A weighted overlook graph representation of eeg data for absence epilepsy detection
- Authors: Wang, Jialin , Liang, Shen , Wang, Ye , Zhang, Yanchun , Ma, Jiangang
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 20th IEEE International Conference on Data Mining, ICDM 2020 Vol. 2020-November, p. 581-590
- Full Text: false
- Reviewed:
- Description: Absence epilepsy is one of the most common types of epilepsy. The diagnosis of absence epilepsy is among the greatest challenges faced by clinical neurologists due to a lack of easily observable symptoms that are present in conventional epilepsy (e.g. spasm and convulsion), and highly relies on the detection of Spike and Slow Waves (SSWs) in Electroencephalogram (EEG) signals. Recently, graph representations called complex networks have been increasingly applied to characterizing 1D EEG signals. However, existing methods often fail to effectively represent SSWs, struggling to capture the differences between SSW waveforms and their non-SSW counterparts, such as minute differences and distinct shapes. Addressing this issue, in this work, we propose two simple yet effective complex networks, Overlook Graph (OG) and Weighted Overlook Graph (WOG), which have been customized to expressively represent SSWs. Built upon OG and WOG, we then develop a 2D Convolutional Neural Network (2D-CNN) to further learn latent features from the graph representations and accomplish the detection task. Extensive experiments on a real-world absence epilepsy EEG dataset show that the proposed OG/WOG-2D-CNN method can accurately detect SSWs. Additional experiments on the well-known Bonn dataset further show that our method can generalize to the conventional epilepsy seizure detection task with highly competitive performances. © 2020 IEEE. *Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate "Jiangang Ma“ is provided in this record**
Active model selection for positive unlabeled time series classification
- Authors: Liang, Shen , Zhang, Yanchun , Ma, Jiangang
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 36th IEEE International Conference on Data Engineering, ICDE 2020 Vol. 2020-April, p. 361-372
- Full Text: false
- Reviewed:
- Description: Positive unlabeled time series classification (PUTSC) refers to classifying time series with a set PL of positive labeled examples and a set U of unlabeled ones. Model selection for PUTSC is a largely untouched topic. In this paper, we look into PUTSC model selection, which as far as we know is the first systematic study in this topic. Focusing on the widely adopted self-training one-nearest-neighbor (ST-1NN) paradigm, we propose a model selection framework based on active learning (AL). We present the novel concepts of self-training label propagation, pseudo label calibration principles and ultimately influence to fully exploit the mechanism of ST-1NN. Based on them, we develop an effective model performance evaluation strategy and three AL sampling strategies. Experiments on over 120 datasets and a case study in arrhythmia detection show that our methods can yield top performance in interactive environments, and can achieve near optimal results by querying very limited numbers of labels from the AL oracle. © 2020 IEEE.
- Description: E1
Dynamic derivative-droop control for supercapacitor synthetic inertial support
- Authors: Akram, Umer , Mithulananthan, N. , Shah, Rakibuzzaman , Islam, Rabiul
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 2020 IEEE Industry Applications Society Annual Meeting, IAS 2020 Vol. 2020-January
- Full Text: false
- Reviewed:
- Description: Energy storage is recognized as a potential solution to alleviate the impacts of inertia reduction and intermittency due to the integration of inverter based renewable energy sources (RES) in power systems. Out of various rapid responsive energy storage technologies, supercapacitor energy storage (SCES) is the most promising technology for synthetic inertia support. Because the SCES has high power density, very small response time, and large cycle life. In this paper, a dynamic derivative-droop control strategy is developed for SCES to provide the synthetic inertia in low inertia power system. The proposed strategy overcomes the limitations of separately applied derivative and droop controls. In addition, the use of time varying gains (referred as dynamic) instead of fixed gains improves the performance compared to derivative-droop coordinated control. Different types of events are created at different penetration levels of RES to test the robustness of the proposed control. A comparison, based on RoCoF and frequency nadir, between the derivative, droop, derivative-droop coordinated and the proposed controls is presented to show the effectiveness of the proposed control approach. © 2020 IEEE.
