DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...最新文献
Jossie Murcia Triviño, Sebastián Moreno Rodríguez, D. D. López, Félix Gómez Mármol
{"title":"C3-Sex: a Chatbot to Chase Cyber Perverts","authors":"Jossie Murcia Triviño, Sebastián Moreno Rodríguez, D. D. López, Félix Gómez Mármol","doi":"10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00024","DOIUrl":"https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00024","url":null,"abstract":"Amongst the myriad of applications of Natural Language Processing (NLP), assisting Law Enforcement Agencies (LEA) in chasing cyber criminals is one of the most recent and promising ones. The paper at hand proposes C^3-Sex, a smart chatbot to interact with suspects in order to profile their interest regarding a given topic. This solution is based on our Artificial Conversational Entity (ACE) that connects to different online chat services to start a conversation regarding a specific matter, in our case child pornography, as this is one sensitive sexual crime that requires special efforts and contributions to be tackled. The ACE was designed using generative and rule-based models in charge of generating the posts and replies constituting the conversation from the chatbot side. The proposed solution also includes a module to analyze the conversations performed by the chatbot and to classify the suspects into three different profiles (indifferent, interested and pervert) according to the responses that they provide in the conversation. Exhaustive experiments were conducted obtaining an initial amount of 320 suspect chats from Omegle, which after filtering were reduced to 35 useful chats, that were classified by C^3-Sex as 26 indifferent, 4 interested and 5 pervert individuals.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"6 1","pages":"50-57"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83708419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zheng Feng, Rajendra Rana Bhat, Xiaoyong Yuan, Daniel Freeman, Tezcan Baslanti, Azra Bihorac, Xiaolin Li
{"title":"Intelligent Perioperative System: Towards Real-time Big Data Analytics in Surgery Risk Assessment.","authors":"Zheng Feng, Rajendra Rana Bhat, Xiaoyong Yuan, Daniel Freeman, Tezcan Baslanti, Azra Bihorac, Xiaolin Li","doi":"10.1109/DASC-PICom-DataCom-CyberSciTec.2017.201","DOIUrl":"https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.201","url":null,"abstract":"<p><p>Surgery risk assessment is an effective tool for physicians to manage the treatment of patients, but most current research projects fall short in providing a comprehensive platform to evaluate the patients' surgery risk in terms of different complications. The recent evolution of big data analysis techniques makes it possible to develop a real-time platform to dynamically analyze the surgery risk from large-scale patients information. In this paper, we propose the Intelligent Perioperative System (IPS), a real-time system that assesses the risk of postoperative complications (PC) and dynamically interacts with physicians to improve the predictive results. In order to process large volume patients data in real-time, we design the system by integrating several big data computing and storage frameworks with the high through-output streaming data processing components. We also implement a system prototype along with the visualization results to show the feasibility of system design.</p>","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"2017 ","pages":"1254-1259"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.201","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"36539181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel UL power control scheme for a digital cellular repeater","authors":"Yung-Ting Lee, Chunn-Yenn Lin, Ming-Jhou Wang","doi":"10.1109/DESEC.2017.8073866","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073866","url":null,"abstract":"The ideal application scenario of a digital repeater is to let the repeater be operated as a transparent node in the radio access network, which means the repeater has to keep a linear gain all the time when it is forwarding data among base stations and handsets. For a handset in a cellular network, its UL transmitted power may be dramatically fluctuated by the closed loop power control to meet the required signal quality and to compensate the propagation loss due to wireless channel. When a repeater is serving the handset, it may not be able to keep a linear gain in dealing with such variant received signal strength and sometimes results in transmitting over-powered UL signal to desensitize base station reception and even to interfere the base station. In this paper, we propose a novel power control scheme, which is to adaptively adjust the maximum UL output power of a digital cellular repeater to cope with the problem mentioned above. Field test results are presented to show the effectiveness of the proposed scheme.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"23 1","pages":"471-472"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75546264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure group key distribution in constrained environments with IKEv2","authors":"N. Felde, T. Guggemos, T. Heider, D. Kranzlmüller","doi":"10.1109/DESEC.2017.8073823","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073823","url":null,"abstract":"Group communication is an important means for communication in todays interconnected world, where multiple endpoints need exchange of data in the most efficient and concurrently secure way. The resulting complexity represents a substantial challenge, especially in the constrained environments introduced through the Internet-of-Things and sensor networks. An in-depth analysis of existing work shows that the problem of secure key distribution within groups requires novel approaches. Instead of designing yet another (group) key distribution scheme, this paper offers a minimal client based on the well-known Group Internet-Key-Exchange protocol G-IKEv2. The evaluation of this first open client with real-life observations and corresponding measurements proves its applicability for secure group key distribution and will serve as the basis for implementing group and identity management.