xinan Wang
{"title":"A Practical Side-Channel Attack of a LoRaWAN Module Using Deep Learning","authors":"Jiming Xu, You Tang, Yujian Wang, Xinan Wang","doi":"10.1109/ICASID.2019.8925203","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925203","url":null,"abstract":"With the development of Internet-of-Things technology, the electronic devices nowadays are embedded with “smart” functionalities, which enable them to upload data to the cloud for the easy access of the users. Such functionalities have been popular among commercial products. However, as we shall show in this paper, these functionalities, if not protected properly, can be vulnerable to attacks. An unprotected implementation leaks significant level of information related to the sensitive operations, which could pose threats to the security of the device. In this paper, we demonstrate a practical attack against a LoRaWAN communication module. This attack uses the deep-learning-based side-channel attack to recover the key for encrypting the payload data. By capturing less than 100 communication packets, the trained convolutional neural network is capable of recovering the full key for AES encryption.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116020093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Thermo-electric Energy Harvesting Powered IoT System Design and Energy Model Analysis 热电能量收集驱动的物联网系统设计与能量模型分析
Wensi Wang, Xuanchong Chen, Yun Liu, X. Wang, Zhansheng Liu
{"title":"Thermo-electric Energy Harvesting Powered IoT System Design and Energy Model Analysis","authors":"Wensi Wang, Xuanchong Chen, Yun Liu, X. Wang, Zhansheng Liu","doi":"10.1109/ICASID.2019.8925180","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925180","url":null,"abstract":"Power consumption of micro-controllers and sensor systems have been greatly reduced in the last decade, new power supply method such as energy harvesting is now an alternative method to power Internet of things (IoT) devices. A few square centimeters sized thermo-electric generators (TEGs) can convert a few degrees Celsius temperature gradients into milli-watts of electric power. This paper presents the design of a TEG energy harvesting powered LoRa IoT device. The power management circuits design, super-capacitor energy storage unit and the IoT low power algorithm are introduced. The system demonstrated the TEG power generation of 0.4-12 mW, IoT device current consumption of 79 mA in data transmission mode, less than 50 μA in sleep mode. With super-capacitor energy storage unit, the IoT device can be powered entirely from thermo-electric energy without batteries. In addition to the system implementation, a comprehensive simulation model is created to optimize the form factor of TEG, selection of the super-capacitor and the operation duty cycles of IoT devices.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New Information Extractor for Profiled DPA and Implementation of High Order Masking Circuit 一种新的异形DPA信息提取器及高阶屏蔽电路的实现
Yuyang Pan, Yanzhao Yin, Yulin Zhao, Liji Wu, Xiangmin Zhang
{"title":"A New Information Extractor for Profiled DPA and Implementation of High Order Masking Circuit","authors":"Yuyang Pan, Yanzhao Yin, Yulin Zhao, Liji Wu, Xiangmin Zhang","doi":"10.1109/ICASID.2019.8924886","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8924886","url":null,"abstract":"Profiled DPA is a new method combined with machine learning method in side channel attack which is put forward by Whitnall in CHES 2015.[1]The most important part lies in effectiveness of extracting information. This paper introduces a new rule Explained Local Variance (ELV) to extract information in profiled stage for profiled DPA. It attracts information effectively and shields noise to get better accuracy than the original rule. The ELV enables an attacker to use less power traces to get the same result as before. It also leads to 94.6% space reduction and 29.2% time reduction for calculation. For security circuit implementation, a high order masking scheme in modelsim is implemented. A new exchange network is put forward. 96.9% hardware resource is saved due to the usage of this network.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Thyroid Standard Planes in Ultrasound Images based on Multi-feature Fusion 基于多特征融合的超声图像甲状腺标准平面分类
Junchang Wang, Peizhong Liu
{"title":"Classification of Thyroid Standard Planes in Ultrasound Images based on Multi-feature Fusion","authors":"Junchang Wang, Peizhong Liu","doi":"10.1109/ICASID.2019.8925264","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925264","url":null,"abstract":"The automatic identification of thyroid ultrasound standard planes is of great significance in improving the efficiency of thyroid ultrasound diagnosis and treatment. This paper proposes a method for the automatic classification of thyroid ultrasound standard planes based on multi-features fusion. According to the characteristics that the thyroid ultrasound image is not affected by illumination, two local features about histograms of oriented gradients (HOG) and gray level co-occurrence matrix (GLCM) are extracted, and then the thyroid ultrasound images are adopted by SVM classifier, KNN classifier and Bayes classifier respectively. In the experiment, a total of 2111 thyroid ultrasound standard planes are classified. The results show that the SVM classifier is the best, and the accuracy of the four planes is 97%, 98%, 80% and 70% respectively. The classification accuracy rate is 86.25%, and the proposed method can provide a basic method for the automatic classification of thyroid ultrasound standard planes.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125254466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Key Agreement Protocol for Secure Group Communications Using Periodic Array 一种基于周期阵列的安全组通信密钥协议
Yi Jiang, Qingsong Huang, Cheng Zhu, Yiqiu Wang, Jian Shen
{"title":"An Efficient Key Agreement Protocol for Secure Group Communications Using Periodic Array","authors":"Yi Jiang, Qingsong Huang, Cheng Zhu, Yiqiu Wang, Jian Shen","doi":"10.1109/ICASID.2019.8925248","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925248","url":null,"abstract":"Group communications are significant applications of many emerging communication technologies. To preserve users' privacy in group communications, key agreement protocols with security and high efficiency are imperative. In this paper, a group key agreement protocol is presented to achieve this goal. The periodic array is originally applied to the group key agreement protocol to derive a session key by group members. Moreover, user authentication is supported in the proposed protocol to ensure secure group communications. Finally, the performance evaluation shows that the proposed protocol has both of the low communication complexity and the low computational complexity, indicating that the proposed protocol is efficient in group communications.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信