2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

筛选
英文 中文
Pretrained Convolutional Neural Networks for Cancer Genome Classification 用于癌症基因组分类的预训练卷积神经网络
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096808
Aisha A. Abdullahi, Khlood Bawazeer, Salwa Alotaibai, Elmaha Almoaither, Mashael M Al-Otaibi, H. Alaskar, Thavavel Vaiyapuri
{"title":"Pretrained Convolutional Neural Networks for Cancer Genome Classification","authors":"Aisha A. Abdullahi, Khlood Bawazeer, Salwa Alotaibai, Elmaha Almoaither, Mashael M Al-Otaibi, H. Alaskar, Thavavel Vaiyapuri","doi":"10.1109/ICCAIS48893.2020.9096808","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096808","url":null,"abstract":"Deep learning techniques, particularly convolutional neural networks (CNNs), have proved their success and popularity recently in many fields, especially distinguishing and analyzing medical diseases. Motivated by this direction, our work attempts for the first time to investigate the application of a state-of-the-art deep learning technique on genomic sequences to classify tumours of different classes. The novelty of our approach lies in the application of the popular pre-trained AlexNet on an image version of the RNA-Sequence data. Our methodology demonstrated an outstanding performance with good sensitivity results of 98.3%, 94.1%, 96.6%, 100%, and 100% for selected types of breast, colon, kidney, lung and prostate cancers respectively. The outcome of this work is expected to provide a new direction for genomics data classification and designing accurate automated diagnosis tools.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124467638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning Based Algorithm For Automatic Scoliosis Angle Measurement 基于深度学习的脊柱侧凸角度自动测量算法
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096753
Roa Alharbi, Meshal Alshaye, Maryam M. Alkanhal, Najla M. Alharbi, Mosa A. Alzahrani, Osama A. Alrehaili
{"title":"Deep Learning Based Algorithm For Automatic Scoliosis Angle Measurement","authors":"Roa Alharbi, Meshal Alshaye, Maryam M. Alkanhal, Najla M. Alharbi, Mosa A. Alzahrani, Osama A. Alrehaili","doi":"10.1109/ICCAIS48893.2020.9096753","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096753","url":null,"abstract":"Scoliosis is a common back disease which identifies with an irregular spinal condition. In this case, the spine has a side curvature with an angle. Practically, the standard angle estimation method is done by measuring the Cobb angle for the curvature. Cobb angle is the angle between two drawn lines, upper-end line and lower-end line of the curve. However, manual measurement needs time and effort. In this paper, we proposed an automatic measurement algorithm with machine learning. Initially, X-Rays images are processed utilizing CLAHE method. Then, deep convolutional neural networks (CNN) are applied to detect vertebrae in each X-Ray image. At last, the Cobb angle is measured through a novel algorithm using trigonometry. The proposed method is evaluated on X-Rays dataset from King Saud University (KSU), and it detects each vertebra in those images. In addition, Cobb angle measurements are compared with experts’ manual measurements. Our method achieves the estimation of Cobb angles with high accuracy, showing its great potential in clinical use.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124489541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Internet of Things Based Smart Mirrors: A Literature Review 基于物联网的智能镜子:文献综述
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096719
D. Alboaneen, Dalia Alsaffar, Alyah Alateeq, A. Alqahtani, Amjad Alfahhad, Bashaier Alqahtani, Rahaf Alamri, Lama Alamri
{"title":"Internet of Things Based Smart Mirrors: A Literature Review","authors":"D. Alboaneen, Dalia Alsaffar, Alyah Alateeq, A. Alqahtani, Amjad Alfahhad, Bashaier Alqahtani, Rahaf Alamri, Lama Alamri","doi":"10.1109/ICCAIS48893.2020.9096719","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096719","url":null,"abstract":"Internet of Things (IoT) allows devices to communicate with each other in different and important places at the same time. Smart things are developed in ways that interact with each other, such as smart doors and smart homes. One of the most important IoT applications is the smart mirror. It is a mirror that acts as a reflective surface and as an interactive screen at the same time. Smart mirrors can be implemented for different purposes such as a simulator for medical students and an assistant in the fitting rooms. This paper presents a review upon applications of smart mirrors.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121091063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Proposed Solutions to Detect and Prevent DoS Attacks on VANETs System 针对VANETs系统的DoS攻击检测与防范方案
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096873
N. Alsulaim, Raghad Abdullah Alolaqi, R. Alhumaidan
