The search functionality is under construction.

Keyword Search Result

[Keyword] detection(1281hit)

181-200hit(1281hit)

  • Against Insider Threats with Hybrid Anomaly Detection with Local-Feature Autoencoder and Global Statistics (LAGS)

    Minhae JANG  Yeonseung RYU  Jik-Soo KIM  Minkyoung CHO  

     
    LETTER-Dependable Computing

      Pubricized:
    2020/01/10
      Vol:
    E103-D No:4
      Page(s):
    888-891

    Internal user threats such as information leakage or system destruction can cause significant damage to the organization, however it is very difficult to prevent or detect this attack in advance. In this paper, we propose an anomaly-based insider threat detection method with local features and global statistics over the assumption that a user shows different patterns from regular behaviors during harmful actions. We experimentally show that our detection mechanism can achieve superior performance compared to the state of the art approaches for CMU CERT dataset.

  • The Role of Accent and Grouping Structures in Estimating Musical Meter

    Han-Ying LIN  Chien-Chieh HUANG  Wen-Whei CHANG  Jen-Tzung CHIEN  

     
    PAPER-Engineering Acoustics

      Vol:
    E103-A No:4
      Page(s):
    649-656

    This study presents a new method to exploit both accent and grouping structures of music in meter estimation. The system starts by extracting autocorrelation-based features that characterize accent periodicities. Based on the local boundary detection model, we construct grouping features that serve as additional cues for inferring meter. After the feature extraction, a multi-layer cascaded classifier based on neural network is incorporated to derive the most likely meter of input melody. Experiments on 7351 folk melodies in MIDI files indicate that the proposed system achieves an accuracy of 95.76% for classification into nine categories of meters.

  • A Deep Neural Network-Based Approach to Finding Similar Code Segments

    Dong Kwan KIM  

     
    LETTER-Software Engineering

      Pubricized:
    2020/01/17
      Vol:
    E103-D No:4
      Page(s):
    874-878

    This paper presents a Siamese architecture model with two identical Convolutional Neural Networks (CNNs) to identify code clones; two code fragments are represented as Abstract Syntax Trees (ASTs), CNN-based subnetworks extract feature vectors from the ASTs of pairwise code fragments, and the output layer produces how similar or dissimilar they are. Experimental results demonstrate that CNN-based feature extraction is effective in detecting code clones at source code or bytecode levels.

  • Social Behavior Analysis and Thai Mental Health Questionnaire (TMHQ) Optimization for Depression Detection System

    Konlakorn WONGAPTIKASEREE  Panida YOMABOOT  Kantinee KATCHAPAKIRIN  Yongyos KAEWPITAKKUN  

     
    PAPER

      Pubricized:
    2020/01/21
      Vol:
    E103-D No:4
      Page(s):
    771-778

    Depression is a major mental health problem in Thailand. The depression rates have been rapidly increasing. Over 1.17 million Thai people suffer from this mental illness. It is important that a reliable depression screening tool is made available so that depression could be early detected. Given Facebook is the most popular social network platform in Thailand, it could be a large-scale resource to develop a depression detection tool. This research employs techniques to develop a depression detection algorithm for the Thai language on Facebook where people use it as a tool for sharing opinions, feelings, and life events. To establish the reliable result, Thai Mental Health Questionnaire (TMHQ), a standardized psychological inventory that measures major mental health problems including depression. Depression scale of the TMHQ comprises of 20 items, is used as the baseline for concluding the result. Furthermore, this study also aims to do factor analysis and reduce the number of depression items. Data was collected from over 600 Facebook users. Descriptive statistics, Exploratory Factor Analysis, and Internal consistency were conducted. Results provide the optimized version of the TMHQ-depression that contain 9 items. The 9 items are categorized into four factors which are suicidal ideation, sleep problems, anhedonic, and guilty feelings. Internal consistency analysis shows that this short version of the TMHQ-depression has good to excellent reliability (Cronbach's alpha >.80). The findings suggest that this optimized TMHQ-depression questionnaire holds a good psychometric property and can be used for depression detection.

