{"title":"Mobile-based continuous user authentication system for cloud security","authors":"Qing Li, Le Wang, Taeguen Kim, E. Im","doi":"10.1109/ICNIDC.2016.7974559","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974559","url":null,"abstract":"Recently, Cloud based services have become very popular, and many people are willing to use cloud services because of their convenience. For instance, people would like to store their files in the cloud storage, and the files may contain important data or private information. If important files are accessed by unauthorized users due to unsecure cloud services, it may cause financial losses and people may be unwilling to use cloud services. Consequently, how to increase security of cloud services is quite important for the services to be successful and used widely. In addition, mobile devices have become more and more popular, and one of the main accessing devices to cloud services is mobile devices. In this paper, we propose a mobile-based continuous user authentication system to protect cloud service users.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125294445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ye Li, Xiaofeng Ma, Jingsai Jiang, P. Zhang, Yanhong Fan, Qiuyun Hao, H. V. Davyday
{"title":"A generation method for acoustic two-dimensional barcode","authors":"Ye Li, Xiaofeng Ma, Jingsai Jiang, P. Zhang, Yanhong Fan, Qiuyun Hao, H. V. Davyday","doi":"10.1109/ICNIDC.2016.7974585","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974585","url":null,"abstract":"With rapid development of information technology and upgrading of intelligent terminals, two-dimensional barcode has been widely used as a carrier to store, transfer and retrieve information. Due to the limited capacity, current two-dimensional barcodes are designed to embed text-only messages. In this paper, a generation method for acoustic two-dimensional barcode is proposed. It is based on speech compression, in which low encoding rate is obtained while maintaining high voice quality by introducing MELP compression method. The compressed data stream is then embedded to generate the two-dimensional barcode. In practical applications, the acoustic two-dimensional barcode can be easily scanned by the intelligent terminals installed with decoding software, and then the embedded speech can be decoded and played. When compression rate is equal to 600bps, the embedded speech length can up to 39s. Thus, the application of two-dimensional barcode can be effectively promoted.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference alignment in cognitive network with cooperative primary users","authors":"Jiazhen Li, Li Guo, Chao Dong, Tianyu Kang","doi":"10.1109/ICNIDC.2016.7974574","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974574","url":null,"abstract":"This paper considers a network consists of multiple primary users (PUs) and secondary users (SUs). To seek for the pre- and post-coding matrices of the PUs and SUs that improve the system output, the author applies Max-SINR algorithm for the PUs and cognitive interference alignment (IA) for the SUs. Then by counting the number of variables and the number of equations in the IA condition, this paper analyzes the achievable DoF of all users. Simulation results show that the PUs using max-SINR achieve higher rate than using standard IA with negligible SUs rate reduction.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130418143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind estimation of reverberation time using deep neural network","authors":"Myungin Lee, Joon‐Hyuk Chang","doi":"10.1109/ICNIDC.2016.7974586","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974586","url":null,"abstract":"In this paper, we propose a method to estimate reverberation time (T60) from the observed reverberant speech signal using deep neural network (DNN). Reverberation of speech signal is a critical issue in speech processing as the reverberation results smearing of the sound characteristics in both temporal and spectral domain resulting unfavorable effects on the performance of speech processing algorithms. Employing room acoustic characteristics of a reverberant speech can enhance the performance of the speech processing system so that the blind estimation of reverberation time has been studied based on the numerical interpretation of reverberation. In this paper, we adopt the speech decay rate and its distribution for each frequency bin as input feature vectors of DNN. Complex relation between each input feature vector and each T60 target label through multiple nonlinear hidden layers. We also introduce an approach to mitigate the computational complexity whilst maintaining rational performance.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A defense mechanism against the DNS amplification attack in SDN","authors":"X. Xing, Tao Luo, Jianfeng Li, Yang Hu","doi":"10.1109/ICNIDC.2016.7974530","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974530","url":null,"abstract":"As one of the most harmful DDoS (distributed deny of service) attacks, the DNS (domain name system) amplification attack has been a big threat to nowadays networks. Researchers have done much work to defend against this kind of attack in traditional networks. The SDN (software defined network) architecture, as a clear indication of future networking architecture, faces the same threat of DNS amplification attack. In this paper, we propose a defense mechanism consisting of three phases. The defense mechanism can easily detect the attacks, protect the victim quickly, then pinpoint all zombies and finally isolate them from the SDN network. Simulation results show that the proposed mechanism detects attacks accurately with low consumption, protects victim with quick response and has little impact on normal DNS queries of victim. Besides, after pinpointing and isolating all zombies in the network, the whole network's recovery speed is increased.