Sungmin Cho, Jinwook Paeng, Taehong Kim, Chanil Kim, Ji Soo Kim, Hyeseong Kim, Junseok Kwon
{"title":"Dog Noseprint Identification Algorithm","authors":"Sungmin Cho, Jinwook Paeng, Taehong Kim, Chanil Kim, Ji Soo Kim, Hyeseong Kim, Junseok Kwon","doi":"10.1109/ICOIN50884.2021.9333973","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333973","url":null,"abstract":"This paper proposes a dog noseprint identification system based on Gabor filter and feature matching. Given images of dog noseprints, the system determines the region of interest, pre-processes the images using adaptive thresholding, extracts features, and performs feature matching to identify dogs. To extract features, we first apply the Gabor filter with 60 directions to images. Then we employ the scale invariant feature transform (SIFT) feature extractor to obtain keypoints that are invariant to image rotation and scaling. The extracted keypoints are compared with reference key-points of a dog noseprint that needs to be identified. To improve the matching accuracy, we present several matching algorithms. Experiments show that the SIFT based identification system method surpasses other methods in terms of accuracy, while the ORB based on system outperforms other methods in terms of speed.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"17 1","pages":"798-800"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77741586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Performance and Privacy via Resolver-Less DNS","authors":"Tobias Mueller, Erik Sy","doi":"10.1109/ICOIN50884.2021.9334030","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334030","url":null,"abstract":"The domain name resolution into IP addresses can significantly delay connection establishments on the web. Moreover, the common use of recursive DNS resolvers presents a privacy risk as they can closely monitor the user’s browsing activities. In this paper, we present a novel HTTP response header allowing web server to provide their clients with relevant DNS records. Our results indicate, that this resolver-less DNS mechanism allows user agents to save the DNS lookup time for subsequent connection establishments. We find, that this proposal saves at least 80 ms per DNS lookup for the one percent of users having the longest round-trip times towards their recursive resolver. Furthermore, our proposal decreases the number of DNS lookups and thus improves the privacy posture of the user towards the used recursive resolver. Comparing the security guarantees of the traditional DNS to our proposal, we find that resolver-less DNS achieves at least the same security properties. In detail, it even improves the user’s resilience against censorship through tampered DNS resolvers.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"127 1","pages":"243-248"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83238284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Soonbin Lee, Jong-Beom Jeong, I. Kim, Eun‐Seok Ryu
{"title":"Learned Image Compression with Frequency Domain Loss","authors":"Soonbin Lee, Jong-Beom Jeong, I. Kim, Eun‐Seok Ryu","doi":"10.1109/ICOIN50884.2021.9333956","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333956","url":null,"abstract":"This paper proposes an end-to-end deep image compression model with a frequency domain loss function. Unlike previous deep image compression methods, the model is computed jointly in the frequency domain. By calculating in the frequency domain, the model incorporates high-frequency components to capture detailed information in the reconstructed images effectively. The process of frequency domain relates to the compression technologies, a concept universal to modern im- age/video codecs (e.g., JPEG), but it has seldom been investigated in a deep image compression model based on neural networks. It was demonstrated that this model shows better image compression performance when measuring visual quality using the peak signal-to-noise ratio, and its rate-distortion performance outperformed traditional neural-network-based models when the model was trained jointly in the frequency domain. This model improves the performance of image compression, especially when the bitrate was low. Moreover, the method can be used and applicable to other compression models easily.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"13 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84053803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revisiting Bluetooth Adaptive Frequency Hopping Prediction with a Ubertooth","authors":"Janggoon Lee, Chanhee Park, Heejun Roh","doi":"10.1109/ICOIN50884.2021.9333996","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333996","url":null,"abstract":"Due to frequency hopping nature of Bluetooth, sniffing Bluetooth traffic with low-cost devices is a challenging problem. To this end, a state-of-the-art low-cost sniffing system employing two cheap Ubertooth devices [1], proposes machine learning-based prediction technique for adaptive frequency hopping (AFH) map by collecting packet statistics and spectrum sensing. In this paper, we revisit the AFH prediction problem. Our intention of this approach is that proposing better way to label data set to train Support Vector Machine (SVM) that could be done without measuring packet rates by visiting all 79 channels. We build a prototype of AFH prediction technique with a Ubertooth and a SVM. Our result shows that high accuracy can be achieved without the packet-based classifier of BlueEar.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"26 1","pages":"715-717"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82445782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Moon, Jong Yeol Lee, Dong-Seong Kim, Byeong-Man Kim
{"title":"Multimedia Contents Retrieval based on 12-Mood Vector","authors":"C. Moon, Jong Yeol Lee, Dong-Seong Kim, Byeong-Man Kim","doi":"10.1109/ICOIN50884.2021.9334010","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334010","url":null,"abstract":"The preferences of Web information purchasers are changing. Cost-effectiveness is becoming less regarded than costsatisfaction, which emphasizes the purchaser’s psychological satisfaction. In applications of SNS(Social Network Services) based on folksonomy, a method to improve a user’s cost-satisfaction in multimedia content retrieval is to use the mood inherent in multimedia items but applications of SNS encounter problems due to synonyms. In our previous study, some problems of synonyms could be solved by using internal tags consisted of arousal and valence (AV) in Thayer’s Two-dimensional Model. However, in recall level 0.1, the retrieval performance of the previous study was less than a keyword-based method. In this paper, for improving the retrieval performance of recall level 0.1, a new method using 12 moods vector is proposed, and the proposed method shows good retrieval performance than the previous method and the keyword-based method.