{"title":"Proposed Solutions to Detect and Prevent DoS Attacks on VANETs System","authors":"N. Alsulaim, Raghad Abdullah Alolaqi, R. Alhumaidan","doi":"10.1109/ICCAIS48893.2020.9096873","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096873","url":null,"abstract":"Vehicular Ad hoc NETworks (VANETs) is a network aims to improve road safety by sharing information between vehicles. Security is a major concern regarding critical information shared between vehicles, because information sent over the vehicle network is sensitive and can affect important security decisions. But due to VANET characteristics which is high mobility and its large size, it’s become susceptibility to attacks, especially Denial of Service (DoS) attacks that denial the availability of the network for the users and thus becoming a life crucial. In this paper, we focus on studying the Denial of Service attacks, types and cases on which the attacker may achieve DoS attacks on VANET networks as well as exploring potential solutions in detecting and preventing this attack.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1995 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130345755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Modified Mathematical Model of the Pathogenesis of Urolithiasis: Add Calculi Dissolution Effect 尿石症发病机理的修正数学模型:加结石溶解效应
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096728
H. Kagami
{"title":"The Modified Mathematical Model of the Pathogenesis of Urolithiasis: Add Calculi Dissolution Effect","authors":"H. Kagami","doi":"10.1109/ICCAIS48893.2020.9096728","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096728","url":null,"abstract":"The first mathematical model of the process leading to the onset of urolithiasis so as to clarify how a variety of factors affecting urolithiasis influence the pathogenesis quantitatively was derived. Then conditions for not causing the onset of urolithiasis based on the mathematical model were quantitatively discussed. The background from which this mathematical model was derived was as follows. So far various studies for the cause of the onset of urolithiasis has been made and the factors influencing the pathogenesis has been almost clear. On the other hand, though the understanding of individual factor influencing the pathogenesis has progressed biologically and clinically, theoretical study of the integrated dynamics leading to the calculus of urolithiasis through the crystal growth and aggregation from the crystal nucleation using a mathematical model has not been made yet. In the mathematical model, the process leading to the onset of urolithiasis is divided into the following three processes. (1) formation of crystal nuclei. (2) formation of calculi by growth of crystal nuclei. (3) bonding of calculi to urinary tract cells and growth of calculi. In the first mathematical model, the process of dissolving calculi was not taken into account in the process (3) above. However, in clinical, treatment for dissolving calculi using a stone-dissolving drug is also performed. Therefore, in the mathematical model of the pathogenesis of urolithiasis the calculi dissolution effect must be also taken into account. In this study, the modified mathematical model of the pathogenesis of urolithiasis taking the calculi dissolution effect into account is derived and the nature is examined. Through the analysis of the modified mathematical model and the results of numerical simulation, the conditions for suppressing the calculus growth was modified analytically and numerically. And the dependence of the growth of the calculus on the reaction rate constant concerning dissolution of the calculus, the volume of the urinary tract or the flow rate of urine was also clarified analytically and numerically. In particular, it was shown that if the calculi adhered to the urinary tract, increasing the flow rate or reducing the urinary tract volume would not contribute to the suppression of the calculi growth very much.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130347623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Email Phishing Attacks using Convolutional Neural Networks 使用卷积神经网络减轻电子邮件网络钓鱼攻击
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096821
Reem M. Alotaibi, Isra M. Al-Turaiki, Fatimah Alakeel
{"title":"Mitigating Email Phishing Attacks using Convolutional Neural Networks","authors":"Reem M. Alotaibi, Isra M. Al-Turaiki, Fatimah Alakeel","doi":"10.1109/ICCAIS48893.2020.9096821","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096821","url":null,"abstract":"Phishing detection has gained huge attention from both academia and industry. Damages and data breaches affecting private and governmental entities caused by email phishing attacks needed an immediate solution. The diversity of attack patterns and mediums associated with phishing attacks made the development of an optimal solution challenging. Also, attackers usually make legitimate looking content using legitimate wording or legitimate looking URLs and websites. Many of the existing phishing solutions requires manual feature extraction that requires expert domain knowledge and thoughtful selection of valuable features to be efficient. Additionally, most effective phishing solutions suffered from large computational costs. In this paper, we propose CNNPD, an email phishing detection framework based on Convolutional Neural Network (CNN). CNNPD marks incoming emails into phishing or benign. Testing the framework on an email dataset shows promising performance in terms of accuracy, precision, and recall when compared to similar approaches.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DUST-MASK: A Framework for Preventing Bitcoin’s Dust Attacks Dust - mask:一个防止比特币粉尘攻击的框架
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096763
Fadyah A. AlShlawi, Nourah K. AlSa’awi, Waad Y. Bin Saleem, Anees Ara
