{"title":"A Classification Algorithm of Ultrasonic Thyroid Standard Planes Using LBP and HOG Features","authors":"Yihong Wu, Peizhong Liu","doi":"10.1109/ICASID.2019.8925122","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925122","url":null,"abstract":"To improve the performance of thyroid standard plane scanning, this paper proposes a classification algorithm for classifying thyroid ultrasound images using texture features. Firstly, the region of interest of ultrasound images is chosen in the preprocessing process step. Secondly, the local binary patterns (LBP) features and the histograms of oriented gradients (HOG) features of the images are extracted. Then the obtained feature vectors are spliced as the input of the support vector machine (SVM) which is used to classify the thyroid standard plane images. In the experiment, there are 4,574 thyroid standard plane images are used in this paper, which are divided into 8 categories, of which 3,655 pictures for training, and 919 pictures for testing. The experimental results show that the classification accuracy is up to 88.58%, which show a fact that the proposed algorithm has a good discriminating ability for the standard eight-category thyroid plane images, which can assist the doctor to diagnose to a certain extent.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115412016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Differentially Private DBScan Clustering Algorithm for Vehicular Crowdsensing","authors":"Yuzhen Jin, Shuyu Li","doi":"10.1109/icasid.2019.8925098","DOIUrl":"https://doi.org/10.1109/icasid.2019.8925098","url":null,"abstract":"In response to the risks of privacy leakage caused by uploading vehicle participants' sensing data (such as location data or task sensing data) in the vehicle crowdsensing environment, an improved DBSCAN Clustering Algorithm (I-DP-DBScan) is proposed in the paper. The proposed algorithm is improved by optimizing the parameters Eps and MinPts, and differential privacy is adopted for guaranteeing participants' privacy. Laplace noise is added to the Euclidean distance of sensing data. Experimental results show that the I-DP-DBScan algorithm not only protects data privacy but also has good clustering efficiency.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128328934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zicong Yang, Lixin Yang, Y. Xing, Zhijie Chen, Peiyuan Wan
{"title":"A State-Configurable IIC Bus Design","authors":"Zicong Yang, Lixin Yang, Y. Xing, Zhijie Chen, Peiyuan Wan","doi":"10.1109/ICASID.2019.8925136","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925136","url":null,"abstract":"This paper presents a design of IIC bus with configurable state and readable flexibility. Based on the proposed design, the working state of IIC can be read at all times, and simultaneously can be configured through APB bus. The implementation of finite state machine design is adopted, in which a small state machine is embedded into a large state machine, and state information is updated in IIC registers in real time. Through RTL simulation and FPGA verification, reliable data transmission in slave devices with IIC bus interface is realized. This proposed design has good flexibility, and suitable for chip measurement and system debugging, and has been successfully applied in engineering practice.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"143 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128802201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NB-IOT Pipeline Water Leakage Automatic Monitoring System Based on Cloud Platform","authors":"Zhiyuan Shi, Mingkang Wang, Huiwen Lin, Hezhi Lin, Zhibin Gao, Lianfeng Huang","doi":"10.1109/ICASID.2019.8925228","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925228","url":null,"abstract":"In this paper, the cloud-based NB-IOT pipeline water leakage automatic monitoring system is designed to realize cloud traffic data management and online remote water leakage diagnosis, and provides an API interface for client access. Leakage diagnosis is performed by comparing the flow data at both ends of the pipeline. The software client can request the flow data of the day and draw a display chart. When a leak occurs, an alarm can be issued. The system automatically detects and displays the leak level and the leak position. The system has the following characteristics: real-time online monitoring of the flow of each water pipe, ultrasonic probe to obtain water pipe data, to avoid damage to existing pipelines and the entire system circuit are designed with low power consumption, the system continues to work for a long time.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123508694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Digital Low-Dropout Regulator with a Multiple Sampling Frequency Circuit Technology","authors":"Jiarong Geng, Baodong Yu, Chongfei Shen, Hongda Zhang, Zhaozhe Liu, Peiyuan Wan, Zhijie Chen","doi":"10.1109/ICASID.2019.8925294","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925294","url":null,"abstract":"The digital low dropout regulators are widely used because it can operate at low supply voltage. In the digital low drop-out regulators, the high sampling frequency circuit has a short setup time, but it will produce overshoot, and then the output can be stabilized; although the low sampling frequency circuit output can be directly stabilized, the setup time is too long. This paper proposes a two sampling frequency circuit model, which aims to include the high and low sampling frequencies in the same circuit. By controlling the sampling frequency of the circuit under different conditions, this allows the circuit to combine the advantages of the circuit operating at different sampling frequencies. This shortens the circuit setup time and the stabilization time at the same time.