DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...最新文献

筛选
英文 中文
C3-Sex: a Chatbot to Chase Cyber Perverts 性:一个追逐网络变态的聊天机器人
Jossie Murcia Triviño, Sebastián Moreno Rodríguez, D. D. López, Félix Gómez Mármol
{"title":"C3-Sex: a Chatbot to Chase Cyber Perverts","authors":"Jossie Murcia Triviño, Sebastián Moreno Rodríguez, D. D. López, Félix Gómez Mármol","doi":"10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00024","DOIUrl":"https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00024","url":null,"abstract":"Amongst the myriad of applications of Natural Language Processing (NLP), assisting Law Enforcement Agencies (LEA) in chasing cyber criminals is one of the most recent and promising ones. The paper at hand proposes C^3-Sex, a smart chatbot to interact with suspects in order to profile their interest regarding a given topic. This solution is based on our Artificial Conversational Entity (ACE) that connects to different online chat services to start a conversation regarding a specific matter, in our case child pornography, as this is one sensitive sexual crime that requires special efforts and contributions to be tackled. The ACE was designed using generative and rule-based models in charge of generating the posts and replies constituting the conversation from the chatbot side. The proposed solution also includes a module to analyze the conversations performed by the chatbot and to classify the suspects into three different profiles (indifferent, interested and pervert) according to the responses that they provide in the conversation. Exhaustive experiments were conducted obtaining an initial amount of 320 suspect chats from Omegle, which after filtering were reduced to 35 useful chats, that were classified by C^3-Sex as 26 indifferent, 4 interested and 5 pervert individuals.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"6 1","pages":"50-57"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83708419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DYCUSBoost: Adaboost-Based Imbalanced Learning Using Dynamic Clustering and Undersampling DYCUSBoost:基于adaboost的不平衡学习,使用动态聚类和欠采样
Lingchi Chen, Xiaoheng Deng, Hai-lan Shen, Congxu Zhu, L-C. Chang
{"title":"DYCUSBoost: Adaboost-Based Imbalanced Learning Using Dynamic Clustering and Undersampling","authors":"Lingchi Chen, Xiaoheng Deng, Hai-lan Shen, Congxu Zhu, L-C. Chang","doi":"10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00045","DOIUrl":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00045","url":null,"abstract":"","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"73 1","pages":"208-215"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76310798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Perioperative System: Towards Real-time Big Data Analytics in Surgery Risk Assessment. 智能围手术期系统:面向手术风险评估的实时大数据分析。
Zheng Feng, Rajendra Rana Bhat, Xiaoyong Yuan, Daniel Freeman, Tezcan Baslanti, Azra Bihorac, Xiaolin Li
{"title":"Intelligent Perioperative System: Towards Real-time Big Data Analytics in Surgery Risk Assessment.","authors":"Zheng Feng,&nbsp;Rajendra Rana Bhat,&nbsp;Xiaoyong Yuan,&nbsp;Daniel Freeman,&nbsp;Tezcan Baslanti,&nbsp;Azra Bihorac,&nbsp;Xiaolin Li","doi":"10.1109/DASC-PICom-DataCom-CyberSciTec.2017.201","DOIUrl":"https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.201","url":null,"abstract":"<p><p>Surgery risk assessment is an effective tool for physicians to manage the treatment of patients, but most current research projects fall short in providing a comprehensive platform to evaluate the patients' surgery risk in terms of different complications. The recent evolution of big data analysis techniques makes it possible to develop a real-time platform to dynamically analyze the surgery risk from large-scale patients information. In this paper, we propose the Intelligent Perioperative System (IPS), a real-time system that assesses the risk of postoperative complications (PC) and dynamically interacts with physicians to improve the predictive results. In order to process large volume patients data in real-time, we design the system by integrating several big data computing and storage frameworks with the high through-output streaming data processing components. We also implement a system prototype along with the visualization results to show the feasibility of system design.</p>","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"2017 ","pages":"1254-1259"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.201","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"36539181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A novel UL power control scheme for a digital cellular repeater 一种新的数字蜂窝中继器UL功率控制方案
Yung-Ting Lee, Chunn-Yenn Lin, Ming-Jhou Wang