Evaluating the Performances of the Agoraphilic Navigation Algorithm under Dead-Lock Situations
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th IEEE International Symposium on Industrial Electronics, ISIE 2020 Vol. 2020-June, p. 536-542
- Full Text:
- Reviewed:
- Description: This paper presents a summary of the research which was conducted in developing a new free-space based (Agoraphilic) navigation algorithm. This new methodology is capable of maneuvering robots in static as well as dynamically cluttered unknown environments. The new algorithm uses only one force to drive the robot. This force is always an attractive force created by the freespace. This force is focused towards the goal by a force shaping module. Consequently, the robot is motivated to follow free-space directing towards the goal. As this method only based on the attractive forces, the robot always moves towards the goal as long as there is free-space . This method has eradicated many drawbacks of the traditional APF method. Several experimental tests were conducted using Turtlebot3 research platform. These tests were focused on testing the behavior of the new algorithm under dead-lock (local minima) situations for APF method. The test results proved that the proposed algorithm has successfully eliminated the local minima problem of APF method. © 2020 IEEE.
Motivational factors of Australian mobile gamers
- Authors: Greenwood, Jordan , Achterbosch, Leigh , Meredith, Grant , Vamplew, Peter
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: Proceedings of the Australasian Computer Science Week Multiconference (ACSW 2020); Melbourne, Australia; 4th-6th February 2020 p. 6
- Full Text:
- Reviewed:
- Description: Mobile games are a fast growing industry, overtaking all other video game platforms with year on year increases in revenue. Many studies have been conducted to explore the motivations of why video games players play their selected games. However very little research has focused on mobile gamers. In addition, Australian studies on the topic are sparse. This paper aimed to discover what motivates a mobile gamer from the perspective of the initial motivational factors attracting them to a mobile game, and the motivational factors that provide interest to continue playing and thereby increase game longevity. A survey was conducted online for Australian participants, which attracted 123 respondents. The survey was formulated by focusing on the 12 key subcomponents as motivational factors of the Gamer Motivational Profile v2 model devised by Quantic Foundry. It was discovered that mobile gamers are a completely different breed of gamer in contrast to the general video gamer. Strategy and challenge which are subcomponents of mastery proved popular among all mobile gamers, while destruction and excitement, subcomponents of action, were often the least motivating factors of all. With the newly discovered data, perhaps mobile game developers can pursue the correct avenues of game design when catering to their target audience.
Partial undersampling of imbalanced data for cyber threats detection
- Authors: Moniruzzaman, Md , Bagirov, Adil , Gondal, Iqbal
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 2020 Australasian Computer Science Week Multiconference, ACSW 2020
- Full Text:
- Reviewed:
- Description: Real-time detection of cyber threats is a challenging task in cyber security. With the advancement of technology and ease of access to the internet, more and more individuals and organizations are becoming the target for various cyber attacks such as malware, ransomware, spyware. The target of these attacks is to steal money or valuable information from the victims. Signature-based detection methods fail to keep up with the constantly evolving new threats. Machine learning based detection has drawn more attention of researchers due to its capability of detecting new and modified attacks based on previous attack's behaviour. The number of malicious activities in a certain domain is significantly low compared to the number of normal activities. Therefore, cyber threats detection data sets are imbalanced. In this paper, we proposed a partial undersampling method to deal with imbalanced data for detecting cyber threats. © 2020 ACM.
- Description: E1
Pre-trained language models with limited data for intent classification
- Authors: Kasthuriarachchy, Buddhika , Chetty, Madhu , Karmakar, Gour , Walls, Darren
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 2020 International Joint Conference on Neural Networks, IJCNN 2020
- Full Text: false
- Reviewed:
- Description: Intent analysis is capturing the attention of both the industry and academia due to its commercial and noncommercial significance. The rapid growth of unstructured data of micro-blogging platforms, such as Twitter and Facebook, are amongst the important sources for intent analysis. However, the social media data are often noisy and diverse, thus making the task very challenging. Further, the intent analysis frequently suffers from lack of sufficient data because the labeled datasets are often manually annotated. Recently, BERT (Bidirectional Encoder Representation from Transformers), a state-of-the-art language representation model, has attracted attention for accurate language modelling. In this paper, we investigate the application of BERT for its suitability for intent analysis. We study the fine-tuning of the BERT model through inductive transfer learning and investigate methods to overcome the challenges due to limited data availability by proposing a novel semantic data augmentation approach. This technique generates synthetic sentences while preserving the label-compatibility using the semantic meaning of the sentences, to improve the intent classification accuracy. Thus, based on the considerations for finetuning and data augmentation, a systematic and novel step-bystep methodology is presented for applying the linguistic model BERT for intent classification with limited data available. Our results show that the pre-trained language can be effectively used with noisy social media data to achieve state-of-the-art accuracy in intent analysis under low labeled-data regime. Moreover, our results also confirm that the proposed text augmentation technique is effective in eliminating noisy synthetic sentences, thereby achieving further performance improvements. © 2020 IEEE.
