2021 International Conference on Information Networking (ICOIN)最新文献

筛选
英文 中文
Dog Noseprint Identification Algorithm 狗鼻印识别算法
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333973
Sungmin Cho, Jinwook Paeng, Taehong Kim, Chanil Kim, Ji Soo Kim, Hyeseong Kim, Junseok Kwon
{"title":"Dog Noseprint Identification Algorithm","authors":"Sungmin Cho, Jinwook Paeng, Taehong Kim, Chanil Kim, Ji Soo Kim, Hyeseong Kim, Junseok Kwon","doi":"10.1109/ICOIN50884.2021.9333973","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333973","url":null,"abstract":"This paper proposes a dog noseprint identification system based on Gabor filter and feature matching. Given images of dog noseprints, the system determines the region of interest, pre-processes the images using adaptive thresholding, extracts features, and performs feature matching to identify dogs. To extract features, we first apply the Gabor filter with 60 directions to images. Then we employ the scale invariant feature transform (SIFT) feature extractor to obtain keypoints that are invariant to image rotation and scaling. The extracted keypoints are compared with reference key-points of a dog noseprint that needs to be identified. To improve the matching accuracy, we present several matching algorithms. Experiments show that the SIFT based identification system method surpasses other methods in terms of accuracy, while the ORB based on system outperforms other methods in terms of speed.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"17 1","pages":"798-800"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77741586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Performance and Privacy via Resolver-Less DNS 通过无解析器的DNS增强性能和隐私
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334030
Tobias Mueller, Erik Sy
{"title":"Enhanced Performance and Privacy via Resolver-Less DNS","authors":"Tobias Mueller, Erik Sy","doi":"10.1109/ICOIN50884.2021.9334030","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334030","url":null,"abstract":"The domain name resolution into IP addresses can significantly delay connection establishments on the web. Moreover, the common use of recursive DNS resolvers presents a privacy risk as they can closely monitor the user’s browsing activities. In this paper, we present a novel HTTP response header allowing web server to provide their clients with relevant DNS records. Our results indicate, that this resolver-less DNS mechanism allows user agents to save the DNS lookup time for subsequent connection establishments. We find, that this proposal saves at least 80 ms per DNS lookup for the one percent of users having the longest round-trip times towards their recursive resolver. Furthermore, our proposal decreases the number of DNS lookups and thus improves the privacy posture of the user towards the used recursive resolver. Comparing the security guarantees of the traditional DNS to our proposal, we find that resolver-less DNS achieves at least the same security properties. In detail, it even improves the user’s resilience against censorship through tampered DNS resolvers.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"127 1","pages":"243-248"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83238284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learned Image Compression with Frequency Domain Loss 学习图像压缩与频域损失
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333956
Soonbin Lee, Jong-Beom Jeong, I. Kim, Eun‐Seok Ryu
{"title":"Learned Image Compression with Frequency Domain Loss","authors":"Soonbin Lee, Jong-Beom Jeong, I. Kim, Eun‐Seok Ryu","doi":"10.1109/ICOIN50884.2021.9333956","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333956","url":null,"abstract":"This paper proposes an end-to-end deep image compression model with a frequency domain loss function. Unlike previous deep image compression methods, the model is computed jointly in the frequency domain. By calculating in the frequency domain, the model incorporates high-frequency components to capture detailed information in the reconstructed images effectively. The process of frequency domain relates to the compression technologies, a concept universal to modern im- age/video codecs (e.g., JPEG), but it has seldom been investigated in a deep image compression model based on neural networks. It was demonstrated that this model shows better image compression performance when measuring visual quality using the peak signal-to-noise ratio, and its rate-distortion performance outperformed traditional neural-network-based models when the model was trained jointly in the frequency domain. This model improves the performance of image compression, especially when the bitrate was low. Moreover, the method can be used and applicable to other compression models easily.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"13 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84053803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Revisiting Bluetooth Adaptive Frequency Hopping Prediction with a Ubertooth 用Ubertooth重新研究蓝牙自适应跳频预测
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333996
Janggoon Lee, Chanhee Park, Heejun Roh