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shopping store management system based on IR-UWB radar sensors","authors":"Xuanjun Quan, D. Yim, S. Cho","doi":"10.1109/ICNIDC.2016.7974621","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974621","url":null,"abstract":"The impulse radio ultra-wideband (IR-UWB) radar technology is attracted strong attention for various applications such as crowdedness measurement, building energy management system, vital sign monitoring, and counting the number of inbound and outbound people. In this paper, we propose a shopping store management system based on IR-UWB radar sensors. In order to manage a shopping store, checking the number of entered customers and sweet spot of a store is necessary. Here, sweet spot means the average residence time of customers in one hour. To get these two information, two applications of IR-UWB radar sensor are required. One is counting the number of inbound and outbound people, and the other one is crowdedness measurement. To validate this system, we install this system in a real shopping store. The performance of the shopping store management system is given in this paper, and the results show that our system is applicable.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126501744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning mention and relation representation with convolutional neural networks for relation extraction","authors":"Shuohong Liang, Guang Chen, Wei Wang","doi":"10.1109/ICNIDC.2016.7974612","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974612","url":null,"abstract":"Most previous works for relation extraction are based on handcrafting sentence-level features such as part of speech, named entity and dependency tree path properties. This paper proposes a new approach to learn the embedding of the mentions and their relations using convolutional neural networks with a pairwise ranking loss function. Through the learned mention and relation embeddings we can get a score to evaluate the relevance of a given pair of mention and relation. We show that our approach using word embeddings as input features for our model can learn better mention and relation representation and is superior to state-of-the-art results.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127170591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity analysis and comparison for cellular systems over different frequency bands","authors":"Zhan Xu, Jienan Liu, Wei Zhang, Shidong Zhou, Weuqi Waug","doi":"10.1109/ICNIDC.2016.7974551","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974551","url":null,"abstract":"Operating frequency bands of the third generation (3G) cellular system and the long-term evolution (LTE) are usually below 3GHz. However, due to the limitation on bandwidth available below 3GHz, the throughput or capacity of 3G and LTE systems cannot be increased easily. This research investigated the feasibility of the application of a wider spectrum in the higher frequency band, such as 6–15GHz band to provide higher capacity for future mobile access. We studied the cumulative distribution of user throughput in cellular communication systems over different frequency bands. In order to evaluate the cellular capacity over different frequency bands, we set up a general cellular simulation model with configurable parameters such as cellular size, user density and frequency reuse factor. We analyzed the capacity of higher frequency communication according to the WINNER II model. The simulation results show that for given transmission environments, higher frequency bands can achieve better system capacity performance.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115359271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Movement analysis during sleep using an IR-UWB radar sensor","authors":"Jae Min Lee, J. Choi, S. Cho","doi":"10.1109/ICNIDC.2016.7974622","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974622","url":null,"abstract":"An IR-UWB radar sensor could be used to monitor vital signs such as breathing, heartbeat rate, and movement during sleep with non-contact method. In most sleep monitoring system, heartbeat rate and respiration are mostly analyzed. In this paper, we propose an algorithm for analyzing the human body movements during sleep using an IR-UWB radar sensor. To catch the detail movements, we minimized the transition time for calculating a movement index. The movements are categorized as four kinds based on the moving part of body. The four parts are arms, legs, head, and body. Each part is also divided as three grades based on the moving degree. To prove the performance of our algorithm, we tested in real-world during 1 night. The test result proved utility of the proposed algorithm.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121415160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative spectrum sensing for non-time-slotted full-duplex cognitive radio networks","authors":"Tianwei Hou, Xiaodong Ji, Zexu Li, Yong Li","doi":"10.1109/ICNIDC.2016.7974552","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974552","url":null,"abstract":"A new cooperative spectrum sensing method for non-time-slotted full duplex cognitive radio networks (FD-CRNs) is proposed in this paper, with the self-interference channel considered as Nakagami-m fading channel, which is more practical compared with commonly used Rayleigh and Rice channel. Closed-form expressions of the probabilities of false alarm and detection are provided in this paper for non-time-slotted FD-CRNs case. Furthermore, a novel cooperative scheme is also proposed, and compared with traditional OR fusion rule, our cooperative scheme improves the throughput of secondary (unlicensed) user (SU) without affecting the throughput of the primary (licensed) user (PU), when the signal-to-noise ratio (SNR) of the SU is in a reasonable range. Numerical and simulation results demonstrate the advantage of our proposed scheme.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122021640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}