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Practical Side-Channel Attack of a LoRaWAN Module Using Deep Learning","authors":"Jiming Xu, You Tang, Yujian Wang, Xinan Wang","doi":"10.1109/ICASID.2019.8925203","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925203","url":null,"abstract":"With the development of Internet-of-Things technology, the electronic devices nowadays are embedded with “smart” functionalities, which enable them to upload data to the cloud for the easy access of the users. Such functionalities have been popular among commercial products. However, as we shall show in this paper, these functionalities, if not protected properly, can be vulnerable to attacks. An unprotected implementation leaks significant level of information related to the sensitive operations, which could pose threats to the security of the device. In this paper, we demonstrate a practical attack against a LoRaWAN communication module. This attack uses the deep-learning-based side-channel attack to recover the key for encrypting the payload data. By capturing less than 100 communication packets, the trained convolutional neural network is capable of recovering the full key for AES encryption.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116020093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wensi Wang, Xuanchong Chen, Yun Liu, X. Wang, Zhansheng Liu
{"title":"Thermo-electric Energy Harvesting Powered IoT System Design and Energy Model Analysis","authors":"Wensi Wang, Xuanchong Chen, Yun Liu, X. Wang, Zhansheng Liu","doi":"10.1109/ICASID.2019.8925180","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925180","url":null,"abstract":"Power consumption of micro-controllers and sensor systems have been greatly reduced in the last decade, new power supply method such as energy harvesting is now an alternative method to power Internet of things (IoT) devices. A few square centimeters sized thermo-electric generators (TEGs) can convert a few degrees Celsius temperature gradients into milli-watts of electric power. This paper presents the design of a TEG energy harvesting powered LoRa IoT device. The power management circuits design, super-capacitor energy storage unit and the IoT low power algorithm are introduced. The system demonstrated the TEG power generation of 0.4-12 mW, IoT device current consumption of 79 mA in data transmission mode, less than 50 μA in sleep mode. With super-capacitor energy storage unit, the IoT device can be powered entirely from thermo-electric energy without batteries. In addition to the system implementation, a comprehensive simulation model is created to optimize the form factor of TEG, selection of the super-capacitor and the operation duty cycles of IoT devices.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Information Extractor for Profiled DPA and Implementation of High Order Masking Circuit","authors":"Yuyang Pan, Yanzhao Yin, Yulin Zhao, Liji Wu, Xiangmin Zhang","doi":"10.1109/ICASID.2019.8924886","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8924886","url":null,"abstract":"Profiled DPA is a new method combined with machine learning method in side channel attack which is put forward by Whitnall in CHES 2015.[1]The most important part lies in effectiveness of extracting information. This paper introduces a new rule Explained Local Variance (ELV) to extract information in profiled stage for profiled DPA. It attracts information effectively and shields noise to get better accuracy than the original rule. The ELV enables an attacker to use less power traces to get the same result as before. It also leads to 94.6% space reduction and 29.2% time reduction for calculation. For security circuit implementation, a high order masking scheme in modelsim is implemented. A new exchange network is put forward. 96.9% hardware resource is saved due to the usage of this network.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Thyroid Standard Planes in Ultrasound Images based on Multi-feature Fusion","authors":"Junchang Wang, Peizhong Liu","doi":"10.1109/ICASID.2019.8925264","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925264","url":null,"abstract":"The automatic identification of thyroid ultrasound standard planes is of great significance in improving the efficiency of thyroid ultrasound diagnosis and treatment. This paper proposes a method for the automatic classification of thyroid ultrasound standard planes based on multi-features fusion. According to the characteristics that the thyroid ultrasound image is not affected by illumination, two local features about histograms of oriented gradients (HOG) and gray level co-occurrence matrix (GLCM) are extracted, and then the thyroid ultrasound images are adopted by SVM classifier, KNN classifier and Bayes classifier respectively. In the experiment, a total of 2111 thyroid ultrasound standard planes are classified. The results show that the SVM classifier is the best, and the accuracy of the four planes is 97%, 98%, 80% and 70% respectively. The classification accuracy rate is 86.25%, and the proposed method can provide a basic method for the automatic classification of thyroid ultrasound standard planes.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125254466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Jiang, Qingsong Huang, Cheng Zhu, Yiqiu Wang, Jian Shen
{"title":"An Efficient Key Agreement Protocol for Secure Group Communications Using Periodic Array","authors":"Yi Jiang, Qingsong Huang, Cheng Zhu, Yiqiu Wang, Jian Shen","doi":"10.1109/ICASID.2019.8925248","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925248","url":null,"abstract":"Group communications are significant applications of many emerging communication technologies. To preserve users' privacy in group communications, key agreement protocols with security and high efficiency are imperative. In this paper, a group key agreement protocol is presented to achieve this goal. The periodic array is originally applied to the group key agreement protocol to derive a session key by group members. Moreover, user authentication is supported in the proposed protocol to ensure secure group communications. Finally, the performance evaluation shows that the proposed protocol has both of the low communication complexity and the low computational complexity, indicating that the proposed protocol is efficient in group communications.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}