{"title":"DUST-MASK: A Framework for Preventing Bitcoin’s Dust Attacks","authors":"Fadyah A. AlShlawi, Nourah K. AlSa’awi, Waad Y. Bin Saleem, Anees Ara","doi":"10.1109/ICCAIS48893.2020.9096763","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096763","url":null,"abstract":"Bitcoin Cryptocurrency is an advanced decentralized electronic payment system which stores all the transaction records in a public ledger connected to the blockchain. Many cyber-attacks including Double-Spending, Distributed denial-of-service (DDOS), Sybil attack and Dust attack, have been targeting Blockchain-based application Cryptocurrency, mainly Bitcoin cryptocurrency. In this paper, the proposed DUST-MASK, a secure Bitcoin system against dust attack, protects Bitcoin’s availability and pseudo-anonymity from attackers sending dust transactions in order to analyze the data and link the transactions to a specific user. The proposed system will inform the user of those kinds of malicious transactions and guarantee the user a choice whether to accept or reject them.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131556543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDOS Attack on IOT Devices IOT设备的DDOS攻击
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096818
A. Munshi, Nouf Ayadh Alqarni, Nadia Abdullah Almalki
{"title":"DDOS Attack on IOT Devices","authors":"A. Munshi, Nouf Ayadh Alqarni, Nadia Abdullah Almalki","doi":"10.1109/ICCAIS48893.2020.9096818","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096818","url":null,"abstract":"Internet of Things (IoT) is an application of the internet correlation with devices that makes human life easy. The need to use (IoT) in our lives makes this field expands every day without stopping. Which would let everything connected to the internet exposure to penetration. As the need for (IoT) devices grows, the horizon of malicious abuse expands [1]. In this paper, we will study one of the most common violations in IoT devices, which is Distributed Denial of Service (DDoS) attack and study its impact on (IoT) devices in order to be aware to control our utilizations and the need to secure the Internet of Things devices in our lives.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Framework for Socializing Learning Content 社会化学习内容的框架
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096832
Y. AlRoshdi, Mohammed AlBadawi, Mohammed Sarrab
{"title":"Framework for Socializing Learning Content","authors":"Y. AlRoshdi, Mohammed AlBadawi, Mohammed Sarrab","doi":"10.1109/ICCAIS48893.2020.9096832","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096832","url":null,"abstract":"Learning systems contain an enormous amount of knowledge that is of high importance for students. This knowledge exists in different learning materials, such as documents, figures, and diagrams, videos, etc. The students can use this information to increase and build their knowledge. However, the searching mechanisms through these materials are difficult and time-consuming. Besides, the student consuming time in from of the social networks. Therefore, there is a need to utilize and enhance the way of learning and summarizing knowledge from the tremendous amount of learning materials that exist in the e-learning systems. Also, we want to benefit from the students’ desire in the social networks environment to disseminate the extracted knowledge among them through those platforms. Thus, this research aims to propose a framework to disseminate the learning content to the target students through the social network environment. This framework seeks to improve the learning experience and increase the learning outcomes of the students.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115290023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Metrics that impact on Congestion Control at Internet Of Things Environment 影响物联网环境中拥塞控制的指标
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096865
Fatimah Alghamdi
{"title":"Metrics that impact on Congestion Control at Internet Of Things Environment","authors":"Fatimah Alghamdi","doi":"10.1109/ICCAIS48893.2020.9096865","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096865","url":null,"abstract":"Congestion is very common in wireless networks as multiple sensors try to transmit data simultaneously. The Internet Of Things (IOT) is a dynamic system. Using a specific congestion control algorithm with one IOT system provides different results from other IOT systems. This means that an IOT developer cannot use the same congestion control algorithm with different IOT systems, because the efficiency of congestion control algorithms varies from one IOT system to another according to the infrastructure of the smart system and the amount of transmitted data. The primary purpose of this work is to support analysts and designers of congestion control algorithms at IOT companies by understanding the metrics influencing congestion control. This will enable them to select the appropriate metrics depending on the nature of the IOT infrastructure and the amount of transmitted data. This study also conducts a literature review of papers that discuss transport protocols providing congestion control. The data extraction process gathered from 30 transport protocols concerning congestion control. From the reviewed papers, we extract the metrics that influence congestion control detection, notification, and mitigation. After that, we applied some statistical solutions on extracted metrics. We find queue length is the metrics used most often for congestion detection. While additive increase multiplicative decrease (AIMD) for single-bit transmitting is the most used metrics for congestion notication. Whereas rate control is the most used metrics for congestion mitigation","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信