44,281 results
Search Results
2. Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme
- Author
-
Marie-Laure Zollinger, Peter Y. A. Ryan, and Peter B. Rønne
- Subjects
Scheme (programming language) ,050101 languages & linguistics ,Theoretical computer science ,Cryptographic primitive ,Computer science ,media_common.quotation_subject ,05 social sciences ,Short paper ,02 engineering and technology ,Gas meter prover ,Mathematical proof ,Voting ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,computer ,Formal verification ,Protocol (object-oriented programming) ,computer.programming_language ,media_common - Abstract
Electryo is a paper-based voting protocol that implements the Selene mechanism for individual verifiability. This short paper aims to provide the first formal model of Electryo, with security proofs for vote-privacy and individual verifiability. In general, voting protocols are complex constructs, involving advanced cryptographic primitives and strong security guarantees, posing a serious challenge when wanting to analyse and prove security with formal verification tools. Here we choose to use the \({{\,\mathrm{\textsc {Tamarin}}\,}}\) prover since it is one of the more advanced tools and is able to handle many of the primitives we encounter in the design and analysis of voting protocols.
- Published
- 2020
3. An Optical SPR Sensor for Monitoring Accelerated Ageing of Oil-Paper Insulation of Transformers
- Author
-
Maria Pesavento, J. Borghetto, D. Gasparini, Fabio Scatiggio, L. Cice, L. De Maria, A. Tavakoli, and D. Bartalesi
- Subjects
Materials science ,020209 energy ,010401 analytical chemistry ,Electrical insulation paper ,02 engineering and technology ,Standard methods ,High sensitive ,01 natural sciences ,0104 chemical sciences ,law.invention ,Chemical marker ,law ,Service life ,0202 electrical engineering, electronic engineering, information engineering ,Composite material ,Transformer - Abstract
Degradation of electrical insulation due to the oil-paper insulating system is one of the main factors that affect power transformer service life. Although the end of life failure is inevitable, the life of the insulating paper can be maximized through careful monitoring and maintenance. In this paper an optical SPR sensor is reported for high sensitive detection of a chemical marker of the transformers’ insulating paper degradation. Temperature tests were carried out on oil–paper specimens representative of the solid insulating system of transformers, subjected to initial different drying processes and successively exposed to aging temperature. A comparative analysis with standard methods (HPLC—High Performance Liquid Chromatography) confirms that the chemical concentrations detected in oil–paper sampling of different specimens with optical SPR sensors are in good agreement with those measured by standard techniques.
- Published
- 2020
4. Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers
- Author
-
Babak Amin Azad, Pierre Laperdrix, Oleksii Starov, and Nick Nikiforakis
- Subjects
Current generation ,Computer science ,Data_MISCELLANEOUS ,Fingerprint (computing) ,Short paper ,020206 networking & telecommunications ,02 engineering and technology ,Variation (game tree) ,Computer security ,computer.software_genre ,Credit card ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer - Abstract
When it comes to leaked credentials and credit card information, we observe the development and use of anti-fingerprinting browsers by malicious actors. These tools are carefully designed to evade detection, often by mimicking the browsing environment of the victim whose credentials were stolen. Even though these tools are popular in the underground markets, they have not received enough attention by researchers. In this paper, we report on the first evaluation of four underground, commercial, and research anti-fingerprinting browsers and highlight their high success rate in bypassing browser fingerprinting. Despite their success against well-known fingerprinting methods and libraries, we show that even slightest variation in the simulated fingerprint compared to the real ones can give away the presence of anti-fingerprinting tools. As a result, we provide techniques and fingerprint-based signatures that can be used to detect the current generation of anti-fingerprinting browsers.
- Published
- 2020
5. Short Paper: XOR Arbiter PUFs Have Systematic Response Bias
- Author
-
Nils Wisiol and Niklas Pirnay
- Subjects
050101 languages & linguistics ,Computer science ,05 social sciences ,Short paper ,Physical unclonable function ,Arbiter ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,ComputerSystemsOrganization_PROCESSORARCHITECTURES ,Response bias ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,0202 electrical engineering, electronic engineering, information engineering ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Arithmetic ,Hardware_REGISTER-TRANSFER-LEVELIMPLEMENTATION - Abstract
We demonstrate that XOR Arbiter PUFs with an even number of arbiter chains have inherently biased responses, even if all arbiter chains are perfectly unbiased. This rebukes the believe that XOR Arbiter PUFs are, like Arbiter PUFs, unbiased when ideally implemented and proves that independently manufactured Arbiter PUFs are not statistically independent.
- Published
- 2020
6. Towards a Reconciliation Between Reasoning and Learning - A Position Paper
- Author
-
Henri Prade and Didier Dubois
- Subjects
Cognitive science ,Computer science ,media_common.quotation_subject ,Information processing ,02 engineering and technology ,Representation (arts) ,Task (project management) ,Bridging (programming) ,Instinct ,Plea ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Position paper ,020201 artificial intelligence & image processing ,Function (engineering) ,media_common - Abstract
The paper first examines the contours of artificial intelligence (AI) at its beginnings, more than sixty years ago, and points out the important place that machine learning already had at that time. The ambition of AI of making machines capable of performing any information processing task that the human mind can do, means that AI should cover the two modes of human thinking: the instinctive (reactive) one and the deliberative one. This also corresponds to the difference between mastering a skill without being able to articulate it and holding some pieces of knowledge that one can use to explain and teach. In case a function-based representation applies to a considered AI problem, the respective merits of learning a universal approximation of the function vs. a rule-based representation are discussed, with a view to better draw the contours of AI. Moreover, the paper reviews the relative positions of knowledge and data in reasoning and learning, and advocates the need for bridging the two tasks. The paper is also a plea for a unified view of the various facets of AI as a science.
- Published
- 2019
7. 'BDD Assemble!': A Paper-Based Game Proposal for Behavior Driven Development Design Learning
- Author
-
Victor Travassos Sarinho
- Subjects
Design learning ,Higher education ,Computer science ,business.industry ,ComputingMilieux_PERSONALCOMPUTING ,020207 software engineering ,02 engineering and technology ,Behavior-driven development ,Paper based ,computer.software_genre ,Simple (abstract algebra) ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Software engineering ,computer ,Educational game - Abstract
Game-based learning represents a promising alternative to teach computing in higher education. This paper presents “BDD Assemble!”, a paper-based game proposal for teaching Behavior Driven Development (BDD) competences. For this, the proposed game and the evaluation approach with software engineering students are described. As a result, a simple, interactive and colaborative game was provided, able to teach BDD concepts in a practical, competitive and fun way.