  • Mal2d: 2d Based Deep Learning Model for Malware Detection Using Black and White Binary Image

    Minkyoung CHO  Jik-Soo KIM  Jongho SHIN  Incheol SHIN  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/12/25
      Vol:
    E103-D No:4
      Page(s):
    896-900

    We propose an effective 2d image based end-to-end deep learning model for malware detection by introducing a black & white embedding to reserve bit information and adapting the convolution architecture. Experimental results show that our proposed scheme can achieve superior performance in both of training and testing data sets compared to well-known image recognition deep learning models (VGG and ResNet).

  • Salient Region Detection with Multi-Feature Fusion and Edge Constraint

    Cheng XU  Wei HAN  Dongzhen WANG  Daqing HUANG  

     
    LETTER-Pattern Recognition

      Pubricized:
    2020/01/17
      Vol:
    E103-D No:4
      Page(s):
    910-913

    In this paper, we propose a salient region detection method with multi-feature fusion and edge constraint. First, an image feature extraction and fusion network based on dense connection structure and multi-channel convolution channel is designed. Then, a multi-scale atrous convolution block is applied to enlarge reception field. Finally, to increase accuracy, a combined loss function including classified loss and edge loss is built for multi-task training. Experimental results verify the effectiveness of the proposed method.

  • Receiver Differential Code Bias Estimation under Disturbed Ionosphere Status Using Linear Planar Model Based Minimum Standard Deviation Searching Method with Bias Detection Open Access

    Yan ZHANG  Lei CHEN  Xiaomei TANG  Gang OU  

     
    PAPER-Satellite Communications

      Pubricized:
    2019/09/20
      Vol:
    E103-B No:3
      Page(s):
    272-282

    Differential code biases (DCBs) are important parameters that must be estimated accurately for precise positioning and Satellite Based Augmentation Systems (SBAS) ionospheric related parameter generation. In this paper, in order to solve the performance degradation problem of the traditional minimum STD searching algorithm in disturbed ionosphere status and in geomagnetic low latitudes, we propose a linear planar based minimum STD searching algorithm. Firstly, we demonstrate the linear planar trend of the local vertical TEC and introduce the linear planar model based minimum standard variance searching method. Secondly, we validate the correctness of our proposed method through theoretical analysis and propose bias detection to avoid large estimation bias. At last, we show the performance of our proposed method under different geomagnetic latitudes, different seasons and different ionosphere status. The experimental results show that for the traditional minimum STD searching algorithm based on constant model, latitude difference is the key factor affecting the performance of DCB estimation. The DCB estimation performance in geomagnetic mid latitudes is the best, followed by the high latitudes and the worst is for the low latitudes. While the algorithm proposed in this paper can effectively solve the performance degradation problem of DCB estimation in geomagnetic low latitudes by using the linear planar model which is with a higher degree of freedom to model the local ionosphere characteristics and design dJ to screen the epochs. Through the analysis of the DCB estimation results of a large number of stations, it can be found that the probability of large estimation deviation of the traditional method will increase obviously under the disturb ionosphere conditions, but the algorithm we proposed can effectively control the amplitude of the maximum deviation and alleviate the probability of large estimation deviation in disturb ionosphere status.

  • ASAN: Self-Attending and Semantic Activating Network towards Better Object Detection

    Xinyu ZHU  Jun ZHANG  Gengsheng CHEN  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2019/11/25
      Vol:
    E103-D No:3
      Page(s):
    648-659

    Recent top-performing object detectors usually depend on a two-stage approach, which benefits from its region proposal and refining practice but suffers low detection speed. By contrast, one-stage approaches have the advantage of high efficiency while sacrifice their accuracies to some extent. In this paper, we propose a novel single-shot object detection network which inherits the merits of both. Motivated by the idea of semantic enrichment to the convolutional features within a typical deep detector, we propose two novel modules: 1) by modeling the semantic interactions between channels and the long-range dependencies between spatial positions, the self-attending module generates both channel and position attention, and enhance the original convolutional features in a self-guided manner; 2) leveraging the class-discriminative localization ability of classification-trained CNN, the semantic activating module learns a semantic meaningful convolutional response which augments low-level convolutional features with strong class-specific semantic information. The so called self-attending and semantic activating network (ASAN) achieves better accuracy than two-stage methods and is able to fulfil real-time processing. Comprehensive experiments on PASCAL VOC indicates that ASAN achieves state-of-the-art detection performance with high efficiency.

