{"title":"Empirical Measurement of Performance Maintenance of Gradient Boosted Decision Tree Models for Malware Detection","authors":"Colin Galen, Robert Steele","doi":"10.1109/ICAIIC51459.2021.9415220","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415220","url":null,"abstract":"Important for effective, real-world machine learning (ML) or artificial intelligence (AI)-based malware detection systems is that models demonstrate both high discriminative performance at time of training and also demonstrate a high level of performance maintenance over time subsequent to training. That is, it is desirable that the models have a slow rate of performance decline over time as they encounter previously unseen malware threats. The study of malware detection model empirical performance maintenance on real-world data sets has not been widely addressed despite significant work on ML-based malware detection in general. In this work, we evaluate performance maintenance characteristics of models using a large, one million instance malware-goodware dataset spanning executables collected over one year in duration. Based on the outperformance of gradient boosted decision tree-based models, we investigate this category of model further and demonstrate models with performance and performance maintenance superior to that demonstrated in the previous ML-based malware detection literature. Given the large size of the dataset of real-world executables utilized, the insights into model performance maintenance may have valuable implications for real-world ML-based malware detection systems.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130289618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extensive Huffman-tree-based Neural Network for the Imbalanced Dataset and Its Application in Accent Recognition","authors":"Jeremy Merrill, Yu Liang, Dalei Wu","doi":"10.1109/ICAIIC51459.2021.9415243","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415243","url":null,"abstract":"To classify the data-set featured with a large number of heavily imbalanced classes, this paper proposed an Extensive Huffman-Tree Neural Network (EHTNN), which fabricates multiple component neural network-enabled classifiers (e.g., CNN or SVM) using an extensive Huffman tree. Any given node in EHTNN can have arbitrary number of children. Compared with the Binary Huffman-Tree Neural Network (BHTNN), EHTNN may have smaller tree height, involve fewer neural networks, and demonstrate more flexibility on handling data imbalance. Using a 16-class exponentially imbalanced audio data-set as the benchmark, the proposed EHTNN was strictly assessed based on the comparisons with alternative methods such as BHTNN and single-layer CNN. The experimental results demonstrated promising results about EHTNN in terms of Gini index, Entropy value, and the accuracy derived from hierarchical multiclass confusion matrix.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Wibawa, Zahra Nabila Izdihar, Agung Bella Putra Utama, Leonel Hernandez, Haviluddin
{"title":"Min-Max Backpropagation Neural Network to Forecast e-Journal Visitors","authors":"A. Wibawa, Zahra Nabila Izdihar, Agung Bella Putra Utama, Leonel Hernandez, Haviluddin","doi":"10.1109/ICAIIC51459.2021.9415197","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415197","url":null,"abstract":"Electronic journal (e-journal) management comprises several aspects, specifically pageviews, sessions, visitors, and new visitors. Sessions or the number of unique visitors from a journal page is an essential indicator of a journal's outcome. Therefore, it is necessary to forecast the number of unique visitors to determine the strategy for developing a journal. Thus, it is expected to be able to accelerate the journal accreditation system in the future. In this study, this paper predicts the number of unique visitors to the journal by developing a time series forecasting model. Forecasting was done by applying the Backpropagation. The method has the advantage of being able to adapt to changes that occur in the input and output values. There are three time series data input models for this research, specifically three days, seven days and 14 days. The accuracy of forecasting results was measured using the MAPE evaluation of several forecasting models and BPNN architecture. The results show that the best forecasting is using forecasting model 1 and architecture 2-5-1 with an accuracy value of 69.9%. Thus, the performance of the Neural Network in this study is relatively good.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124685554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Design of Learning based Human Positioning Algorithm using Images","authors":"Tae-Wan Kim, Dong Myung Lee","doi":"10.1109/ICAIIC51459.2021.9415237","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415237","url":null,"abstract":"In this paper, a learning based human positioning algorithm using image was proposed to overcome the disadvantages of fingerprint map-based localization on hardware devices, and the human positioning accuracy was also verified through an experiment. The core parts of proposed algorithm are the learning phase of human positioning map (HPM) and human positioning phase. As a result of the experiment, the human recognition accuracy of proposed algorithm showed a high recognition accuracy of over 99.74% when a person moves between Om and 6m.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Morshed Alam, Md. Faisal Ahmed, I. Jahan, Y. Jang
{"title":"Optimal Energy Management Strategy for ESS with Day Ahead Energy Prediction","authors":"Md. Morshed Alam, Md. Faisal Ahmed, I. Jahan, Y. Jang","doi":"10.1109/ICAIIC51459.2021.9415283","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415283","url":null,"abstract":"Incorporating with Hybrid Energy Storage System (HESS) with PV farm to establish PV-Storage integrated generation system is a promising solution to develop power quality of renewable energy. The prediction of very short-term generation and active demand response and dynamic state of charge (SOC) based optimum scheduling of HESS are the key points affecting system reliability and effectiveness of PV power. This paper proposes a short-term prediction and optimal scheduling-based energy management algorithm to coordinate among PV generation, HESS, and active demand response. The proposed algorithm composes of dynamic SOC, predicted PV-generation and power consumption, and real-time state of charge of the ESS. Firstly, based on long short-term memory (LSTM) algorithm, the historic data of PV power output is applied to develop the model to achieve good accuracy. Then, the output from the model are derived from the control algorithm to optimize the power flow in the system. The simulation results exhibit the effectiveness and robustness of the proposal.