- Published
- 2019
8. Crawled Data Analysis on Baidu API Website for Improving SaaS Platform (Short Paper)
- Author
-
Lei Yu, Yaoyao Wen, Shiping Chen, and Shanshan Liang
- Subjects
Service (systems architecture) ,business.industry ,Computer science ,Software as a service ,Short paper ,020207 software engineering ,Cloud computing ,02 engineering and technology ,World Wide Web ,Software ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Anomaly detection ,IBM ,Web crawler ,business - Abstract
SaaS (Software-as-a-Service) is a cloud computing model, which is sometimes referred to as “on-demand software”. Existing SaaS platforms are investigated before building new distributed SaaS platform. The service data mining and evaluation on existing SaaS platforms improve our new SaaS platform. For SaaS that provide various APIs, we analysis their website data in this paper by our data mining method and related software. We wrote a crawler program to obtain data from these websites. The websites include Baidu API and ProgrammableWeb API. After ETL (Extract-Transform-Load), the obtained and processed data is ready to be analyzed. Statistical methods including non-linear regression and outlier detection are used to evaluate the websites performance, and give suggestions to improve the design and development of our API website. All figures and tables in this paper are generated from IBM SPSS statistical software. The work helps us improve our own API website by comprehensively analyzing other successful API websites.
- Published
- 2019
9. Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper
- Author
-
Konstantinos Markantonakis, Julia A. Meister, and Raja Naeem Akram
- Subjects
business.industry ,Computer science ,media_common.quotation_subject ,Deep learning ,Multitude ,02 engineering and technology ,010501 environmental sciences ,Computer security ,computer.software_genre ,01 natural sciences ,Resilience (organizational) ,Adversarial system ,Software ,General Data Protection Regulation ,0202 electrical engineering, electronic engineering, information engineering ,Position paper ,020201 artificial intelligence & image processing ,Quality (business) ,Artificial intelligence ,business ,computer ,0105 earth and related environmental sciences ,media_common - Abstract
Technology is shaping our lives in a multitude of ways. This is fuelled by a technology infrastructure, both legacy and state of the art, composed of a heterogeneous group of hardware, software, services, and organisations. Such infrastructure faces a diverse range of challenges to its operations that include security, privacy, resilience, and quality of services. Among these, cybersecurity and privacy are taking the centre-stage, especially since the General Data Protection Regulation (GDPR) came into effect. Traditional security and privacy techniques are overstretched and adversarial actors have evolved to design exploitation techniques that circumvent protection. With the ever-increasing complexity of technology infrastructure, security and privacy-preservation specialists have started to look for adaptable and flexible protection methods that can evolve (potentially autonomously) as the adversarial actor changes its techniques. For this, Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) were put forward as saviours. In this paper, we look at the promises of AI, ML, and DL stated in academic and industrial literature and evaluate how realistic they are. We also put forward potential challenges a DL based security and privacy protection system has to overcome. Finally, we conclude the paper with a discussion on what steps the DL and the security and privacy-preservation community have to take to ensure that DL is not just going to be hype, but an opportunity to build a secure, reliable, and trusted technology infrastructure on which we can rely on for so much in our lives.
- Published
- 2019
10. A Methodology for Handling Data Movements by Anticipation: Position Paper
- Author
-
Giorgio Lucarelli, Denis Trystram, and Raphaël Bleuse
- Subjects
020203 distributed computing ,Interconnection ,Computer science ,Distributed computing ,0202 electrical engineering, electronic engineering, information engineering ,Position paper ,020206 networking & telecommunications ,Torus ,02 engineering and technology ,Network topology ,Scheduling (computing) - Abstract
The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part.
- Published
- 2018
11. Feature-based Online Segmentation Algorithm for Streaming Time Series (Short Paper)
- Author
-
Yang Xu, Qi Zhang, Peng Zhan, Wei Luo, Yupeng Hu, and Xueqing Li
- Subjects
Signal processing ,Series (mathematics) ,Computer science ,Dimensionality reduction ,Short paper ,02 engineering and technology ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Feature based ,020201 artificial intelligence & image processing ,Segmentation ,Time series ,Baseline (configuration management) ,Algorithm - Abstract
Over the last decade, huge number of time series stream data are continuously being produced in diverse fields, including finance, signal processing, industry, astronomy and so on. Since time series data has high-dimensional, real-valued, continuous and other related properties, it is of great importance to do dimensionality reduction as a preliminary step. In this paper, we propose a novel online segmentation algorithm based on the importance of TPs to represent the time series into some continuous subsequences and maintain the corresponding local temporal features of the raw time series data. To demonstrate the advantage of our proposed algorithm, we provide extensive experimental results on different kinds of time series datasets for validating our algorithm and comparing it with other baseline methods of online segmentation.
- Published
- 2019
12. Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin
- Author
-
Till Neudecker and Hannes Hartenstein
- Subjects
050101 languages & linguistics ,Blockchain ,Computer science ,05 social sciences ,Short paper ,DATA processing & computer science ,Process (computing) ,02 engineering and technology ,Propagation delay ,Order (exchange) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Fork (file system) ,Latency (engineering) ,ddc:004 ,Algorithm ,Block (data storage) - Abstract
Temporary blockchain forks are part of the regular consensus process in permissionless blockchains such as Bitcoin. As forks can be caused by numerous factors such as latency and miner behavior, their analysis provides insights into these factors, which are otherwise unknown. In this paper we provide an empirical analysis of the announcement and propagation of blocks that led to forks of the Bitcoin blockchain. By analyzing the time differences in the publication of competing blocks, we show that the block propagation delay between miners can be of similar order as the block propagation delay of the average Bitcoin peer. Furthermore, we show that the probability of a block to become part of the main chain increases roughly linearly in the time the block has been published before the competing block. Additionally, we show that the observed frequency of short block intervals between two consecutive blocks mined by the same miner after a fork is conspicuously large. While selfish mining can be a cause for this observation, other causes are also possible. Finally, we show that not only the time difference of the publication of competing blocks but also their propagation speeds vary greatly.
- Published
- 2019
13. Covering Diversification and Fairness for Better Recommendation (Short Paper)
- Author
-
Qing Yang, Zhongqin Bi, Jingwei Zhang, Ya Zhou, Shaobing Liu, Fang Pan, and Han Li
- Subjects
Matching (statistics) ,Information retrieval ,Exploit ,Computer science ,Short paper ,Closeness ,Novelty ,02 engineering and technology ,Diversification (marketing strategy) ,020204 information systems ,Similarity (psychology) ,0202 electrical engineering, electronic engineering, information engineering ,Collaborative filtering ,020201 artificial intelligence & image processing - Abstract
Smart applications are appealing an accurate matching between users and items, in which recommendation technologies are applied widely. Since recommendation serve for two roles, namely users and items, accuracy is not the only focus, the diversification and fairness should also be paid more attention for improving recommendation performance. The tradeoff among the accuracy, diversification and fairness on recommendation is bringing a big challenge. This paper proposed a novelty recommendation model to ensure the recommendation performance, which introduces a multi-variate linear regression model to cooperate with the collaborative filtering method. This study utilizes an improved similarity metrics to discover the closeness between users and item categories under the help of the collaborative filtering methods, and exploits the micro attribute information of items by a multi-variate linear regression model to decide the final recommended items. The experimental results show that our proposed method can provide better recommendation accuracy, diversification and fairness than the recommendation based on pure collaborative filtering method.