  • Malicious Code Detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption Open Access

    Ziwang WANG  Yi ZHUANG  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/09/20
      Vol:
    E103-B No:3
      Page(s):
    155-166

    Currently, mobile terminals face serious security threats. A Trusted Execution Environment (TEE) which can provide an isolated execution environment for sensitive workloads, is seen as a trusted relay for providing security services for any mobile application. However, mobile TEE's architecture design and implementation strategy are not unbreakable at present. The existing researches lack of detect mechanisms for attack behaviour and malicious software. This paper proposes a Malicious code Detection scheme for Trusted Execution Environment based on Homomorphic Encryption (HE-TEEMD), which is a novel detection mechanism for data and code in the trusted execution environment. HE-TEEMD uses the Paillier additive homomorphic algorithm to implement the signature matching and transmits the ciphertext information generated in the TEE to the normal world for detection by the homomorphism and randomness of the homomorphic encryption ciphertext. An experiment and security analysis proves that our scheme can achieve malicious code detection in the secure world with minimal cost. Furthermore, evaluation parameters are introduced to address the known plaintext attack problem of privileged users.

  • A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images

    Joanna Kazzandra DUMAGPI  Woo-Young JUNG  Yong-Jin JEONG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/10/23
      Vol:
    E103-D No:2
      Page(s):
    454-458

    Threat object recognition in x-ray security images is one of the important practical applications of computer vision. However, research in this field has been limited by the lack of available dataset that would mirror the practical setting for such applications. In this paper, we present a novel GAN-based anomaly detection (GBAD) approach as a solution to the extreme class-imbalance problem in multi-label classification. This method helps in suppressing the surge in false positives induced by training a CNN on a non-practical dataset. We evaluate our method on a large-scale x-ray image database to closely emulate practical scenarios in port security inspection systems. Experiments demonstrate improvement against the existing algorithm.

  • A Survey on Mobile Malware Detection Techniques

    Vasileios KOULIARIDIS  Konstantia BARMPATSALOU  Georgios KAMBOURAKIS  Shuhong CHEN  

     
    INVITED PAPER

      Pubricized:
    2019/11/27
      Vol:
    E103-D No:2
      Page(s):
    204-211

    Modern mobile devices are equipped with a variety of tools and services, and handle increasing amounts of sensitive information. In the same trend, the number of vulnerabilities exploiting mobile devices are also augmented on a daily basis and, undoubtedly, popular mobile platforms, such as Android and iOS, represent an alluring target for malware writers. While researchers strive to find alternative detection approaches to fight against mobile malware, recent reports exhibit an alarming increase in mobile malware exploiting victims to create revenues, climbing towards a billion-dollar industry. Current approaches to mobile malware analysis and detection cannot always keep up with future malware sophistication [2],[4]. The aim of this work is to provide a structured and comprehensive overview of the latest research on mobile malware detection techniques and pinpoint their benefits and limitations.

  • Constant-Q Deep Coefficients for Playback Attack Detection

    Jichen YANG  Longting XU  Bo REN  

     
    LETTER-Speech and Hearing

      Pubricized:
    2019/11/14
      Vol:
    E103-D No:2
      Page(s):
    464-468

    Under the framework of traditional power spectrum based feature extraction, in order to extract more discriminative information for playback attack detection, this paper proposes a feature by making use of deep neural network to describe the nonlinear relationship between power spectrum and discriminative information. Namely, constant-Q deep coefficients (CQDC). It relies on constant-Q transform, deep neural network and discrete cosine transform. In which, constant-Q transform is used to convert signal from the time domain into the frequency domain because it is a long-term transform that can provide more frequency detail, deep neural network is used to extract more discriminative information to discriminate playback speech from genuine speech and discrete cosine transform is used to decorrelate among the feature dimensions. ASVspoof 2017 corpus version 2.0 is used to evaluate the performance of CQDC. The experimental results show that CQDC outperforms the existing power spectrum obtained from constant-Q transform based features, and equal error can reduce from 19.18% to 51.56%. In addition, we found that discriminative information of CQDC hides in all frequency bins, which is different from commonly used features.

