9 results on '"Anton Konev"'
Search Results
2. Representation Learning for EEG-Based Biometrics Using Hilbert–Huang Transform
- Author
-
Mikhail Svetlakov, Ilya Kovalev, Anton Konev, Evgeny Kostyuchenko, and Artur Mitsel
- Subjects
EEG ,biometrics ,multi-similarity loss ,subject-independent ,representation learning ,Hilbert–Huang transform ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
A promising approach to overcome the various shortcomings of password systems is the use of biometric authentication, in particular the use of electroencephalogram (EEG) data. In this paper, we propose a subject-independent learning method for EEG-based biometrics using Hilbert spectrograms of the data. The proposed neural network architecture treats the spectrogram as a collection of one-dimensional series and applies one-dimensional dilated convolutions over them, and a multi-similarity loss was used as the loss function for subject-independent learning. The architecture was tested on the publicly available PhysioNet EEG Motor Movement/Imagery Dataset (PEEGMIMDB) with a 14.63% Equal Error Rate (EER) achieved. The proposed approach’s main advantages are subject independence and suitability for interpretation via created spectrograms and the integrated gradients method.
- Published
- 2022
- Full Text
- View/download PDF
3. Neural Network-Based Price Tag Data Analysis
- Author
-
Pavel Laptev, Sergey Litovkin, Sergey Davydenko, Anton Konev, Evgeny Kostyuchenko, and Alexander Shelupanov
- Subjects
image segmentation ,OCR ,YOLOv4-tiny ,neural networks ,UNet ,MobileNetV2 ,Information technology ,T58.5-58.64 - Abstract
This paper compares neural networks, specifically Unet, MobileNetV2, VGG16 and YOLOv4-tiny, for image segmentation as part of a study aimed at finding an optimal solution for price tag data analysis. The neural networks considered were trained on an individual dataset collected by the authors. Additionally, this paper covers the automatic image text recognition approach using EasyOCR API. Research revealed that the optimal network for segmentation is YOLOv4-tiny, featuring a cross validation accuracy of 96.92%. EasyOCR accuracy was also calculated and is 95.22%.
- Published
- 2022
- Full Text
- View/download PDF
4. Adversarial Attacks Impact on the Neural Network Performance and Visual Perception of Data under Attack
- Author
-
Yakov Usoltsev, Balzhit Lodonova, Alexander Shelupanov, Anton Konev, and Evgeny Kostyuchenko
- Subjects
digital signature ,python ,neural networks ,biometric authentication ,adversarial attack ,fast gradient method ,Information technology ,T58.5-58.64 - Abstract
Machine learning algorithms based on neural networks are vulnerable to adversarial attacks. The use of attacks against authentication systems greatly reduces the accuracy of such a system, despite the complexity of generating a competitive example. As part of this study, a white-box adversarial attack on an authentication system was carried out. The basis of the authentication system is a neural network perceptron, trained on a dataset of frequency signatures of sign. For an attack on an atypical dataset, the following results were obtained: with an attack intensity of 25%, the authentication system availability decreases to 50% for a particular user, and with a further increase in the attack intensity, the accuracy decreases to 5%.
- Published
- 2022
- Full Text
- View/download PDF
5. The Comparison of Cybersecurity Datasets
- Author
-
Ahmed Alshaibi, Mustafa Al-Ani, Abeer Al-Azzawi, Anton Konev, and Alexander Shelupanov
- Subjects
cybersecurity ,network security ,datasets ,machine learning ,cyberattacks ,IoT ,Bibliography. Library science. Information resources - Abstract
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detection system (IDS) and models to detect the attacks in any layer of its architecture. In this regard, minimizing the attacks could be the major objective of cybersecurity, while knowing that they cannot be fully avoided. The number of people resisting the attacks and protection system is less than those who prepare the attacks. Well-reasoned and learning-backed problems must be addressed by the cyber machine, using appropriate methods alongside quality datasets. The purpose of this paper is to describe the development of the cybersecurity datasets used to train the algorithms which are used for building IDS detection models, as well as analyzing and summarizing the different and famous internet of things (IoT) attacks. This is carried out by assessing the outlines of various studies presented in the literature and the many problems with IoT threat detection. Hybrid frameworks have shown good performance and high detection rates compared to standalone machine learning methods in a few experiments. It is the researchers’ recommendation to employ hybrid frameworks to identify IoT attacks for the foreseeable future.