- Published
- 2019
14. Mobile Data Sharing with Multiple User Collaboration in Mobile Crowdsensing (Short Paper)
- Author
-
Qin Liu, Changjia Yang, Lei Nie, Tao Zhang, Heng He, Yu Jin, and Peng Li
- Subjects
Smart phone ,business.industry ,Computer science ,Mobile broadband ,Short paper ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Stable marriage problem ,Data sharing ,Crowdsensing ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,Greedy algorithm ,business ,Computer network - Abstract
With the development of the Internet and smart phone, mobile data sharing have been attracted many researcher’s attentions. In this paper, we investigate the mobile data sharing problem in mobile crowdsensing. There are a large number of users, each user can be a mobile data acquisition, or can be a mobile data sharing, the problem is how to optimal choose users to collaborative sharing their idle mobile data to others. We consider two data sharing models, One-to-Many and Many-to-Many data sharing model when users share their mobile data. For One-to-Many model, we propose an OTM algorithm based on the greedy algorithm to share each one’s data. For Many-to-Many model, we translate the problem into the stable marriage problem (SMP), and we propose a MTM algorithm based on the SMP algorithm to solve this problem. Experimental results show that our methods are superior to the other approaches.
- Published
- 2019
15. Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape
- Author
-
Sarah Meiklejohn, Haaroon Yousaf, and Pierre Reibel
- Subjects
050101 languages & linguistics ,Cryptocurrency ,Exploit ,Computer science ,05 social sciences ,Short paper ,Code diversity ,02 engineering and technology ,Data science ,Popularity ,Software deployment ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Diversity (business) - Abstract
Interest in cryptocurrencies has skyrocketed since their introduction a decade ago, with hundreds of billions of dollars now invested across a landscape of thousands of different cryptocurrencies. While there is significant diversity, there is also a significant number of scams as people seek to exploit the current popularity. In this paper, we seek to identify the extent of innovation in the cryptocurrency landscape using the open-source repositories associated with each one. Among other findings, we observe that while many cryptocurrencies are largely unchanged copies of Bitcoin, the use of Ethereum as a platform has enabled the deployment of cryptocurrencies with more diverse functionalities.
- Published
- 2019
16. Reverse Collective Spatial Keyword Querying (Short Paper)
- Author
-
Ning Zheng, Zhi Chen, Jian Xu, Yang Wu, Ming Luo, and Liming Tu
- Subjects
050210 logistics & transportation ,Information retrieval ,Similarity (geometry) ,Cover (telecommunications) ,Computer science ,Spatial database ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,05 social sciences ,Short paper ,Process (computing) ,02 engineering and technology ,Set (abstract data type) ,020204 information systems ,0502 economics and business ,Location-based service ,0202 electrical engineering, electronic engineering, information engineering ,Pruning (decision trees) - Abstract
Recently, Collective Spatial Keyword Querying (CoSKQ), which returns a group of objects that cover a set of given keywords collectively and have the smallest cost, has received extensive attention in spatial database community. However, no research so far focuses on a situation when the result of CoSKQ is taken as the input of a query. But this kind of query has many applications in location based services. In this paper, we introduce a new problem Reverse Collective Spatial Keyword Querying (RCoSKQ) that returns a region, in which the query objects are qualified objects with the highest spatial and textual similarity. We propose an efficient method which uses IR-tree to retrieve objects with text descriptions. To accelerate the query process, a pruning method that effectively reduces computing is proposed. The experiments over real and synthesis data sets demonstrate the efficiency of our approaches.
- Published
- 2019
17. (Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection
- Author
-
Abigail Koay, Winston K. G. Seah, and Ian Welch
- Subjects
Rényi entropy ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Short paper ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,020201 artificial intelligence & image processing ,Denial-of-service attack ,02 engineering and technology ,Data mining ,computer.software_genre ,computer - Abstract
DDoS attack detection using entropy-based features in network traffic has become a popular approach among researchers in the last five years. The use of traffic distribution features constructed using entropy measures has been proposed as a better approach to detect Distributed Denial of Service (DDoS) attacks compared to conventional volumetric methods, but it still lacks in the generality of detecting various intensity DDoS attacks accurately. In this paper, we focus on identifying effective entropy-based features to detect both high- and low-intensity DDoS attacks by exploring the effectiveness of entropy-based features in distinguishing the attack from normal traffic patterns. We hypothesise that using different entropy measures, window sizes, and entropy-based features may affect the accuracy of detecting DDoS attacks. This means that certain entropy measures, window sizes, and entropy-based features may reveal attack traffic amongst normal traffic better than the others. Our experimental results show that using Shannon, Tsallis and Zhou entropy measures can achieve a clearer distinction between DDoS attack traffic and normal traffic than Renyi entropy. In addition, the window size setting used in entropy construction has minimal influence in differentiating between DDoS attack traffic and normal traffic. The result of the effectiveness ranking shows that the commonly used features are less effective than other features extracted from traffic headers.
- Published
- 2019
18. (Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points
- Author
-
Tsuyoshi Takagi, Tsutomu Yamazaki, Hiroshi Onuki, and Yusuke Aikawa
- Subjects
Post-quantum cryptography ,Computer science ,business.industry ,Short paper ,Zero (complex analysis) ,Cryptography ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Elliptic curve ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Torsion (algebra) ,020201 artificial intelligence & image processing ,business ,Constant (mathematics) ,Algorithm - Abstract
At ASIACRYPT 2018, Castryck, Lange, Martindale, Panny and Renes proposed CSIDH, which is a key-exchange protocol based on isogenies between elliptic curves, and a candidate for post-quantum cryptography. However, the implementation by Castryck et al. is not constant-time. Specifically, a part of the secret key could be recovered by the side-channel attacks. Recently, Meyer, Campos, and Reith proposed a constant-time implementation of CSIDH by introducing dummy isogenies and taking secret exponents only from intervals of non-negative integers. Their non-negative intervals make the calculation cost of their implementation of CSIDH twice that of the worst case of the standard (variable-time) implementation of CSIDH. In this paper, we propose a more efficient constant-time algorithm that takes secret exponents from intervals symmetric with respect to the zero. For using these intervals, we need to keep two torsion points on an elliptic curve and calculation for these points. We implemented our algorithm by extending the implementation in C of Meyer et al. (originally from Castryck et al.). Then our implementation achieved 152.8 million clock cycles, which is about 29.03% faster than that of Meyer et al.
- Published
- 2019
19. Identifying Local Clustering Structures of Evolving Social Networks Using Graph Spectra (Short Paper)
- Author
-
Bo Jiao, Jin Wang, and Yiping Bao
- Subjects
Spectral power distribution ,business.industry ,Computer science ,Node (networking) ,Short paper ,Contrast (statistics) ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,01 natural sciences ,Telecommunications network ,010305 fluids & plasmas ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,business ,Cluster analysis ,Laplace operator ,Clustering coefficient - Abstract
The clustering coefficient has been widely used for identifying the local structure of networks. In this paper, the weighted spectral distribution with 3-cycle (WSD3) that is similar (but not equal) to the clustering coefficient is studied on evolving social networks. It is demonstrated that the ratio of the WSD3 to the network size (i.e., the node number) provides a more sensitive discrimination for the size-independent local structure of social networks in contrast to the clustering coefficient. Moreover, the difference of the WSD3’s performances on social networks and communication networks is investigated, and it is found that the difference is induced by the different symmetrical features of the normalized Laplacian spectral densities on these networks.