{"title":"Revisiting Bluetooth Adaptive Frequency Hopping Prediction with a Ubertooth","authors":"Janggoon Lee, Chanhee Park, Heejun Roh","doi":"10.1109/ICOIN50884.2021.9333996","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333996","url":null,"abstract":"Due to frequency hopping nature of Bluetooth, sniffing Bluetooth traffic with low-cost devices is a challenging problem. To this end, a state-of-the-art low-cost sniffing system employing two cheap Ubertooth devices [1], proposes machine learning-based prediction technique for adaptive frequency hopping (AFH) map by collecting packet statistics and spectrum sensing. In this paper, we revisit the AFH prediction problem. Our intention of this approach is that proposing better way to label data set to train Support Vector Machine (SVM) that could be done without measuring packet rates by visiting all 79 channels. We build a prototype of AFH prediction technique with a Ubertooth and a SVM. Our result shows that high accuracy can be achieved without the packet-based classifier of BlueEar.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"26 1","pages":"715-717"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82445782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multimedia Contents Retrieval based on 12-Mood Vector 基于12-情绪向量的多媒体内容检索
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334010
C. Moon, Jong Yeol Lee, Dong-Seong Kim, Byeong-Man Kim
{"title":"Multimedia Contents Retrieval based on 12-Mood Vector","authors":"C. Moon, Jong Yeol Lee, Dong-Seong Kim, Byeong-Man Kim","doi":"10.1109/ICOIN50884.2021.9334010","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334010","url":null,"abstract":"The preferences of Web information purchasers are changing. Cost-effectiveness is becoming less regarded than costsatisfaction, which emphasizes the purchaser’s psychological satisfaction. In applications of SNS(Social Network Services) based on folksonomy, a method to improve a user’s cost-satisfaction in multimedia content retrieval is to use the mood inherent in multimedia items but applications of SNS encounter problems due to synonyms. In our previous study, some problems of synonyms could be solved by using internal tags consisted of arousal and valence (AV) in Thayer’s Two-dimensional Model. However, in recall level 0.1, the retrieval performance of the previous study was less than a keyword-based method. In this paper, for improving the retrieval performance of recall level 0.1, a new method using 12 moods vector is proposed, and the proposed method shows good retrieval performance than the previous method and the keyword-based method.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"842-844"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72921247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network Stealing via Meltdown 通过Meltdown窃取神经网络
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333926
Hoyong Jeong, Dohyun Ryu, Junbeom Hur
{"title":"Neural Network Stealing via Meltdown","authors":"Hoyong Jeong, Dohyun Ryu, Junbeom Hur","doi":"10.1109/ICOIN50884.2021.9333926","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333926","url":null,"abstract":"Deep learning services are now deployed in various fields on top of cloud infrastructures. In such cloud environment, virtualization technology provides logically independent and isolated computing space for each tenant. However, recent studies demonstrate that by leveraging vulnerabilities of virtualization techniques and shared processor architectures in the cloud system, various side-channels can be established between cloud tenants. In this paper, we propose a novel attack scenario that can steal internal information of deep learning models by exploiting the Meltdown vulnerability in a multitenant system environment. On the basis of our experiment, the proposed attack method could extract internal information of a TensorFlow deep learning service with 92.875% accuracy and 1.325kB/s extraction speed.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"114 1","pages":"36-38"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76472516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Lightweight messaging protocol for precision agriculture 用于精准农业的轻量级消息传递协议
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333986
Eng-Kee Tan, Yung-Wey Chong, R. A. Setyawan, M. Niswar, K. Mya
{"title":"Lightweight messaging protocol for precision agriculture","authors":"Eng-Kee Tan, Yung-Wey Chong, R. A. Setyawan, M. Niswar, K. Mya","doi":"10.1109/ICOIN50884.2021.9333986","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333986","url":null,"abstract":"The deployment of precision agriculture is inevitable due to the scarcity of arable land. Many countries such as Japan, Singapore and Taiwan have deploy sensor networks and actuators to monitor growth of the crops and the surroundings to activate smart fertigation and irrigation system. Nevertheless, the choice of suitable messaging protocol is challenging due to the nature of precision agriculture system. For an efficient and effective solution, the precision agriculture system cannot rely on a single protocol because it need to work across several devices such as sensors, cameras, drones, robotics etc. In this paper, a lightweight messaging middleware (LMM) for precision agriculture is proposed. The purpose of the middleware is to facilitate the different devices that is used in rich sensing precision agriculture application. The modular approach of LMM can help to support the deployment of precision agriculture.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"31 1","pages":"403-407"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78088573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pico-eNB Tx Power Optimization for Multiband HetNets with MCS Incorporating 1024-QAM 基于集成1024-QAM的MCS的多频段HetNets的Pico-eNB Tx功率优化