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"328 2","pages":"384-391"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72619678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High performance CAN/FlexRay gateway design for in-vehicle network","authors":"Trong-Yen Lee, Chia-Wei Kuo, I-An Lin","doi":"10.1109/DESEC.2017.8073848","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073848","url":null,"abstract":"A gateway in in-vehicle network (IVN) is an indispensable component as a conversion device between different communication protocols. Due to meet more complex network for IVN, how to improving the performance of gateway is more important. In this paper, a high efficient of CAN/FlexRay gateway using hardware/software (HW/SW) co-design method is proposed which is implemented with Xilinx FPGA system. The CAN controller and FlexRay controller are designed by SW and HW, respectively. The interface of HW and SW are used AXI-bus. The convert module is evaluated by a cost function. In addition, a transceiver PCB for connecting between the proposed gateway and external CAN/FlexRay-based ECUs is implemented. Experimental results show that the proposed gateway system can reduce at most 94.7% on execution time with related works which is more suited for IVN.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"29 1","pages":"240-242"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84303142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A practical and effective approach to implementing High Availability Seamless Redundancy (HSR)","authors":"James T. Yu","doi":"10.1109/DESEC.2017.8073824","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073824","url":null,"abstract":"High availability Ethernets are being used for many industrial automation applications, and the adoption of High Availability Seamless Redundancy (HSR) is gaining strong interests from both the industry and academics as it is able to achieve zero recovery time. This paper presents a simple, practical, and effective implementation of HSR based on Add-Drop-Multiplexer (ADM). A major contribution of the paper is to use polling, instead of the legacy MAC learning process, to build the MAC forwarding table on RedBox and QuadBox. Through our simulation model, we demonstrate the effectiveness of this approach to (1) avoid loops of broadcast messages, (2) identify redundant packets, and (3) achieve zero recovery time.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"164 1","pages":"392-399"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85001638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel public key encryption model based on transformed biometrics","authors":"Bin Yan, Lin You","doi":"10.1109/DESEC.2017.8073861","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073861","url":null,"abstract":"In the fuzzy identity-based encryption scheme, a trusted KGC (key generation center) is needed to generate the corresponding private key corresponding to the user's biometric public key. In order to deal with the decentralization problem and the verification problem of the users identity, we propose a public key encryption model based on transformed biometrics. In this model, the user uses the transformed biometrics as his public key and his inherent real biometrics as his private key. In order to protect the user's biometrics information from being leaked, we take some appropriate security measures such as biometric template protection technology and irreversible random conversion technology. These operations are performed locally by the user, and once the public key is generated, the random transformation matrix is deleted or destroyed. The user connects the device serial number in parallel with the modulus N as the input value of the SHA-256 function and uses the output message digest as the public information. The user uses the inner product encryption to complete the encryption process. In this model, the security parameter and the private keys do not require any trusted organization for their generation, and these sensitive information does not need to be transmitted over a public network. The communication parties do not need to know the public key information of the other party in advance. When the user needs to transmit the secret message, the user can query the corresponding public key and related information. We have effectively linked the biological identities with the digital identities. Our thorough analysis shows that the proposed encryption model is both secure and efficient for an encryption algorithm.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"25 1","pages":"424-428"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85895094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive simulation platform using processing-based visualization for safe collision-free autonomous driving development","authors":"Dongkyu Lee, Jeonghun Cho, Daejin Park","doi":"10.1109/DESEC.2017.8073886","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073886","url":null,"abstract":"Autonomous driving for maximum throughput of traffic is too complex to cover various cases of exceptions in relation to large-scale cars in city, while still guaranteeing safety of the self-organizing algorithm. In this paper, we present a simulation-integrated interactive visualization platform to enable the fast development of a safe self-organizing driving algorithm. Using the proposed platform, developers describe geographic roads and allocate active cars equipped with specific autonomous algorithms. The cross-coupled simulation result of the self-organized movement of cars is interactively visualized with traffic on roads to show the weakness of the embedded autonomous driving algorithm. We show a demonstration for 1000 cars on 300 junctions of roads and offer a way to accelerate the development of self-organizing control in autonomous cars.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"142 1","pages":"537-538"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78526676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-object splicing forgery detection using noise level difference","authors":"Bo Liu, Chi-Man Pun","doi":"10.1109/DESEC.2017.8073884","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073884","url":null,"abstract":"Splicing forgery is a commonly used operation in digital image synthesize. Exposing multi-object splicing forgery by detecting noise discrepancy is discussed in this paper. The image is firstly segmented into small segments and noise level function, which reveals relationship between image noise and pixels' intensity is estimated. Suspicious regions are detected by checking constrains of noise level function. In the experiment, a new dataset is used for evaluating the proposed method. The experimental results show the effectiveness and robustness in dealing with multi-objects splicing forgery. Besides, comparisons prove our method is superior to the existing state-of-art.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"1 1","pages":"533-534"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87694518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}