- Published
- 2019
20. The Three-Degree Calculation Model of Microblog Users’ Influence (Short Paper)
- Author
-
Xueying Sun and Fu Xie
- Subjects
Information retrieval ,business.industry ,Computer science ,Microblogging ,Short paper ,020101 civil engineering ,02 engineering and technology ,Public opinion ,Degree (music) ,0201 civil engineering ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Social media ,business - Abstract
Highly influential social users can guide public opinion and influence their emotional venting. Therefore, it is of great significance to identify high-impact users effectively. This paper starts with the users’ text content, users’ emotions, and fans’ behaviors. It combines the amount of information in the content and sentiment tendency with the fans’ forwarding, commenting, and Liking actions. And based on the principle of the three-degree influence, the users’ influence calculation model is constructed. Finally, the experimental results show that the three-degree force calculation model is more accurate and effective than other similar models.
- Published
- 2019
21. A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper)
- Author
-
Mariana Segovia, Joaquin Garcia-Alfaro, Nora Cuppens, and Ana Cavalli
- Subjects
021110 strategic, defence & security studies ,Computer science ,0211 other engineering and technologies ,Cyber-physical system ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020206 networking & telecommunications ,02 engineering and technology ,SCADA ,0202 electrical engineering, electronic engineering, information engineering ,Systems engineering ,Position paper ,Environmental regulation ,Human safety ,Resilience (network) - Abstract
Cyber-physical systems (CPSs) integrate programmable computing and communication capabilities to traditional physical environments. The use of SCADA (Supervisory Control And Data Acquisition) technologies to build such a new generation of CPSs plays an important role in current critical national-wide infrastructures. SCADA-driven CPSs can be disrupted by cyber-physical attacks, putting at risk human safety, environmental regulation and industrial work. In this paper, we address the aforementioned issues and provide a discussion on the mitigation techniques that aim to optimize the recovery response when a SCADA-driven CPS is under attack. Our discussion paves the way for novel cyber resilience techniques, focusing on the programmable computing and communication capabilities of CPSs, towards new research directions to tolerate cyber-physical attacks.
- Published
- 2019
22. On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper)
- Author
-
Sourya Joyee De and Abdessamad Imine
- Subjects
050502 law ,Computer science ,business.industry ,05 social sciences ,Short paper ,Internet privacy ,Control (management) ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Sense of control ,02 engineering and technology ,humanities ,Compliance (psychology) ,User privacy ,General Data Protection Regulation ,0202 electrical engineering, electronic engineering, information engineering ,ComputingMilieux_COMPUTERSANDSOCIETY ,020201 artificial intelligence & image processing ,business ,Valid consent ,Register of data controllers ,0505 law - Abstract
The EU General Data Protection Regulation (GDPR) recognizes data subject’s consent as a legitimate ground of data processing. At present, consent mechanisms in OSNs are either non-existent or not GDPR compliant. While the absence of consent means a lack of control of the OSN user (data subject) on his personal data, non-compliant consent mechanisms can give them a false sense of control, encouraging them to reveal more personal data than they would have otherwise. GDPR compliance is thus the only way to obtain meaningful consents, thereby protecting user privacy. In this paper, we discuss the characteristics of valid consent as per the GDPR, analyze the present status of consent in OSNs and propose some research directions to arrive at GDPR compliant consent models acceptable to users and OSN providers (data controller). We observe that evaluating privacy risks of consents to data processing activities can be an effective way to help users in their decision to give or refuse consents and hence is an important research direction.
- Published
- 2019
23. (Short Paper) Method for Preventing Suspicious Web Access in Android WebView
- Author
-
Masaya Sato, Rintaro Orito, Yuta Imamura, and Toshihiro Yamauchi
- Subjects
World Wide Web ,021110 strategic, defence & security studies ,Web browser ,Computer science ,Short paper ,Web page ,0211 other engineering and technologies ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,02 engineering and technology ,Web access ,Web content ,Android (operating system) - Abstract
WebView is commonly used by applications on the Android OS. Given that WebView is used as a browsing component on applications, they can be attacked via the web. Existing security mechanisms mainly focus on web browsers; hence, securing WebView is an important challenge. We proposed and implemented a method for preventing suspicious web access in Android WebView. Attackers distribute their malicious content including malicious applications, potentially unwanted programs, and coin miners, by inserting contents into a web page. Because loading malicious content involves HTTP communication, our proposed method monitors HTTP communication by WebView and blocks suspicious web accesses. To apply the proposed method to widely used applications, we implemented our method inside WebView. We also evaluated the proposed method with some popular applications and confirmed that the method can block designated web content without impeding the functionality of applications.
- Published
- 2019
24. Relation Extraction Toward Patent Domain Based on Keyword Strategy and Attention+BiLSTM Model (Short Paper)
- Author
-
Junmei Han, Xindong You, Zhian Dong, Xueqiang Lv, and Xiangru Lv
- Subjects
Computer science ,business.industry ,Short paper ,Pooling ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Relationship extraction ,Terminology ,Softmax function ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Classifier (UML) ,Temporal information ,computer ,Sentence ,Natural language processing - Abstract
Patent terminology relation extraction is of great significance to the construction of patent Knowledge graph. In order to solve the problem of long-distance dependency in traditional depth learning, a new method of patent terminology relation extraction is proposed, which combines attention mechanism and bi-directional LSTM model and with keyword strategy. Category keyword features in each sentence obtained by the improved TextRank with the patent text information vectorization added. BiLSTM neural work and attention mechanism are employed to extract the temporal information and sentence-level global feature information. Moreover, pooling layer is added to obtain the local features of the text. Finally, we fuse the global features and local features, and output the final classification results through the softmax classifier. The addition of category keywords improves the distinction of categories. Substantial experimental results demonstrate that the proposed model outperform the state-of-art neural model in patent terminology relation extraction.
- Published
- 2019
25. Gazetteer-Guided Keyphrase Generation from Research Papers
- Author
-
Debarshi Kumar Sanyal, Plaban Kumar Bhowmick, T. Y. S. S. Santosh, and Partha Pratim Das
- Subjects
Vocabulary ,Focus (computing) ,Information retrieval ,Computer science ,media_common.quotation_subject ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,05 social sciences ,02 engineering and technology ,050905 science studies ,Task (project management) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Encoder decoder ,Source text ,0509 other social sciences ,media_common - Abstract
The task of keyphrase generation aims to generate the key phrases that capture the primary content of a document. An external domain-specific gazetteer can assist in generating keyphrases that are literally absent in the document (i.e., do not match any contiguous sub-sequence of source text) but relevant to the content of the document. In this paper, we present a technique to integrate knowledge from a gazetteer in order to improve keyphrase generation from research papers. We also present a copy mechanism that helps our model to utilize the gazetteer vocabulary to deal with the out-of-vocabulary words in keyphrases. Since constructing and maintaining relevant high-quality gazetteer by hand is very expensive, we also propose a method for automatic construction of a gazetteer given the input document, by leveraging similar documents in the training corpus. The thus constructed gazetteer helps focus on corpus-level information carried by other similar documents. Although this external information is crucial, it is never considered in previous studies. Experiments on real world datasets of research papers demonstrate that our proposed approach improves the performance of the state-of-the-art keyphrase generation models.