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333900
A. Yoneyama, Fumiya Kemmochi, H. Otsuka
{"title":"Pico-eNB Tx Power Optimization for Multiband HetNets with MCS Incorporating 1024-QAM","authors":"A. Yoneyama, Fumiya Kemmochi, H. Otsuka","doi":"10.1109/ICOIN50884.2021.9333900","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333900","url":null,"abstract":"The use of high carrier frequencies having wide bandwidth is expected to achieve high data rates in fifth-generation mobile systems and beyond. In heterogeneous networks (HetNets) that combine with macrocells and picocells in the same coverage area, picocells operating with high carrier frequencies are typically overlaid on macrocells using low carrier frequencies. A key technology for increasing data rates includes higher-order modulations such as the 256- and 1024-quadrature amplitude modulation (QAM). In this research, using a modulation and coding scheme (MCS) that incorporates 256- and 1024-QAM, we investigate the optimal transmission (Tx) power of a pico-evolved node B (eNB) for multiband HetNets combined with a macro-eNB using a carrier frequency of 2 GHz and pico-eNB having a wider signal bandwidth using 4.5 GHz. Under the assumption that the signal bandwidth of the pico-eNB is 10 times wider than that of the macro-eNB, we clarify the average and 5-percentile user throughput as a function of Tx power of the pico-eNB using system-level computer simulations. Based on these results, we confirm that the Tx power of the pico-eNB of 37 dBm can provide the best performance when the Tx antenna height is 10 m and the number of pico-eNB is four per macro-sector. Furthermore, it is shown that the use rate of both 256- and 1024-QAM in the downlink MCS reaches 11% when the Tx power is 37 dBm. This study will provide a remarkably effective solution for deciding the optimal Tx power of pico-eNB in multiband HetNets.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"14 1","pages":"353-357"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75209436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Design of Power Control and SIC Decoding Order for Max-Min Fairness optimization in Uplink NOMA Systems 上行NOMA系统中最大最小公平性优化的功率控制和SIC译码顺序联合设计
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333915
Jongmin Kim, Junbeom Kim, Seok-Hwan Park
{"title":"Joint Design of Power Control and SIC Decoding Order for Max-Min Fairness optimization in Uplink NOMA Systems","authors":"Jongmin Kim, Junbeom Kim, Seok-Hwan Park","doi":"10.1109/ICOIN50884.2021.9333915","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333915","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is an effective technique to improve spectral efficiency and connectivity level of multi-user systems by means of successive interference cancellation (SIC) decoding. However, the optimization of NOMA scheme for uplink systems has not been well addressed in the literature. This work tackles the joint design of the users’ transmit power levels and the SIC decoding order at the BS for a multi-user uplink system. Since it is difficult to find the optimal solution, an iterative algorithm is proposed that alternately optimizes transmit powers and SIC decoding order until convergence is reached. The optimization of transmit powers is addressed by adopting the majorization minimization (MM) approach. The SIC decoding order is designed by evaluating per-user mean squared error (MSE) at each SIC decoding step. Numerical results are presented to identify the configurations in which the proposed design achieves relevant gains.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"71 1","pages":"339-342"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77588970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Investigating Cybersecurity News Articles by Applying Topic Modeling Method 应用主题建模方法研究网络安全新闻文章
2021 International Conference on Information Networking (ICOIN) Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333952
Piyush Ghasiya, K. Okamura
{"title":"Investigating Cybersecurity News Articles by Applying Topic Modeling Method","authors":"Piyush Ghasiya, K. Okamura","doi":"10.1109/ICOIN50884.2021.9333952","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333952","url":null,"abstract":"Machine Learning (ML) and specifically Natural Language Processing (NLP) are increasingly used as tools in the cybersecurity world. These NLP tools bring new capabilities that support both defenders and attackers in their activities, whether it is risk scenarios such as events and threats or security operations. Ours is a unique case study as we are investigating cybersecurity news on a national and global level. This large study covered six countries and 18 major newspapers and analyzed thousands of cybersecurity articles using the Nonnegative Matrix Factorization (NMF) topic modeling method. News making and policymaking complement each other in forming national identities. This research aims to provide the foundation for the field of Cybersecurity in this direction. Our results showed the US dominance and its significance for other countries. This research also highlighted that much of the US media’s cybersecurity reporting focuses on domestic issues, unlike other nations.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"432-438"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78975670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信