Lei Wang, Lilan Luo, Peng Zheng, Tianyu Zheng, Shan He
{"title":"A Fast Dent Detection Method for Curved Glass Using Deep Convolutional Neural Network","authors":"Lei Wang, Lilan Luo, Peng Zheng, Tianyu Zheng, Shan He","doi":"10.1109/ICASID.2019.8925124","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925124","url":null,"abstract":"The curved glass is widely used in many fields, but its defects inspection is still a labor-intensive job. In all kinds of defects in glass, the dent defect is the hardest one because of its small depth variation and smooth edge. Machine vision gives out a possible solution for defects detection in glass industry, but the dent images suffer from the non-uniform gray value and the low contrast. In this paper, we propose a method based on the deep convolutional neural network for the dent defect detection. We prune the DenseNet-121 to design a compact model for real-time production. During the process of model training, we use a data augmentation method including offline and online operations to optimize the model performance. The experiments show this detection method has a good performance of 100% recognition accuracy on our dent defect dataset of the curved glass.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"White Matter Segmentation from Cranial Ultrasound Images based on Convolutional Neural Network","authors":"Jiaqi Tan, D. Que, Yijun Zhao, Yanyan Yu","doi":"10.1109/ICASID.2019.8925220","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925220","url":null,"abstract":"White matter damage (WMD) is one of the most common consequences of preterm newborns, which may cause long-term neurodevelopmental deficits, such as cerebral palsy, abnormal audio-visual function, cognitive impairment, etc. Segmentation of white matter plays an important role in WMD detection and intervention. Manual segmentation of white matter is tedious and may cause inter- or intra-observer variability. In this work, ultrasound images from 148 premature infants were segmented using three convolutional neural networks, FCN, Unet and residual-structured fully convolutional network (res-FCN). Each preterm newborn collected three cross sections images from ultrasound. By comparison, the results showed that res-FCN had the most evaluation metrics with the best performance: Precision 78.94%, AD 26.54% on the lateral ventricle anterior horn plane; Recall 80.62%, Precision 77.09%, AO 63.00%, DSC 75.95% on the coronal lateral ventricle body plane; Recall 86.00%, AO 71.10% on the occipital lobe plane.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Leakage Detection for a Masked SM3-MAC Hardware Implementation","authors":"Hang Yu, Zhenhao He, Liji Wu, Xiangmin Zhang","doi":"10.1109/ICASID.2019.8925299","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925299","url":null,"abstract":"The SM3-MAC algorithm is a Message Authentication Code (MAC) algorithm based on the SM3 hash algorithm proposed by Office of Security Commercial Code Administration in 2010. In this paper, a masking scheme for SM3-MAC algorithm using key mask is proposed. Then, 5,000 power traces are collected by software simulation with Hamming distance model. We can prove that the unmasked SM3-MAC hardware is vulnerable to first-order power analysis, while the masked SM3-MAC hardware does not have register leakage under the Hamming distance model. After that, the SAKURA-G FPGA board is used to collect two sets of power traces of the masked SM3-MAC hardware, each of which contains 3,000 traces. The Test Vector Leakage Assessment (TVLA) methodology proves that there is a 99.999% chance that no first-order power leakage is detected in the masked SM3-MAC hardware. Finally, the feasibility of second-order power analysis is discussed, and the effects of different pre-processing functions on correlation are investigated. A second-order test has been carried out to analyze the second-order security of the masked SM3-MAC hardware, which proves that there exists second-order leakage.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis of JPEG Image Encryption Algorithm Based on DCT Coefficients Shuffling and Decomposing","authors":"Shanshan Li, Hongli Zhang, Li Zhao","doi":"10.1109/ICASID.2019.8924887","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8924887","url":null,"abstract":"In this paper, security of a JPEG image encryption algorithm has been analyzed. The algorithm shuffles DCT quantization coefficients in defined block and decomposes DC coefficient to change the number of nonzero DCT quantization coefficients in each $8^{*}8$ block. Chosen plain-text attack could be employed to recover the defined block shuffle. Changing the number of nonzero DCT quantization coefficients in each block still leaks plain-text image information. Numbers of nonzero coefficients counting attack is adopted to get mosaic appearance image of the original plain-text.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124990018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convergence Stability of Spiking Neural Networks with Stochastic Fluctuations","authors":"Chenhui Zhao, Shan He, Lin Li, Donghui Guo","doi":"10.1109/ICASID.2019.8925103","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925103","url":null,"abstract":"This paper is mainly concerned with the convergence stability of spiking neural networks (SNNs) with stochastic fluctuations. The stochastic fluctuations of spike response model (SRM) are mainly caused by Markovian switching and time delays. The transmission of pulse signals between neurons in this model should be time dependent and its kernel functions should be Lipschitz continuous. Some sufficient criteria are proposed to guarantee the stable convergence of the SRM by using the properties of M-matrix. The stability results have certain reference value for the optimal computation and the design of SNNs with stochastic fluctuations. The numerical illustration is provided to examine the validity of the derived results.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phishing URL Detection Via Capsule-Based Neural Network","authors":"Yongjie Huang, Jinghui Qin, Wushao Wen","doi":"10.1109/ICASID.2019.8925000","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925000","url":null,"abstract":"As a cyber attack which leverages social engineering and other sophisticated techniques to steal sensitive information from users, phishing attack has been a critical threat to cyber security for a long time. Although researchers have proposed lots of countermeasures, phishing criminals figure out circumventions eventually since such countermeasures require substantial manual feature engineering and can not detect newly emerging phishing attacks well enough, which makes developing an efficient and effective phishing detection method an urgent need. In this work, we propose a novel phishing website detection approach by detecting the Uniform Resource Locator (URL) of a website, which is proved to be an effective and efficient detection approach. To be specific, our novel capsule-based neural network mainly includes several parallel branches wherein one convolutional layer extracts shallow features from URLs and the subsequent two capsule layers generate accurate feature representations of URLs from the shallow features and discriminate the legitimacy of URLs. The final output of our approach is obtained by averaging the outputs of all branches. Extensive experiments on a validated dataset collected from the Internet demonstrate that our approach can achieve competitive performance against other state-of-the-art detection methods while maintaining a tolerable time overhead.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chongzhen Zhang, Fangming Ruan, Lan Yin, Xi Chen, Lidong Zhai, Feng Liu
{"title":"A Deep Learning Approach for Network Intrusion Detection Based on NSL-KDD Dataset","authors":"Chongzhen Zhang, Fangming Ruan, Lan Yin, Xi Chen, Lidong Zhai, Feng Liu","doi":"10.1109/ICASID.2019.8925239","DOIUrl":"https://doi.org/10.1109/ICASID.2019.8925239","url":null,"abstract":"Along with the high-speed growth of Internet, cyber-attack is becoming more and more frequent, so the detection of network intrusions is particularly important for keeping network in normal work. In modern big data environment, however, traditional methods do not meet requirement of the network in the aspects of adaptability and efficiency. A approach based on deep learning for intrusion detection was proposed in this paper which can be applied to deal with the problem to certain extent. Autoencoder, as a popular technology of deep learning, was used in the proposed solution. The encoder of deep autoencoder was taken to compress the less important features and extract key features without decoder. With proposed approach one can build the network and identify attacks faster, the benchmark NSL-KDD dataset can be evaluated with proposed model.","PeriodicalId":422125,"journal":{"name":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116804544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}