- Published
- 2021
26. Automatic Classification of Research Papers Using Machine Learning Approaches and Natural Language Processing
- Author
-
Segarra-Faggioni Veronica and Ortiz Yesenia
- Subjects
Vocabulary ,business.industry ,Computer science ,media_common.quotation_subject ,Scopus ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Linear discriminant analysis ,Machine learning ,ComputingMethodologies_PATTERNRECOGNITION ,0202 electrical engineering, electronic engineering, information engineering ,Neighbor classifier ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,Natural language processing ,media_common - Abstract
This paper shows the automatic classification of research papers published in Scopus. Our classification is based on the research lines of the university. We apply the K-nearest neighbor classifier and linear discriminant analysis (LDA). Various stages were used from information gathering, creating the vocabulary, pre-processing and data training, and supervised classification in this work. The experiment involved 596 research articles published in SCOPUS from 2003–2017. The results show an overall accuracy of 88.44%.
- Published
- 2021
27. An Information Literacy Framework Through the Conference Paper Format in the Undergraduate Engineering Curriculum
- Author
-
Eveling Castro and Elizabeth Vidal
- Subjects
Higher education ,business.industry ,Computer science ,Technical writing ,Information literacy ,020206 networking & telecommunications ,02 engineering and technology ,Active learning ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics education ,020201 artificial intelligence & image processing ,Undergraduate engineering ,Set (psychology) ,business ,Curriculum - Abstract
This paper shares our experience in developing information literacy skills through a framework based on writing papers in the IEEE format conference. The framework gave students, in an active learning style, a set of activities to identify the need for information, procure the information, evaluate the information and subsequently revise the strategy for obtaining the information, and to use it in an ethical manner to produce a technical paper. We followed the ACRL’s Information Literacy Competency Standards for Higher Education in the development of an assessment tool, course content, and exercises. Initial results show that the proposed framework developed information literacy skills in a maturing stage. We believe that this experience and the design of the framework could be replicated or adapted to different Engineering Careers.
- Published
- 2021
28. Coreference Resolution in Research Papers from Multiple Domains
- Author
-
Ralph Ewerth, Daniel Uwe Müller, Anett Hoppe, and Arthur Brack
- Subjects
0301 basic medicine ,education.field_of_study ,Coreference ,Computer science ,business.industry ,Population ,02 engineering and technology ,Resolution (logic) ,computer.software_genre ,Task (project management) ,03 medical and health sciences ,Information extraction ,030104 developmental biology ,0202 electrical engineering, electronic engineering, information engineering ,Question answering ,020201 artificial intelligence & image processing ,Artificial intelligence ,education ,F1 score ,Transfer of learning ,business ,computer ,Natural language processing - Abstract
Coreference resolution is essential for automatic text understanding to facilitate high-level information retrieval tasks such as text summarisation or question answering. Previous work indicates that the performance of state-of-the-art approaches (e.g. based on BERT) noticeably declines when applied to scientific papers. In this paper, we investigate the task of coreference resolution in research papers and subsequent knowledge graph population. We present the following contributions: (1) We annotate a corpus for coreference resolution that comprises 10 different scientific disciplines from Science, Technology, and Medicine (STM); (2) We propose transfer learning for automatic coreference resolution in research papers; (3) We analyse the impact of coreference resolution on knowledge graph (KG) population; (4) We release a research KG that is automatically populated from 55,485 papers in 10 STM domains. Comprehensive experiments show the usefulness of the proposed approach. Our transfer learning approach considerably outperforms state-of-the-art baselines on our corpus with an F1 score of 61.4 (+11.0), while the evaluation against a gold standard KG shows that coreference resolution improves the quality of the populated KG significantly with an F1 score of 63.5 (+21.8).
- Published
- 2021
29. S2CFT: A New Approach for Paper Submission Recommendation
- Author
-
Dac Nguyen, Binh T. Nguyen, Son T. Huynh, Phong Thu Nguyen Huynh, and Cuong V. Dinh
- Subjects
Measure (data warehouse) ,Computer science ,02 engineering and technology ,Recommender system ,computer.software_genre ,Convolutional neural network ,GeneralLiterature_MISCELLANEOUS ,Term (time) ,Recommendation model ,03 medical and health sciences ,0302 clinical medicine ,030221 ophthalmology & optometry ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Data mining ,computer - Abstract
There have been a massive number of conferences and journals in computer science that create a lot of difficulties for scientists, especially for early-stage researchers, to find the most suitable venue for their scientific submission. In this paper, we present a novel approach for building a paper submission recommendation system by using two different types of embedding methods, GloVe and FastText, as well as Convolutional Neural Network (CNN) and LSTM to extract useful features for a paper submission recommendation model. We consider seven combinations of initial attributes from a given submission: title, abstract, keywords, title + keyword, title + abstract, keyword + abstract, and title + keyword + abstract. We measure these approaches’ performance on one dataset, presented by Wang et al., in terms of top K accuracy and compare our methods with the S2RSCS model, the state-of-the-art algorithm on this dataset. The experimental results show that CNN + FastText can outperform other approaches (CNN + GloVe, LSTM + GloVe, LSTM + FastText, S2RSCS) in term of top 1 accuracy for seven types of input data. Without using a list of keywords in the input data, CNN + GloVe/FastText can surpass other techniques. It has a bit lower performance than S2RSCS in terms of the top 3 and top 5 accuracies when using the keyword information. Finally, the combination of S2RSCS and CNN + FastText, namely S2CFT, can create a better model that bypasses all other methods by top K accuracy (K = 1,3,5,10).
- Published
- 2021
30. Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT
- Author
-
Xuan Wang, Junbin Fang, Frankie Li, Jing Li, Yun Ju Huang, and Yang Xiang
- Subjects
Computer science ,business.industry ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Cybercrime ,Mobile security ,General Data Protection Regulation ,0202 electrical engineering, electronic engineering, information engineering ,Ransomware ,Position paper ,Detection performance ,Internet of Things ,business ,computer - Abstract
There is a large number of high-profile cyberattacks identified in the year of 2017, i.e., Ransomware attacks are one of the areas of cybercrime growing the fastest. These increasingly sophisticated cyberattacks are forcing various organisations to face security challenges and invest money building security and trust models. There will also be an increase in the use of recent development of security solutions that can help improve the detection performance and react to malicious events. In this position paper, we mainly introduce recent development trends in cybersecurity, including legal issues (e.g., GDPR), Artificial intelligence (AI), Mobile security and Internet of Things.
- Published
- 2018
31. Position Paper on Blockchain Technology: Smart Contract and Applications
- Author
-
Weizhi Meng, Zuoxia Yu, Sherman S. M. Chow, Joseph K. Liu, Jin Li, Jianfeng Wang, Yongjun Zhao, and Xianmin Wang
- Subjects
Cryptocurrency ,Blockchain ,Smart contract ,Computer science ,business.industry ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Component (UML) ,0202 electrical engineering, electronic engineering, information engineering ,Position paper ,020201 artificial intelligence & image processing ,business ,Database transaction ,computer ,Financial services ,Risk management - Abstract
Blockchain technology enables a transaction to be handled in a decentralized fashion. In this position paper, we aim to introduce the background of blockchain technology, discuss one of its important component — smart contract, and present its recent applications in many fields such as cryptocurrency, financial services, risk management, and Internet of Things.