Towards smart online dispute resolution for medical disputes
- Authors: Bellucci, Emilia , Stranieri, Andrew , Venkatraman, Sitalakshmi
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: Proceedings of the Australasian Computer Science Week Multiconference (ACSW 2020); Melbourne, Australia; 3rd-7th February 2020. p. 1-5
- Full Text: false
- Reviewed:
- Description: With the advancements in technologies, digitization of health records in the healthcare industry is undertaking a rapid revolution. This is further fueled with the entrance of Internet of Things (IoT), where mobile health devices have resulted in an explosion of health data and increased accessibility via wireless communications and sensor networks. With the introduction of an Electronic Health Record (EHR) system as an important venture for the general health and wellbeing of a country's citizens, privacy issues and medical disputes are expected to rise. In addition to critical health information being documented and shared electronically, integrating data from diverse smart medical IoT devices are leading towards increasingly more complex disputes that require immense time and effort to resolve. Online dispute resolution (ODR) programs have been successfully applied to cost-effectively help disputants resolve commercial, insurance and other legal disputes, but as yet have not been applied to healthcare. This paper takes a modest step in this direction, firstly to identify the drivers of medical disputes that include patient empowerment and technology advancements and trends. Secondly, we explore dispute resolution models and identify the status and limitations of current ODR systems.
- Description: This work was funded by the University of Ballarat Deakin University Collaborative Fund. 160134
Agoraphilic navigation algorithm in dynamic environment with and without prediction of moving objects location
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 45th Annual Conference of the IEEE Industrial Electronics Society, IECON 2019 Vol. 2019-October, p. 5179-5185
- Full Text:
- Reviewed:
- Description: This paper presents a summary of research conducted in performance improvement of Agoraphilic Navigation Algorithm under Dynamic Environment (ANADE). The ANADE is an optimistic navigation algorithm which is capable of navigating robots in static as well as in unknown dynamic environments. ANADE has been successfully extended the capacity of original Agoraphilic algorithm for static environment. However, it could identify that ANADE takes costly decisions when it is used in complex dynamic environments. The proposed algorithm in this paper has been successfully enhanced the performance of ANADE in terms of safe travel, speed variation, path length and travel time. The proposed algorithm uses a prediction methodology to estimate future growing free space passages which can be used for safe navigation of the robot. With motion prediction of moving objects, new set of future driving forces were developed. These forces has been combined with present driving force for safe and efficient navigation. Furthermore, the performances of proposed algorithm (Agoraphilic algorithm with prediction) was compared and benched-marked with ANADE (Without predication) under similar environment conditions. From the investigation results, it was observed that the proposed algorithm extends the effective decision making ability in a complex navigation environment. Moreover, the proposed algorithm navigated the robot in a shorter and quicker path with smooth speed variations. © 2019 IEEE.
