International Journal of Cooperative Information Systems最新文献

筛选
英文 中文
ACSICS: Joint Distribution Mode Integrating Agricultural Industry Chain Logistics Under the Background of Artificial Intelligence ACSICS:人工智能背景下整合农业产业链物流的联合配送模式
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500096
Hao Liu
{"title":"ACSICS: Joint Distribution Mode Integrating Agricultural Industry Chain Logistics Under the Background of Artificial Intelligence","authors":"Hao Liu","doi":"10.1142/s0218843024500096","DOIUrl":"https://doi.org/10.1142/s0218843024500096","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139526105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMRCDS: AI-Assisted Enhanced Composite Metric-Based Intrusion Detection System for Secured Cyber Internet Security for Next-Generation Wireless Networks IMRCDS:人工智能辅助增强型基于综合指标的入侵检测系统,确保下一代无线网络的网络安全
IF 1.5 4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2024-01-18 DOI: 10.1142/s0218843024500035
Amani K. Samha, Ghalib H. Alshammri, Sasidhar Attuluri, Preetam Suman, Arvind Yadav
{"title":"IMRCDS: AI-Assisted Enhanced Composite Metric-Based Intrusion Detection System for Secured Cyber Internet Security for Next-Generation Wireless Networks","authors":"Amani K. Samha, Ghalib H. Alshammri, Sasidhar Attuluri, Preetam Suman, Arvind Yadav","doi":"10.1142/s0218843024500035","DOIUrl":"https://doi.org/10.1142/s0218843024500035","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Author Index Volume 32 (2023) 作者索引第32卷(2023)
4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2023-10-23 DOI: 10.1142/s0218843023990010
{"title":"Author Index Volume 32 (2023)","authors":"","doi":"10.1142/s0218843023990010","DOIUrl":"https://doi.org/10.1142/s0218843023990010","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135459865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDOS Attacks Detection with Half Autoencoder-Stacked Deep Neural Network 基于半自编码器堆叠深度神经网络的DDOS攻击检测
4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2023-10-10 DOI: 10.1142/s0218843023500259
Emna Benmohamed, Adel Thaljaoui, Salim El Khediri, Suliman Aladhadh, Mansor Alohali
{"title":"DDOS Attacks Detection with Half Autoencoder-Stacked Deep Neural Network","authors":"Emna Benmohamed, Adel Thaljaoui, Salim El Khediri, Suliman Aladhadh, Mansor Alohali","doi":"10.1142/s0218843023500259","DOIUrl":"https://doi.org/10.1142/s0218843023500259","url":null,"abstract":"With the growth in services supplied over the internet, network infrastructure has become more exposed to cyber-attacks, particularly Distributed Denial of Service (DDoS) attacks, which can easily cause the disruption of services. The key factor for fighting against these attacks is the earlier separation and detection of the traffic in networks. In this paper, a novel approach, named Half Autoencoder-Stacked DNNs (HAE-SDNN) model, is proposed. We suggest using a Stacked Deep Neural Networks (SDNN) model. as a deep learning model, in order to detect DDoS attacks. Our approach allows feature selection from a preprocessed dataset using a Half AutoEncoder (HAE), resulting in a final set of important features. These features are subsequently used to train the DNNs that are stacked together by applying Softmax layer to combine their outputs. Experiments were performed on a benchmark cybersecurity dataset, named CICDDoS2017, containing various DDoS attack types. The experimental results demonstrate that the introduced model attained an overall accuracy rate of 99.95%. Moreover, the HAE-SDNN model outperformed existing models, highlighting its superiority in accurately classifying attacks.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136254467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Banking Financial Frauds Using Hyper-Parameter Tuning of DL in Cloud Computing Environment 云计算环境下基于深度学习超参数调优的银行财务欺诈检测
4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2023-10-06 DOI: 10.1142/s0218843023500247
Kamal Upreti, Prashant Vats, Aravindan Srinivasan, K. V. Daya Sagar, R. Mahaveerakannan, G. Charles Babu
{"title":"Detection of Banking Financial Frauds Using Hyper-Parameter Tuning of DL in Cloud Computing Environment","authors":"Kamal Upreti, Prashant Vats, Aravindan Srinivasan, K. V. Daya Sagar, R. Mahaveerakannan, G. Charles Babu","doi":"10.1142/s0218843023500247","DOIUrl":"https://doi.org/10.1142/s0218843023500247","url":null,"abstract":"When income, assets, sales, and profits are inflated while expenditures, debts, and losses are artificially lowered, the outcome is a set of fraudulent financial statements (FFS). Manual auditing and inspections are time-consuming, inefficient, and expensive options for spotting these false statements. Auditors will find great assistance from the use of intelligent methods in the analysis of several financial declarations. Now more than ever, victims of financial fraud are at risk since more and more individuals are using the Internet to conduct their financial transactions. And the frauds are getting more complex, evading the protections that banks have put in place. In this paper, we offer a new-fangled method for detecting fraud using NLP models: an ensemble model comprising Feedforward neural networks (FNNs) and Long Short-Term Memories (LSTMs). The Spotted Hyena Optimizer is a unique metaheuristic optimization technique used to choose weights and biases for LSTM (SHO). The proposed method takes inspiration from the law of gravity and is meant to mimic the group dynamics of spotted hyenas. Mathematical models and discussions of the three fundamental phases of SHO — searching for prey, encircling prey, and at-tacking prey — are presented. We build a model of the user’s spending habits and look for suspicious outliers to identify fraud. We do this by using the ensemble mechanism, which helps us predict and make the most of previous trades. Based on our analysis of real-world data, we can confidently say that our model provides superior performance compared to state-of-the-art approaches in a variety of settings, with respect to both precision and.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135302612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Data Generation Based on the Combination of Growing-Pruning GAN and Intelligent Parameter Optimization 基于生长-修剪GAN与智能参数优化相结合的数据生成研究
4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2023-09-29 DOI: 10.1142/s0218843023500235
Zeqing Xiao, Hui Ou
{"title":"Research on Data Generation Based on the Combination of Growing-Pruning GAN and Intelligent Parameter Optimization","authors":"Zeqing Xiao, Hui Ou","doi":"10.1142/s0218843023500235","DOIUrl":"https://doi.org/10.1142/s0218843023500235","url":null,"abstract":"The amount of voltage fault data collection is limited to signal acquisition instruments and simulation software. Generative adversarial networks (GAN) have been successfully applied to the data generation tasks. However, there is no theoretical basis for the selection of the network structure and parameters of generators and discriminators in these GANs. It is difficult to achieve the optimal selection basically by experience or repeated attempts, resulting in high cost and time-consuming deployment of GAN computing in practical applications. The existing methods of neural network optimization are mainly used to compress and accelerate the deep neural network in classification tasks. Due to different goals and training processes, they cannot be directly applied to the data generation task of GAN. In the three-generation scenario, the hidden layer filter nodes of the initial GAN generator and discriminator are growing firstly, then the GAN parameters after the structure adjustment are optimized by particle swarm optimization (PSO), and then the node sensitivity is analyzed. The nodes with small contribution to the output are pruned, and then the GAN parameters after the structure adjustment are optimized using PSO algorithm to obtain the GAN with optimal structure and parameters (GP-PSO-GAN). The results show that GP-PSO-GAN has good performance. For example, the simulation results of generating unidirectional fault data show that the generated error of GP-PSO-GAN is reduced by 70.4% and 15.2% compared with parameters optimization only based on PSO (PSO-GAN) and pruning- PSO-GAN (P-PSO-GAN), respectively. The convergence curve shows that GP-PSO-GAN has good convergence.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135132161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Financial Big Data Analysis Method Based on Collaborative Filtering Algorithm in Supply Chain Enterprises 基于协同过滤算法的金融大数据分析方法在供应链企业中的应用
4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2023-09-27 DOI: 10.1142/s0218843023500223
Tao Wang, Tianbang Song
{"title":"Application of Financial Big Data Analysis Method Based on Collaborative Filtering Algorithm in Supply Chain Enterprises","authors":"Tao Wang, Tianbang Song","doi":"10.1142/s0218843023500223","DOIUrl":"https://doi.org/10.1142/s0218843023500223","url":null,"abstract":"At present, the financial situation of China’s supply chain finance is still relatively unstable, and there are still some problems between supply chain enterprises and banks such as asymmetric information, insufficient model innovation and high operational risks. Based on this, this paper proposes and constructs a risk control model of financial big data analysis based on collaborative filtering algorithm. The purpose of this study is to realize the resource integration of supply chain enterprises and optimize the logistics chain, financial chain and information chain through the analysis of financial big data based on collaborative filtering algorithm, provide quality services for supply chain enterprises and good support for solving the financing problems of small and medium-sized enterprises. In order to verify the feasibility of the model, an experimental analysis is carried out. The experimental results show that this model has good scalability and operability, and the algorithm itself also has good scalability. The results of empirical analysis further verify that the design method in this paper has a good recommendation effect in terms of matching degree and user satisfaction. Compared with other risk control models, it is more practical and feasible. This research has certain practical significance for the financial management of supply chain enterprises.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135477161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Unsupervised Gradient-Based Approach for Real-Time Log Analysis From Distributed Systems 基于无监督梯度的分布式系统实时日志分析方法