  • Rust Detection of Steel Structure via One-Class Classification and L2 Sparse Representation with Decision Fusion

    Guizhong ZHANG  Baoxian WANG  Zhaobo YAN  Yiqiang LI  Huaizhi YANG  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/11/11
      Vol:
    E103-D No:2
      Page(s):
    450-453

    In this work, we present one novel rust detection method based upon one-class classification and L2 sparse representation (SR) with decision fusion. Firstly, a new color contrast descriptor is proposed for extracting the rust features of steel structure images. Considering that the patterns of rust features are more simplified than those of non-rust ones, one-class support vector machine (SVM) classifier and L2 SR classifier are designed with these rust image features, respectively. After that, a multiplicative fusion rule is advocated for combining the one-class SVM and L2 SR modules, thereby achieving more accurate rust detecting results. In the experiments, we conduct numerous experiments, and when compared with other developed rust detectors, the presented method can offer better rust detecting performances.

  • Blind Detection Algorithm Based on Spectrum Sharing and Coexistence for Machine-to-Machine Communication

    Yun ZHANG  Bingrui LI  Shujuan YU  Meisheng ZHAO  

     
    PAPER-Analog Signal Processing

      Vol:
    E103-A No:1
      Page(s):
    297-302

    In this paper, we propose a new scheme which uses blind detection algorithm for recovering the conventional user signal in a system which the sporadic machine-to-machine (M2M) communication share the same spectrum with the conventional user. Compressive sensing techniques are used to estimate the M2M devices signals. Based on the Hopfield neural network (HNN), the blind detection algorithm is used to recover the conventional user signal. The simulation results show that the conventional user signal can be effectively restored under an unknown channel. Compared with the existing methods, such as using the training sequence to estimate the channel in advance, the blind detection algorithm used in this paper with no need for identifying the channel, and can directly detect the transmitted signal blindly.

  • A Log-Based Testing Approach for Detecting Faults Caused by Incorrect Assumptions About the Environment

    Sooyong JEONG  Ajay Kumar JHA  Youngsul SHIN  Woo Jin LEE  

     
    LETTER-Software Engineering

      Pubricized:
    2019/10/04
      Vol:
    E103-D No:1
      Page(s):
    170-173

    Embedded software developers assume the behavior of the environment when specifications are not available. However, developers may assume the behavior incorrectly, which may result in critical faults in the system. Therefore, it is important to detect the faults caused by incorrect assumptions. In this letter, we propose a log-based testing approach to detect the faults. First, we create a UML behavioral model to represent the assumed behavior of the environment, which is then transformed into a state model. Next, we extract the actual behavior of the environment from a log, which is then incorporated in the state model, resulting in a state model that represents both assumed and actual behaviors. Existing testing techniques based on the state model can be used to generate test cases from our state model to detect faults.

  • An Open Multi-Sensor Fusion Toolbox for Autonomous Vehicles

    Abraham MONRROY CANO  Eijiro TAKEUCHI  Shinpei KATO  Masato EDAHIRO  

     
    PAPER

      Vol:
    E103-A No:1
      Page(s):
    252-264

    We present an accurate and easy-to-use multi-sensor fusion toolbox for autonomous vehicles. It includes a ‘target-less’ multi-LiDAR (Light Detection and Ranging), and Camera-LiDAR calibration, sensor fusion, and a fast and accurate point cloud ground classifier. Our calibration methods do not require complex setup procedures, and once the sensors are calibrated, our framework eases the fusion of multiple point clouds, and cameras. In addition we present an original real-time ground-obstacle classifier, which runs on the CPU, and is designed to be used with any type and number of LiDARs. Evaluation results on the KITTI dataset confirm that our calibration method has comparable accuracy with other state-of-the-art contenders in the benchmark.

  • Blob Detection Based on Soft Morphological Filter

    Weiqing TONG  Haisheng LI  Guoyue CHEN  

     
    PAPER-Pattern Recognition

      Pubricized:
    2019/10/02
      Vol:
    E103-D No:1
      Page(s):
    152-162

    Blob detection is an important part of computer vision and a special case of region detection with important applications in the image analysis. In this paper, the dilation operator in standard mathematical morphology is firstly extended to the order dilation operator of soft morphology, three soft morphological filters are designed by using the operator, and a novel blob detection algorithm called SMBD is proposed on that basis. SMBD had been proven to have better performance of anti-noise and blob shape detection than similar blob filters based on mathematical morphology like Quoit and N-Quoit in terms of theoretical and experimental aspects. Additionally, SMBD was also compared to LoG and DoH in different classes, which are the most commonly used blob detector, and SMBD also achieved significantly great results.