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122009892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Measurement and Detection in LAN Using Protocol-Wise Associative Memory","authors":"Yuwei Sun, H. Ochiai, H. Esaki","doi":"10.1109/ICAIIC51459.2021.9415195","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415195","url":null,"abstract":"Nowadays, more and more devices are connected to the Internet, with enormous information transmitted on it. Malware spread through a local area network (LAN) can infect lots of internal users. A network intrusion detection system aims to safeguard a network from these malicious attacks. We proposed an efficient and adaptive intrusion measurement and detection approach based on protocol-wise associative memory of Hopfield networks, where the network traffic features related to several protocols including ARP, TCP, and UDP were stored. By evolving the neural network’s energy state, we reconstructed a stored feature pattern from the input of novel network traffic. We evaluated the scheme using the recall and the divergence rate. At last, we achieved an average validation recall score of 0.9591 for detecting various malicious network events.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on the selection of future AI+X promising fields and the direction to strengthen competitiveness","authors":"Jee-Sun Oh, Moon-Koo Kim, D. Lee","doi":"10.1109/ICAIIC51459.2021.9415181","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415181","url":null,"abstract":"the rapid development of artificial intelligence technology has an important impact across many industries and societies. AI is useful in a variety of industries such as machine translation, medical image analysis, and healthcare fields such as telemedicine, manufacturing and services, transportation, and energy. On the other hand, negative impacts such as job and labor substitution, human alienation, potential security threats, and malicious use of artificial intelligence technology are also predicted. The field where the possibility of rapid application of AI technology is possible was the highest in the medical field with 42.5%. In addition, in terms of the usability of AI technology, performance creation, and Korea's competitiveness, the medical field was the highest. The service sector ranked second in applicability, usability, performance creation, and competitiveness. The transportation sector ranked third in applicability, usability, performance creation, and competitiveness. The first factor necessary to create future AI+X domestic competitiveness is the improvement of laws and systems. The second is to establish a code of ethics and the third is to strengthen regulations. Others include reinforcing utilization in society, building infrastructure, global cooperation, fostering venture companies, and expanding technology investment.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116563036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hideki Yamamoto, N. Kondo, Tetsu Joh, T. Warabino, Yusuke Suzuki, Genichi Mori, M. Jibiki
{"title":"Design and implementation of a reference model between services and AI-assisted network","authors":"Hideki Yamamoto, N. Kondo, Tetsu Joh, T. Warabino, Yusuke Suzuki, Genichi Mori, M. Jibiki","doi":"10.1109/ICAIIC51459.2021.9415274","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415274","url":null,"abstract":"Several AI-assisted network researches were done from the network service providers point of view. However the reference model between service providers and network providers were not discussed. Therefore service providers did not use the merit of AI-assisted network. In this article, we described design and implementation of the reference model between AI-assisted network and services. In order to verify the effectiveness of this reference model, we implemented experimental AI-assisted network and content delivery network (CDN). In the experiment, we verified the effectiveness of the proposed reference model. Base on the result of this research, the standardization of the reference model is under study in ITU-T.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125978139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DNN based WiFi positioning in 3GPP indoor office environment","authors":"S. Oh, J. Kim","doi":"10.1109/ICAIIC51459.2021.9415207","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415207","url":null,"abstract":"As the development of the 4th industry begins, LBS(Location Based Service) technology is drawing attention. AI(Artificial Intelligence), IoT(Internet of Things), and Big Data, which are major technologies of the 4th industry, can be effectively applied to these LBS technologies. In addition, in order to provide LBS technology to users in an indoor environment, the positioning results must be provided in real time. Therefore, in this paper, we propose a scheme for providing real-time user positioning results based on AI technology. The proposed scheme is based on Wi-Fi(Wireless Fidelity) communication, and applies DNN(Deep Neural Network), one of the AI technologies, for location positioning in the indoor office environment proposed by 3GPP(The 3rd Generation Partnership Project). In order to perform the user’s location positioning, the DNN model learns the RSSI(Received Signal Strength Indicator) value of a specific location collected in the offline step and the corresponding location with one label. After that, in the online step, the location of the actual user is estimated based on the learned model. It can be seen that the proposed scheme achieves higher performance than the existing scheme in terms of processing time for performing positioning through simulation. This can be considered in order for the scheme to achieve real-time location positioning later.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128151790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuta Kumagai, Naoya Gonda, Yukiko Shimbo, Hirofumi Suganuma, F. Maehara
{"title":"Deep Learning Based Hybrid Multiple Access Consisting of SCMA and OFDMA Using User Position Information","authors":"Yuta Kumagai, Naoya Gonda, Yukiko Shimbo, Hirofumi Suganuma, F. Maehara","doi":"10.1109/ICAIIC51459.2021.9415180","DOIUrl":"https://doi.org/10.1109/ICAIIC51459.2021.9415180","url":null,"abstract":"This paper proposes a deep-learning-based uplink hybrid multiple access scheme consisting of both sparse code multiple access (SCMA) and orthogonal frequency-division multiple access (OFDMA). SCMA improves the system throughput when the carrier-to-noise ratio (CNR) is high. However, SCMA performance is significantly degraded, compared to OFDMA, when the CNR is low. To overcome this problem, the proposed scheme introduces a combination of SCMA and OFDMA as a novel multiple access pattern. The scheme determines the appropriate pattern among SCMA-only, OFDMA-only, or their combination, by utilizing user position information through deep learning. The effectiveness of the proposed scheme is demonstrated in terms of system throughput under different user distributions via computer simulations.","PeriodicalId":432977,"journal":{"name":"2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131390620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}