{"title":"A novel UL power control scheme for a digital cellular repeater","authors":"Yung-Ting Lee, Chunn-Yenn Lin, Ming-Jhou Wang","doi":"10.1109/DESEC.2017.8073866","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073866","url":null,"abstract":"The ideal application scenario of a digital repeater is to let the repeater be operated as a transparent node in the radio access network, which means the repeater has to keep a linear gain all the time when it is forwarding data among base stations and handsets. For a handset in a cellular network, its UL transmitted power may be dramatically fluctuated by the closed loop power control to meet the required signal quality and to compensate the propagation loss due to wireless channel. When a repeater is serving the handset, it may not be able to keep a linear gain in dealing with such variant received signal strength and sometimes results in transmitting over-powered UL signal to desensitize base station reception and even to interfere the base station. In this paper, we propose a novel power control scheme, which is to adaptively adjust the maximum UL output power of a digital cellular repeater to cope with the problem mentioned above. Field test results are presented to show the effectiveness of the proposed scheme.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"23 1","pages":"471-472"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75546264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure group key distribution in constrained environments with IKEv2 使用IKEv2在受限环境下安全的组密钥分发
N. Felde, T. Guggemos, T. Heider, D. Kranzlmüller
{"title":"Secure group key distribution in constrained environments with IKEv2","authors":"N. Felde, T. Guggemos, T. Heider, D. Kranzlmüller","doi":"10.1109/DESEC.2017.8073823","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073823","url":null,"abstract":"Group communication is an important means for communication in todays interconnected world, where multiple endpoints need exchange of data in the most efficient and concurrently secure way. The resulting complexity represents a substantial challenge, especially in the constrained environments introduced through the Internet-of-Things and sensor networks. An in-depth analysis of existing work shows that the problem of secure key distribution within groups requires novel approaches. Instead of designing yet another (group) key distribution scheme, this paper offers a minimal client based on the well-known Group Internet-Key-Exchange protocol G-IKEv2. The evaluation of this first open client with real-life observations and corresponding measurements proves its applicability for secure group key distribution and will serve as the basis for implementing group and identity management.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"328 2","pages":"384-391"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72619678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
High performance CAN/FlexRay gateway design for in-vehicle network 车载网络高性能CAN/FlexRay网关设计
Trong-Yen Lee, Chia-Wei Kuo, I-An Lin
{"title":"High performance CAN/FlexRay gateway design for in-vehicle network","authors":"Trong-Yen Lee, Chia-Wei Kuo, I-An Lin","doi":"10.1109/DESEC.2017.8073848","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073848","url":null,"abstract":"A gateway in in-vehicle network (IVN) is an indispensable component as a conversion device between different communication protocols. Due to meet more complex network for IVN, how to improving the performance of gateway is more important. In this paper, a high efficient of CAN/FlexRay gateway using hardware/software (HW/SW) co-design method is proposed which is implemented with Xilinx FPGA system. The CAN controller and FlexRay controller are designed by SW and HW, respectively. The interface of HW and SW are used AXI-bus. The convert module is evaluated by a cost function. In addition, a transceiver PCB for connecting between the proposed gateway and external CAN/FlexRay-based ECUs is implemented. Experimental results show that the proposed gateway system can reduce at most 94.7% on execution time with related works which is more suited for IVN.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"29 1","pages":"240-242"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84303142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A practical and effective approach to implementing High Availability Seamless Redundancy (HSR) 一种实用有效的实现高可用性无缝冗余(HSR)的方法
James T. Yu
{"title":"A practical and effective approach to implementing High Availability Seamless Redundancy (HSR)","authors":"James T. Yu","doi":"10.1109/DESEC.2017.8073824","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073824","url":null,"abstract":"High availability Ethernets are being used for many industrial automation applications, and the adoption of High Availability Seamless Redundancy (HSR) is gaining strong interests from both the industry and academics as it is able to achieve zero recovery time. This paper presents a simple, practical, and effective implementation of HSR based on Add-Drop-Multiplexer (ADM). A major contribution of the paper is to use polling, instead of the legacy MAC learning process, to build the MAC forwarding table on RedBox and QuadBox. Through our simulation model, we demonstrate the effectiveness of this approach to (1) avoid loops of broadcast messages, (2) identify redundant packets, and (3) achieve zero recovery time.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"164 1","pages":"392-399"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85001638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel public key encryption model based on transformed biometrics 一种新的基于转换生物特征的公钥加密模型