  • An Evolutionary Approach Based on Symmetric Nonnegative Matrix Factorization for Community Detection in Dynamic Networks

    Yu PAN  Guyu HU  Zhisong PAN  Shuaihui WANG  Dongsheng SHAO  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/09/02
      Vol:
    E102-D No:12
      Page(s):
    2619-2623

    Detecting community structures and analyzing temporal evolution in dynamic networks are challenging tasks to explore the inherent characteristics of the complex networks. In this paper, we propose a semi-supervised evolutionary clustering model based on symmetric nonnegative matrix factorization to detect communities in dynamic networks, named sEC-SNMF. We use the results of community partition at the previous time step as the priori information to modify the current network topology, then smooth-out the evolution of the communities and reduce the impact of noise. Furthermore, we introduce a community transition probability matrix to track and analyze the temporal evolutions. Different from previous algorithms, our approach does not need to know the number of communities in advance and can deal with the situation in which the number of communities and nodes varies over time. Extensive experiments on synthetic datasets demonstrate that the proposed method is competitive and has a superior performance.

  • Hue Signature Auto Update System for Visual Similarity-Based Phishing Detection with Tolerance to Zero-Day Attack

    Shuichiro HARUTA  Hiromu ASAHINA  Fumitaka YAMAZAKI  Iwao SASASE  

     
    PAPER-Dependable Computing

      Pubricized:
    2019/09/04
      Vol:
    E102-D No:12
      Page(s):
    2461-2471

    Detecting phishing websites is imperative. Among several detection schemes, the promising ones are the visual similarity-based approaches. In those, targeted legitimate website's visual features referred to as signatures are stored in SDB (Signature Database) by the system administrator. They can only detect phishing websites whose signatures are highly similar to SDB's one. Thus, the system administrator has to register multiple signatures to detect various phishing websites and that cost is very high. This incurs the vulnerability of zero-day phishing attack. In order to address this issue, an auto signature update mechanism is needed. The naive way of auto updating SDB is expanding the scope of detection by adding detected phishing website's signature to SDB. However, the previous approaches are not suitable for auto updating since their similarity can be highly different among targeted legitimate website and subspecies of phishing website targeting that legitimate website. Furthermore, the previous signatures can be easily manipulated by attackers. In order to overcome the problems mentioned above, in this paper, we propose a hue signature auto update system for visual similarity-based phishing detection with tolerance to zero-day attack. The phishing websites targeting certain legitimate website tend to use the targeted website's theme color to deceive users. In other words, the users can easily distinguish phishing website if it has highly different hue information from targeted legitimate one (e.g. red colored Facebook is suspicious). Thus, the hue signature has a common feature among the targeted legitimate website and subspecies of phishing websites, and it is difficult for attackers to change it. Based on this notion, we argue that the hue signature fulfills the requirements about auto updating SDB and robustness for attackers' manipulating. This commonness can effectively expand the scope of detection when auto updating is applied to the hue signature. By the computer simulation with a real dataset, we demonstrate that our system achieves high detection performance compared with the previous scheme.

  • A Fast Fabric Defect Detection Framework for Multi-Layer Convolutional Neural Network Based on Histogram Back-Projection

    Guodong SUN  Zhen ZHOU  Yuan GAO  Yun XU  Liang XU  Song LIN  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/08/26
      Vol:
    E102-D No:12
      Page(s):
    2504-2514

    In this paper we design a fast fabric defect detection framework (Fast-DDF) based on gray histogram back-projection, which adopts end to end multi-convoluted network model to realize defect classification. First, the back-projection image is established through the gray histogram on fabric image, and the closing operation and adaptive threshold segmentation method are performed to screen the impurity information and extract the defect regions. Then, the defect images segmented by the Fast-DDF are marked and normalized into the multi-layer convolutional neural network for training. Finally, in order to solve the problem of difficult adjustment of network model parameters and long training time, some strategies such as batch normalization of samples and network fine tuning are proposed. The experimental results on the TILDA database show that our method can deal with various defect types of textile fabrics. The average detection accuracy with a higher rate of 96.12% in the database of five different defects, and the single image detection speed only needs 0.72s.

181-200hit(1281hit)