- Published
- 2022
- Full Text
- View/download PDF
6. Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network
- Author
-
Dmitry Baranov, Alexandr Terekhin, Dmitry Bragin, and Anton Konev
- Subjects
5G ,networks ,security ,reliability ,NS3 ,Okumura–Hata ,Information technology ,T58.5-58.64 - Abstract
The determining factor in the accelerated pace of informatization is the increase in the speed and reliability of data transmission networks. In this regard, new and existing standards are developed and modernized. A lot of organizations are constantly working on the development and implementation of new generation communication networks. This article provides an overview of available software solutions that allow us to investigate and evaluate the behavior of data networks. In particular, tools suitable for mobile communication systems were determined, having sufficient built-in functionality and allowing us to add our own implementations. NS3 has been chosen as a suitable network simulator. Apart from the review, a solution for this tool was developed. It allows estimating the reliability of data transmission from the start movement of a network node at all times during its removal from a base station.
- Published
- 2021
- Full Text
- View/download PDF
7. IoT Security Mechanisms in the Example of BLE
- Author
-
Evgeny Kalinin, Danila Belyakov, Dmitry Bragin, and Anton Konev
- Subjects
Bluetooth mesh ,BLE ,security ,IoT ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency.
- Published
- 2021
- Full Text
- View/download PDF
8. Mathematical Model for Choosing Counterparty When Assessing Information Security Risks
- Author
-
Andrey Koltays, Anton Konev, and Alexander Shelupanov
- Subjects
model ,trustworthiness ,risks ,information and analytical systems ,machine learning ,Insurance ,HG8011-9999 - Abstract
The need to assess the risks of the trustworthiness of counterparties is increasing every year. The identification of increasing cases of unfair behavior among counterparties only confirms the relevance of this topic. The existing work in the field of information and economic security does not create a reasonable methodology that allows for a comprehensive study and an adequate assessment of a counterparty (for example, a developer company) in the field of software design and development. The purpose of this work is to assess the risks of a counterparty’s trustworthiness in the context of the digital transformation of the economy, which in turn will reduce the risk of offenses and crimes that constitute threats to the security of organizations. This article discusses the main methods used in the construction of a mathematical model for assessing the trustworthiness of a counterparty. The main difficulties in assessing the accuracy and completeness of the model are identified. The use of cross-validation to eliminate difficulties in building a model is described. The developed model, using machine learning methods, gives an accurate result with a small number of compared counterparties, which corresponds to the order of checking a counterparty in a real system. The results of calculations in this model show the possibility of using machine learning methods in assessing the risks of counterparty trustworthiness.
- Published
- 2021
- Full Text
- View/download PDF
9. Generation of an EDS Key Based on a Graphic Image of a Subject’s Face Using the RC4 Algorithm
- Author
-
Alexey Semenkov, Dmitry Bragin, Yakov Usoltsev, Anton Konev, and Evgeny Kostuchenko
- Subjects
digital signature ,computer vision ,cryptography ,security ,authenticity ,algorithms ,Information technology ,T58.5-58.64 - Abstract
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user’s face is converted to parameters that later are used in a recognition process. On the other hand, the obtained parameters can be used as data for pseudo-random number generators. However, the closeness of the sequence generated by such a generator to a truly random one is questionable. This paper proposes a system which is able to authenticate users by their face, and generate pseudo-random values based on the facial image that will later serve to generate an encryption key. The generator of a random value was tested with the NIST Statistical Test Suite. The subsystem of image recognition was also tested under various conditions of taking the image. The test results of the random value generator show a satisfactory level of randomness, i.e., an average of 0.47 random generation (NIST test), with 95% accuracy of the system as a whole.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.