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"842-844"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72921247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural Network Stealing via Meltdown","authors":"Hoyong Jeong, Dohyun Ryu, Junbeom Hur","doi":"10.1109/ICOIN50884.2021.9333926","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333926","url":null,"abstract":"Deep learning services are now deployed in various fields on top of cloud infrastructures. In such cloud environment, virtualization technology provides logically independent and isolated computing space for each tenant. However, recent studies demonstrate that by leveraging vulnerabilities of virtualization techniques and shared processor architectures in the cloud system, various side-channels can be established between cloud tenants. In this paper, we propose a novel attack scenario that can steal internal information of deep learning models by exploiting the Meltdown vulnerability in a multitenant system environment. On the basis of our experiment, the proposed attack method could extract internal information of a TensorFlow deep learning service with 92.875% accuracy and 1.325kB/s extraction speed.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"114 1","pages":"36-38"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76472516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eng-Kee Tan, Yung-Wey Chong, R. A. Setyawan, M. Niswar, K. Mya
{"title":"Lightweight messaging protocol for precision agriculture","authors":"Eng-Kee Tan, Yung-Wey Chong, R. A. Setyawan, M. Niswar, K. Mya","doi":"10.1109/ICOIN50884.2021.9333986","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333986","url":null,"abstract":"The deployment of precision agriculture is inevitable due to the scarcity of arable land. Many countries such as Japan, Singapore and Taiwan have deploy sensor networks and actuators to monitor growth of the crops and the surroundings to activate smart fertigation and irrigation system. Nevertheless, the choice of suitable messaging protocol is challenging due to the nature of precision agriculture system. For an efficient and effective solution, the precision agriculture system cannot rely on a single protocol because it need to work across several devices such as sensors, cameras, drones, robotics etc. In this paper, a lightweight messaging middleware (LMM) for precision agriculture is proposed. The purpose of the middleware is to facilitate the different devices that is used in rich sensing precision agriculture application. The modular approach of LMM can help to support the deployment of precision agriculture.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"31 1","pages":"403-407"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78088573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pico-eNB Tx Power Optimization for Multiband HetNets with MCS Incorporating 1024-QAM","authors":"A. Yoneyama, Fumiya Kemmochi, H. Otsuka","doi":"10.1109/ICOIN50884.2021.9333900","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333900","url":null,"abstract":"The use of high carrier frequencies having wide bandwidth is expected to achieve high data rates in fifth-generation mobile systems and beyond. In heterogeneous networks (HetNets) that combine with macrocells and picocells in the same coverage area, picocells operating with high carrier frequencies are typically overlaid on macrocells using low carrier frequencies. A key technology for increasing data rates includes higher-order modulations such as the 256- and 1024-quadrature amplitude modulation (QAM). In this research, using a modulation and coding scheme (MCS) that incorporates 256- and 1024-QAM, we investigate the optimal transmission (Tx) power of a pico-evolved node B (eNB) for multiband HetNets combined with a macro-eNB using a carrier frequency of 2 GHz and pico-eNB having a wider signal bandwidth using 4.5 GHz. Under the assumption that the signal bandwidth of the pico-eNB is 10 times wider than that of the macro-eNB, we clarify the average and 5-percentile user throughput as a function of Tx power of the pico-eNB using system-level computer simulations. Based on these results, we confirm that the Tx power of the pico-eNB of 37 dBm can provide the best performance when the Tx antenna height is 10 m and the number of pico-eNB is four per macro-sector. Furthermore, it is shown that the use rate of both 256- and 1024-QAM in the downlink MCS reaches 11% when the Tx power is 37 dBm. This study will provide a remarkably effective solution for deciding the optimal Tx power of pico-eNB in multiband HetNets.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"14 1","pages":"353-357"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75209436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Design of Power Control and SIC Decoding Order for Max-Min Fairness optimization in Uplink NOMA Systems","authors":"Jongmin Kim, Junbeom Kim, Seok-Hwan Park","doi":"10.1109/ICOIN50884.2021.9333915","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333915","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is an effective technique to improve spectral efficiency and connectivity level of multi-user systems by means of successive interference cancellation (SIC) decoding. However, the optimization of NOMA scheme for uplink systems has not been well addressed in the literature. This work tackles the joint design of the users’ transmit power levels and the SIC decoding order at the BS for a multi-user uplink system. Since it is difficult to find the optimal solution, an iterative algorithm is proposed that alternately optimizes transmit powers and SIC decoding order until convergence is reached. The optimization of transmit powers is addressed by adopting the majorization minimization (MM) approach. The SIC decoding order is designed by evaluating per-user mean squared error (MSE) at each SIC decoding step. Numerical results are presented to identify the configurations in which the proposed design achieves relevant gains.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"71 1","pages":"339-342"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77588970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating Cybersecurity News Articles by Applying Topic Modeling Method","authors":"Piyush Ghasiya, K. Okamura","doi":"10.1109/ICOIN50884.2021.9333952","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333952","url":null,"abstract":"Machine Learning (ML) and specifically Natural Language Processing (NLP) are increasingly used as tools in the cybersecurity world. These NLP tools bring new capabilities that support both defenders and attackers in their activities, whether it is risk scenarios such as events and threats or security operations. Ours is a unique case study as we are investigating cybersecurity news on a national and global level. This large study covered six countries and 18 major newspapers and analyzed thousands of cybersecurity articles using the Nonnegative Matrix Factorization (NMF) topic modeling method. News making and policymaking complement each other in forming national identities. This research aims to provide the foundation for the field of Cybersecurity in this direction. Our results showed the US dominance and its significance for other countries. This research also highlighted that much of the US media’s cybersecurity reporting focuses on domestic issues, unlike other nations.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"432-438"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78975670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}