4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2023-09-22 DOI: 10.1142/s0218843023500181
Minquan Wang, Siyang Lu, Sizhe Xiao, Dong Dong Wang, Xiang Wei, Ningning Han, Liqiang Wang
{"title":"An Unsupervised Gradient-Based Approach for Real-Time Log Analysis From Distributed Systems","authors":"Minquan Wang, Siyang Lu, Sizhe Xiao, Dong Dong Wang, Xiang Wei, Ningning Han, Liqiang Wang","doi":"10.1142/s0218843023500181","DOIUrl":"https://doi.org/10.1142/s0218843023500181","url":null,"abstract":"We consider the problem of real-time log anomaly detection for distributed system with deep neural networks by unsupervised learning. There are two challenges in this problem, including detection accuracy and analysis efficacy. To tackle these two challenges, we propose GLAD, a simple yet effective approach mining for anomalies in distributed systems. To ensure detection accuracy, we exploit the gradient features in a well-calibrated deep neural network and analyze anomalous pattern within log files. To improve the analysis efficacy, we further integrate one-class support vector machine (SVM) into anomalous analysis, which significantly reduces the cost of anomaly decision boundary delineation. This effective integration successfully solves both accuracy and efficacy in real-time log anomaly detection. Also, since anomalous analysis is based upon unsupervised learning, it significantly reduces the extra data labeling cost. We conduct a series of experiments to justify that GLAD has the best comprehensive performance balanced between accuracy and efficiency, which implies the advantage in tackling practical problems. The results also reveal that GLAD enables effective anomaly mining and consistently outperforms state-of-the-art methods on both recall and F1 scores.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136061922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Belief Network-Based User and Entity Behavior Analytics (UEBA) for Web Applications 基于深度信念网络的用户和实体行为分析(UEBA)
4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2023-09-20 DOI: 10.1142/s0218843023500168
S. Deepa, A. Umamageswari, S. Neelakandan, Hanumanthu Bhukya, I. V. Sai Lakshmi Haritha, Manjula Shanbhog
{"title":"Deep Belief Network-Based User and Entity Behavior Analytics (UEBA) for Web Applications","authors":"S. Deepa, A. Umamageswari, S. Neelakandan, Hanumanthu Bhukya, I. V. Sai Lakshmi Haritha, Manjula Shanbhog","doi":"10.1142/s0218843023500168","DOIUrl":"https://doi.org/10.1142/s0218843023500168","url":null,"abstract":"Machine learning (ML) is currently a crucial tool in the field of cyber security. Through the identification of patterns, the mapping of cybercrime in real time, and the execution of in-depth penetration tests, ML is able to counter cyber threats and strengthen security infrastructure. Security in any organization depends on monitoring and analyzing user actions and behaviors. Due to the fact that it frequently avoids security precautions and does not trigger any alerts or flags, it is much more challenging to detect than traditional malicious network activity. ML is an important and rapidly developing anomaly detection field in order to protect user security and privacy, a wide range of applications, including various social media platforms, have incorporated cutting-edge techniques to detect anomalies. A social network is a platform where various social groups can interact, express themselves, and share pertinent content. By spreading propaganda, unwelcome messages, false information, fake news, and rumours, as well as by posting harmful links, this social network also encourages deviant behavior. In this research, we introduce Deep Belief Network (DBN) with Triple DES, a hybrid approach to anomaly detection in unbalanced classification. The results show that the DBN-TDES model can typically detect anomalous user behaviors that other models in anomaly detection cannot.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136313246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Emotion Detection from Big Data Using Deep Learning Approach 基于深度学习方法的大数据人类情感检测
4区 计算机科学
International Journal of Cooperative Information Systems Pub Date : 2023-08-30 DOI: 10.1142/s0218843023500260
Mustafa Sabah Mustafa, Mustafa Qahtan Alsudani, Mustafa Musa Jaber, Mohammed Hasan Ali, Sura Khalil Abd, Mustafa Mohammed Jassim
{"title":"Human Emotion Detection from Big Data Using Deep Learning Approach","authors":"Mustafa Sabah Mustafa, Mustafa Qahtan Alsudani, Mustafa Musa Jaber, Mohammed Hasan Ali, Sura Khalil Abd, Mustafa Mohammed Jassim","doi":"10.1142/s0218843023500260","DOIUrl":"https://doi.org/10.1142/s0218843023500260","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136241211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信