- Published
- 2018
32. Short Paper: How Do People Choose a Means for Communication in Disaster Situations?
- Author
-
Hiroshi Watanabe and Masayuki Ihara
- Subjects
Modalities ,Computer science ,business.industry ,05 social sciences ,Internet privacy ,Short paper ,0202 electrical engineering, electronic engineering, information engineering ,020207 software engineering ,0501 psychology and cognitive sciences ,02 engineering and technology ,business ,050107 human factors ,Variety (cybernetics) - Abstract
In disaster situations, people try to communicate with acquaintances for a variety of reasons. In general, they try to immediately communicate with family or important friends to confirm their safety. To understand the damage situation, they may try to communicate with neighbors whom they don’t often communicate with in daily life. This paper introduces the results of surveys of people who experienced the Great East Japan Earthquake, 2011 and the Kumamoto Earthquake, 2016 in Japan to discover what communication modalities were used and why they were chosen.
- Published
- 2018
33. Learning by Reviewing Paper-Based Programming Assessments
- Author
-
Yancy Vance M. Paredes, David Azcona, Alan F. Smeaton, and I-Han Hsiao
- Subjects
Class (computer programming) ,05 social sciences ,Educational technology ,050301 education ,02 engineering and technology ,Paper based ,Educational data mining ,Consistency (negotiation) ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics education ,Retrospective analysis ,020201 artificial intelligence & image processing ,Behavioral analytics ,Digital learning ,Psychology ,0503 education - Abstract
This paper presents a retrospective analysis of students’ use of self-regulated learning strategies while using an educational technology that connects physical and digital learning spaces. A classroom study was carried out in a Data Structures & Algorithms course offered by the School of Computer Science. Students’ reviewing behaviors were logged and the associated learning impacts were analyzed by monitoring their progress throughout the course. The study confirmed that students who had an improvement in their performance spent more time and effort reviewing formal assessments, particularly their mistakes. These students also demonstrated consistency in their reviewing behavior throughout the semester. In contrast, students who fell behind in class ineffectively reviewed their graded assessments by focusing mostly on what they already knew instead of their knowledge misconceptions.
- Published
- 2018
34. Generative Program Analysis and Beyond: The Power of Domain-Specific Languages (Invited Paper)
- Author
-
Bernhard Steffen and Alnis Murtovi
- Subjects
050101 languages & linguistics ,Domain-specific language ,Binary decision diagram ,Generalization ,Computer science ,Programming language ,05 social sciences ,02 engineering and technology ,Mathematical proof ,computer.software_genre ,Operational semantics ,Program analysis ,Component (UML) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Temporal logic ,computer - Abstract
In this paper we position Linear Time Temporal Logic (LTL), structural operational semantics (SOS), and a graphical generalization of BNF as central DSLs for program analysis and verification tasks in order to illustrate the impact of language to the mindset: (1) Specifying program analyses in LTL changes the classical algorithmic ‘HOW’ thinking into a property-oriented ‘WHAT’ thinking that allows one to logically combine analysis goals and eases proofs. (2) Playing with the original store component in SOS configurations allows one to elegantly realize variants of abstract program interpretations, and to align different aspects, like e.g., the symbolic values of variables and path conditions. (3) Specializing languages by refining their BNF-like meta models has the power to lift certain verification tasks from the program to the programming language level. We will illustrate the advantages of the change of mindset imposed by these three DSLs, as well as the fact that these advantages come at low price due to available adequate generator technology.
- Published
- 2021
35. Fundamental Study for Estimating Shear Strength Parameters of Fiber-Cement-Stabilized Soil by Using Paper Debris
- Author
-
Tomoaki Satomi, Kazumi Ryuo, and Hiroshi Takahashi
- Subjects
Cement ,Materials science ,020209 energy ,02 engineering and technology ,Debris ,Grain size ,020401 chemical engineering ,Particle-size distribution ,0202 electrical engineering, electronic engineering, information engineering ,Shear strength ,Cohesion (geology) ,Geotechnical engineering ,Direct shear test ,Fiber ,0204 chemical engineering - Abstract
A large amount of high water content mud is generated at civil engineering works and disaster sites, and the high water content mud is subjected to dehydration treatment and finally disposed in landfills. As for a method of recycling high water content mud, fiber-cement-stabilized soil method has been developed. Failure strength and failure strain of fiber-cement-stabilized soil have been investigated through unconfined compression test. However, there are few measured data of the shear strength parameters compared to failure strength and failure strain. In this study, to evaluate shear strength parameters of fiber-cement-stabilized soil, box shear test and unconfined compression test are conducted with different additive amount of cement and paper debris to clarify the effect of additive conditions on the shear strength parameters of modified soil. Furthermore, the improvement was performed on mud with different particle size distribution, and the effect of the difference in soil properties on the shear strength parameters was clarified. The results showed that the internal friction angle increased as increasing the amount of paper debris. In addition, when the additive amount of cement increased, the cohesion increased. In the case of unconfined compression test, it was confirmed that the failure strength and failure strain tended to increase due to the increase of the additive amount of cement and paper debris. Furthermore, it is suggested that the shear strength parameters of fiber-cement-stabilized soil has close relationship with the grain size characteristics of mud.
- Published
- 2020
36. Developing Fiber and Mineral Based Composite Materials from Paper Manufacturing By-Products
- Author
-
Mark Jolly and Cynthia Adu
- Subjects
Sustainable materials ,Materials science ,business.industry ,020209 energy ,Paper mill ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Paper mill sludge ,Waste recovery ,Technical feasibility ,0202 electrical engineering, electronic engineering, information engineering ,Sewage treatment ,Fiber ,Cementitious ,Composite material ,Cellulose ,0210 nano-technology ,business ,Paper manufacturing - Abstract
Developing valuable materials from the by-products of paper industry can help to address some environmental and economic issues associated with traditional synthetic composites. Particularly, the management of paper mill sludge (PMS) waste remains an economic and environmental challenge for the pulp and paper industry. 11 million tons of PMS is generated annually in Europe from the wastewater treatment (WWT) process of paper mills. PMS is mostly used in low value applications. However, PMS contains fibers and minerals with physio-chemical properties that exhibit a high potential to substitute some conventional materials in other industries. The research presented in this paper aims to explore new directions for further investigation on PMS material applications by reviewing the literature on PMS materials and subsequently characterizing sludge from 6 different mills. The study shows the technical feasibility, opportunities and technological readiness of fiber and mineral based composites obtained from PMS, such as; cementitious products, polymer reinforcement and fiberboards.
- Published
- 2017
37. Short Paper: Strategic Contention Resolution in Multiple Channels with Limited Feedback
- Author
-
Themistoklis Melissourgos, George Christodoulou, and Paul G. Spirakis
- Subjects
TheoryofComputation_MISCELLANEOUS ,Computer Science::Computer Science and Game Theory ,business.industry ,Network packet ,Computer science ,Short paper ,020206 networking & telecommunications ,02 engineering and technology ,Resolution (logic) ,Time optimal ,Telecommunications network ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Latency (engineering) ,business ,Game theory ,Protocol (object-oriented programming) ,Computer network - Abstract
We consider a game-theoretic setting of contention in communication networks. In a contention game each of \(n \ge 2\) identical players has a single information packet that she wants to transmit in a fast and selfish way through one of \(k \ge 1\) multiple-access channels by choosing a protocol. Here, we extend the model and results of the single-channel case studied in [2] by providing equilibria characterizations for more than one channels, and giving specific anonymous, equilibrium protocols with finite and infinite expected latency. For our equilibrium protocols with infinite expected latency, all players, with high probability transmit successfully in optimal time, i.e. \(\varTheta (n/k)\).