Bin Yan, Lin You
{"title":"A novel public key encryption model based on transformed biometrics","authors":"Bin Yan, Lin You","doi":"10.1109/DESEC.2017.8073861","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073861","url":null,"abstract":"In the fuzzy identity-based encryption scheme, a trusted KGC (key generation center) is needed to generate the corresponding private key corresponding to the user's biometric public key. In order to deal with the decentralization problem and the verification problem of the users identity, we propose a public key encryption model based on transformed biometrics. In this model, the user uses the transformed biometrics as his public key and his inherent real biometrics as his private key. In order to protect the user's biometrics information from being leaked, we take some appropriate security measures such as biometric template protection technology and irreversible random conversion technology. These operations are performed locally by the user, and once the public key is generated, the random transformation matrix is deleted or destroyed. The user connects the device serial number in parallel with the modulus N as the input value of the SHA-256 function and uses the output message digest as the public information. The user uses the inner product encryption to complete the encryption process. In this model, the security parameter and the private keys do not require any trusted organization for their generation, and these sensitive information does not need to be transmitted over a public network. The communication parties do not need to know the public key information of the other party in advance. When the user needs to transmit the secret message, the user can query the corresponding public key and related information. We have effectively linked the biological identities with the digital identities. Our thorough analysis shows that the proposed encryption model is both secure and efficient for an encryption algorithm.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"25 1","pages":"424-428"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85895094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interactive simulation platform using processing-based visualization for safe collision-free autonomous driving development 采用基于处理的可视化交互式仿真平台进行安全无碰撞自动驾驶开发
Dongkyu Lee, Jeonghun Cho, Daejin Park
{"title":"Interactive simulation platform using processing-based visualization for safe collision-free autonomous driving development","authors":"Dongkyu Lee, Jeonghun Cho, Daejin Park","doi":"10.1109/DESEC.2017.8073886","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073886","url":null,"abstract":"Autonomous driving for maximum throughput of traffic is too complex to cover various cases of exceptions in relation to large-scale cars in city, while still guaranteeing safety of the self-organizing algorithm. In this paper, we present a simulation-integrated interactive visualization platform to enable the fast development of a safe self-organizing driving algorithm. Using the proposed platform, developers describe geographic roads and allocate active cars equipped with specific autonomous algorithms. The cross-coupled simulation result of the self-organized movement of cars is interactively visualized with traffic on roads to show the weakness of the embedded autonomous driving algorithm. We show a demonstration for 1000 cars on 300 junctions of roads and offer a way to accelerate the development of self-organizing control in autonomous cars.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"142 1","pages":"537-538"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78526676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-object splicing forgery detection using noise level difference 基于噪声级差的多目标拼接伪造检测
Bo Liu, Chi-Man Pun
{"title":"Multi-object splicing forgery detection using noise level difference","authors":"Bo Liu, Chi-Man Pun","doi":"10.1109/DESEC.2017.8073884","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073884","url":null,"abstract":"Splicing forgery is a commonly used operation in digital image synthesize. Exposing multi-object splicing forgery by detecting noise discrepancy is discussed in this paper. The image is firstly segmented into small segments and noise level function, which reveals relationship between image noise and pixels' intensity is estimated. Suspicious regions are detected by checking constrains of noise level function. In the experiment, a new dataset is used for evaluating the proposed method. The experimental results show the effectiveness and robustness in dealing with multi-objects splicing forgery. Besides, comparisons prove our method is superior to the existing state-of-art.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"1 1","pages":"533-534"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87694518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信