- Published
- 2018
38. Paper Co-citation Analysis Using Semantic Similarity Measures
- Author
-
Mohamed Ben Aouicha, Mohamed Ali Hadj Taieb, and Houcemeddine Turki
- Subjects
Citation network ,Computer science ,business.industry ,Lexical similarity ,Judgement ,WordNet ,02 engineering and technology ,Bibliometrics ,computer.software_genre ,Co-citation ,Semantic similarity ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,computer ,Natural language processing - Abstract
Co-citation analysis can be exploited as a bibliometric technique used for mining information on the relationships between scientific papers. Proposed methods rely, however, on co-citation counting techniques that slightly take the semantic aspect into consideration. The present study proposes a new technique based on the measure of Semantic Similarity (SS) between the titles of co-cited papers. Several computational measures rely on knowledge resources to quantify the semantic similarity, such as the WordNet «is a» taxonomy. Our proposal analyzes the SS between the titles of co-cited papers using word-based SS measures. Two major analytical experiments are performed: the first includes the benchmarks designed for testing word-based SS measures; the second exploits the dataset DBLP (DBLP: Digital Bibliography & Library Project.) citation network. As a result, we found the SS measures behave the same as human judgement for the lexical similarity and can be consequently used for the automatic assessment of similarity between co-cited papers. The analysis of highly repeated co-citations demonstrates that the different SS measures display almost similar behaviours, with slight differences due to the distribution of the provided SS values. Furthermore, we note a low percentage of similar referred papers into the co-citations.
- Published
- 2020
39. Conference paper
- Author
-
Michael Goldsmith, Mary K. Bispham, Ioannis Agrafiotis, Mori, P, Furnell, S, and Camp, O
- Subjects
Exploit ,Computer science ,05 social sciences ,Natural language understanding ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Dialogue management ,050105 experimental psychology ,Speech interface ,Adversarial system ,OODA loop ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,computer - Abstract
This paper presents an attack and defence modelling framework for conceptualising the security of the speech interface. The modelling framework is based on the Observe-Orient-Decide-Act (OODA) loop model, which has been used to analyse adversarial interactions in a number of other areas. We map the different types of attacks that may be executed via the speech interface to the modelling framework, and present a critical analysis of the currently available defences for countering such attacks, with reference to the modelling framework. The paper then presents proposals for the development of new defence mechanisms that are grounded in the critical analysis of current defences. These proposals envisage a defence capability that would enable voice-controlled systems to detect potential attacks as part of their dialogue management functionality. In accordance with this high-level defence concept, the paper presents two specific proposals for defence mechanisms to be implemented as part of dialogue management functionality to counter attacks that exploit unintended functionality in speech recognition functionality and natural language understanding functionality. These defence mechanisms are based on the novel application of two existing technologies for security purposes. The specific proposals include the results of two feasibility tests that investigate the effectiveness of the proposed mechanisms in defending against the relevant type of attack.
- Published
- 2020
40. Interpolation-Based Learning as a Mean to Speed-Up Bounded Model Checking (Short Paper)
- Author
-
Paolo Camurati, Danilo Vendraminetto, Gianpiero Cabodi, Paolo Pasini, and Marco Palena
- Subjects
Model checking ,Theoretical computer science ,Speedup ,Computer science ,Short paper ,02 engineering and technology ,020202 computer hardware & architecture ,Section (archaeology) ,Computer Science::Logic in Computer Science ,Bounded function ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Invariant (mathematics) ,Algorithm ,Hardware_LOGICDESIGN ,Interpolation - Abstract
In this paper (This is a short paper accepted in the new ideas and work-in-progress section of SEFM 2017.) we introduce a technique to improve the efficiency of SAT calls in Bounded Model Checking (BMC) problems. The proposed technique is based on exploiting interpolation-based invariants as redundant constraints for BMC.
- Published
- 2017
41. Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper)
- Author
-
Orhio Mark Creado and Phu Dung Le
- Subjects
Intelligent robots ,Computer science ,020204 information systems ,Distributed computing ,Component (UML) ,Short paper ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,020201 artificial intelligence & image processing ,02 engineering and technology ,Enterprise information security architecture ,Inclusion (education) - Abstract
Domestic robots are vulnerable to hi-jacking and industrial robots are vulnerable to cyber-attacks. This paper proposes the integration of a security component into a robots’ system to minimise security risks. This objective is achieved through the inclusion of several monitors such as functional monitor, communication monitor and behavioural monitor, which assess the internal operations of the system at low levels of operation. Through this approach, the paper proposes a novel framework which will make it hard for robots to be hi-jacked or, at the very least, make it more difficult for attacks on their behaviour.
- Published
- 2017
42. Risk-Driven Compliance Assurance for Collaborative AI Systems: A Vision Paper
- Author
-
Barbara Russo, Michael Felderer, Dominik T. Matt, Angelo Susi, Andrea Giusti, Matteo Camilli, and Anna Perini
- Subjects
Shared space ,050101 languages & linguistics ,Process management ,business.industry ,Computer science ,media_common.quotation_subject ,05 social sciences ,Context (language use) ,02 engineering and technology ,GeneralLiterature_MISCELLANEOUS ,Domain (software engineering) ,Compliance (psychology) ,Leverage (negotiation) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Quality (business) ,business ,Risk management ,Ai systems ,media_common - Abstract
Context and motivation. Collaborative AI systems aim at working together with humans in a shared space. Building these systems, which comply with quality requirements, domain specific standards and regulations is a challenging research direction. This challenge is even more exacerbated for new generation of systems that leverage on machine learning components rather than deductive (top-down programmed) AI.
- Published
- 2021
43. Abstractions for Polyhedral Topology-Aware Tasking [Position Paper]
- Author
-
Martin Kong
- Subjects
050101 languages & linguistics ,Computer science ,05 social sciences ,Locality ,02 engineering and technology ,Parallel computing ,Lexicographical order ,Grid ,Pipeline (software) ,Euclidean distance ,0202 electrical engineering, electronic engineering, information engineering ,Parallelism (grammar) ,Polytope model ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Integer programming - Abstract
Traditional polyhedral compilation techniques rely on Integer Linear Programming (ILP) and lexicographic optimization to compute optimal transformations. Although, these techniques excel at exposing and leveraging data and pipeline parallelism as well as exploiting (hidden) available locality, they are not the best suited when tackling problems such as the Manhattan distance in a grid.
- Published
- 2021
44. Toward Interactive Attribute Selection with Infolattices – A Position Paper
- Author
-
Andrzej Janusz, Marek Grzegorowski, Dominik Ślęzak, and Sebastian Stawicki
- Subjects
Information retrieval ,Computer science ,business.industry ,Feature selection ,Context (language use) ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Data visualization ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Formal concept analysis ,Position paper ,020201 artificial intelligence & image processing ,Rough set ,business - Abstract
We discuss a new approach to interactive exploration of high-dimensional data sets which is aimed at building human’s understanding of the data by iterative additions of recommended attributes and objects that can together represent a context in which it may be useful to analyze the data. We identify challenges and expected benefits that our methodology can bring to the users. We also show how our ideas got inspired by Formal Concept Analysis (FCA) and Rough Set Theory (RST). It is though worth emphasizing that this particular paper is not aimed at investigating relationships between FCA and RST. Instead, the goal is to discuss which algorithmic methods developed within FCA and RST could be reused for the purpose of our approach.
- Published
- 2017
45. An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper)
- Author
-
Meiqi Tian, Junnan Wang, Wang Zhi, and Chunfu Jia
- Subjects
021110 strategic, defence & security studies ,Concept drift ,Horizontal and vertical ,Computer science ,business.industry ,Core component ,Short paper ,0211 other engineering and technologies ,02 engineering and technology ,computer.software_genre ,Machine learning ,Ensemble learning ,Hybrid system ,0202 electrical engineering, electronic engineering, information engineering ,Malware ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Gradient descent ,computer - Abstract
Machine learning is widely used in malware detection systems as a core component. However, machine learning algorithm is based on the assumption that the underlying malware concept is stable for training and testing. The assumption is vulnerable to well-crafted concept drift attacks, such as mimicry attacks, gradient descent attacks, poisoning attacks and so on. This paper proposes an ensemble learning system which combines vertical and horizontal correlation learning models. The significant diversity among vertical and horizontal correlation models increases the difficulty of concept drift attacks. And average p-value assessment is applied to fortify the system to be sensitive to hidden concept drift. The experiment results show that the hybrid system could actively recognize the concept drift among different Miuref variants.
- Published
- 2017
46. Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers
- Author
-
Mohammad Mannan and Nayanamana Samarasinghe
- Subjects
Web server ,computer.internet_protocol ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Short paper ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,IPv4 ,Networking hardware ,Preliminary analysis ,SCADA ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Search interface ,Internet of Things ,business ,computer - Abstract
Recently, high-speed IPv4 scanners, such as ZMap, have enabled rapid and timely collection of TLS certificates and other security-sensitive parameters. Such large datasets led to the development of the Censys search interface, facilitating comprehensive analysis of TLS deployments in the wild. Several recent studies analyzed TLS certificates as deployed in web servers. Beyond public web servers, TLS is deployed in many other Internet-connected devices, at home and enterprise environments, and at network backbones. In this paper, we report the results of a preliminary analysis using Censys on TLS deployments in such devices (e.g., routers, modems, NAS, printers, SCADA, and IoT devices in general). We compare certificates and TLS connection parameters from a security perspective, as found in common devices with Alexa 1M sites. Our results highlight significant weaknesses, and may serve as a catalyst to improve TLS security for these devices.
- Published
- 2017
47. Justifying Security Measures — a Position Paper
- Author
-
Cormac Herley
- Subjects
Computer science ,020204 information systems ,Brake ,0202 electrical engineering, electronic engineering, information engineering ,Position paper ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,computer - Abstract
There is a problem with the way we reason about problems in security. The justifications that we offer for many security measures reduce to unfalsifiable claims or circular statements. This position paper argues that reliance on less-than-solid arguments acts as a brake on progress in security.
- Published
- 2017
48. Towards Inverse Uncertainty Quantification in Software Development (Short Paper)
- Author
-
Carlo Bellettini, Patrizia Scandurra, Angelo Gargantini, and Matteo Camilli
- Subjects
Online model ,021103 operations research ,Computer science ,business.industry ,Calibration (statistics) ,Short paper ,0211 other engineering and technologies ,Software development ,Inverse ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Bayesian inference ,Formal specification ,0202 electrical engineering, electronic engineering, information engineering ,Data mining ,Uncertainty quantification ,business ,computer - Abstract
With the purpose of delivering more robust systems, this paper revisits the problem of Inverse Uncertainty Quantification that is related to the discrepancy between the measured data at runtime (while the system executes) and the formal specification (i.e., a mathematical model) of the system under consideration, and the value calibration of unknown parameters in the model. We foster an approach to quantify and mitigate system uncertainty during the development cycle by combining Bayesian reasoning and online Model-based testing.
- Published
- 2017
49. Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper)
- Author
-
Jin Li, Yong Xiang, Wanlei Zhou, Kun Wang, Shui Yu, Bo Liu, and Yu Wang
- Subjects
Community based ,Scheme (programming language) ,Focus (computing) ,Computer science ,Information sharing ,Short paper ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Location prediction ,Mobile social network ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,computer ,computer.programming_language - Abstract
Location privacy has drawn much attention among mobile social network users, as the geo-location information can be used by the adversaries to launch localization attacks which focus on finding people’s sensitive locations such as home and office place. In this paper, we propose a community based information sharing scheme to help the users to protect their home locations. First, we study the existing home location prediction algorithms and conclude that they are all mainly based on the spatial and temporal features of the check-in data. Then we design the community based information sharing scheme which aggregates the check-ins of all community members, thus change the overall spatial and temporal features. Finally, our simulation results validate that our proposed scheme greatly reduces the home location predication accuracy and therefore can protect the user’s privacy effectively.
- Published
- 2017
50. X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper
- Author
-
Toan Nguyen, Nasir Memon, and Hossein Siadati
- Subjects
060201 languages & linguistics ,business.industry ,Computer science ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,Phishing attack ,Internet privacy ,Short paper ,06 humanities and the arts ,02 engineering and technology ,Service provider ,Computer security ,computer.software_genre ,Phishing ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,0602 languages and literature ,0202 electrical engineering, electronic engineering, information engineering ,ComputingMilieux_COMPUTERSANDSOCIETY ,020201 artificial intelligence & image processing ,business ,computer - Abstract
The goal of anti-phishing techniques is to reduce the delivery rate of phishemails, and anti-phishing training aims to decrease the phishing click-through rates. This paper presents the X-Platform Phishing Attack, a deceptive phishing attack with an alarmingly high delivery and click-through rates, and highlights a subclass of phishing attacks that existing anti-phishing methods do not seem to be able to address. The main characteristic of this attack is that an attacker is able to embed a malicious link within a legitimate message generated by service providers (e.g., Github, Google, Amazon) and sends it using their infrastructure to his targets. This technique results in the bypassing of existing anti-phishing filters because it utilizes reputable service providers to generate seemingly legitimate emails. This also makes it highly likely for the targets of the attack to click on the phishing link as the email id of a legitimate provider is being used. An X-Platform Phishing attack can use email-based messaging and notification mechanisms such as friend requests, membership invitations, status updates, and customizable gift cards to embed and deliver phishing links to their targets. We have tested the delivery and click-through rates of this attack experimentally, based on a customized phishing email tunneled through GitHub’s pull-request mechanism. We observed that 100% of X-Platform Phishing emails passed the anti-phishing systems and were delivered to the inbox of the target subjects. All of the participants clicked on phishing messages, and in some cases, forwarded the message to other project collaborators who also clicked on the phishing links.
- Published
- 2017
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.