- Description: E1
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne; Australia; 13th-15th February 2019 Vol. 2019-February, p. 1135-1142
- Full Text:
- Reviewed:
- Description: Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure communication protocol using a sign-encryption technique between power constrained IoT devices and a Gateway. The sign encryption also preserves privacy. We propose that a Software Agent executing on the Gateway selects a Miner node using performance parameters of Miners. Simulations demonstrate that the recommended Miner selection outperforms Proof of Works selection used in Bitcoin and Random Miner Selection.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Assessing transformer oil quality using deep convolutional networks
- Authors: Alam, Mohammad , Karmakar, Gour , Islam, Syed , Kamruzzaman, Joarder , Chetty, Madhu , Lim, Suryani , Appuhamillage, Gayan , Chattopadhyay, Gopi , Wilcox, Steve , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th Australasian Universities Power Engineering Conference, AUPEC 2019
- Full Text:
- Reviewed:
- Description: Electrical power grids comprise a significantly large number of transformers that interconnect power generation, transmission and distribution. These transformers having different MVA ratings are critical assets that require proper maintenance to provide long and uninterrupted electrical service. The mineral oil, an essential component of any transformer, not only provides cooling but also acts as an insulating medium within the transformer. The quality and the key dissolved properties of insulating mineral oil for the transformer are critical with its proper and reliable operation. However, traditional chemical diagnostic methods are expensive and time-consuming. A transformer oil image analysis approach, based on the entropy value of oil, which is inexpensive, effective and quick. However, the inability of entropy to estimate the vital transformer oil properties such as equivalent age, Neutralization Number (NN), dissipation factor (tanδ) and power factor (PF); and many intuitively derived constants usage limit its estimation accuracy. To address this issue, in this paper, we introduce an innovative transformer oil analysis using two deep convolutional learning techniques such as Convolutional Neural Network (ConvNet) and Residual Neural Network (ResNet). These two deep neural networks are chosen for this project as they have superior performance in computer vision. After estimating the equivalent aging year of transformer oil from its image by our proposed method, NN, tanδ and PF are computed using that estimated age. Our deep learning based techniques can accurately predict the transformer oil equivalent age, leading to calculate NN, tanδ and PF more accurately. The root means square error of estimated equivalent age produced by entropy, ConvNet and ResNet based methods are 0.718, 0.122 and 0.065, respectively. ConvNet and ResNet based methods have reduced the error of the oil age estimation by 83% and 91%, respectively compared to that of the entropy method. Our proposed oil image analysis can calculate the equivalent age that is very close to the actual age for all images used in the experiment. © 2019 IEEE.
- Description: E1
Bayesian analysis of random finite element method slip surfaces for slope stability
- Authors: Dyson, Ashley , Tolooiyan, Ali
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 5th ISRM Young Scholars' Symposium on Rock Mechanics and International Symposium on Rock Engineering for Innovative Future, YSRM 2019 p. 118-123
- Full Text: false
- Reviewed:
- Description: The Random Finite Element Method (RFEM) is a powerful technique for incorporating spatially variable shear strength parameters with slope stability numerical simulations. In this research, two-dimensional probabilistic analyses of a large open-cut brown coal mine are presented with particular consideration given to slope Factors of Safety (FoS), when faced with highly anisotropic cohesion and friction angle shear strength parameters. Bayesian methods are implemented to determine updated shear strength parameters based on Factors of Safety and Representative Slip Surfaces (RSS) categorizations. By this method, the impact of observed slip surface depths and safety factors is further investigated. Monte Carlo simulation is implemented in the Finite Element environment Abaqus, with an optimised Strength Reduction Method to determine Factors of Safety. Comparisons of conditional shear strength distributions are made for associated slope safety factors and shallow slip surfaces from a cross-section of the Yallourn open-cut brown coal mine, in Victoria, Australia. The updated shear strength distributions provide a greater understanding of the necessary conditions of particular slope failure mechanisms, contributing further understanding of the stability of Victorian brown coal mines. ©2019 Japanese Society for Rock Mechanics
Blockchain leveraged task migration in body area sensor networks
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th Asia-Pacific Conference on Communications, APCC 2019 p. 177-184
- Full Text:
- Reviewed:
- Description: Blockchain technologies emerging for healthcare support secure health data sharing with greater interoperability among different heterogeneous systems. However, the collection and storage of data generated from Body Area Sensor Net-works(BASN) for migration to high processing power computing services requires an efficient BASN architecture. We present a decentralized BASN architecture that involves devices at three levels; 1) Body Area Sensor Network-medical sensors typically on or in patient's body transmitting data to a Smartphone, 2) Fog/Edge, and 3) Cloud. We propose that a Patient Agent(PA) replicated on the Smartphone, Fog and Cloud servers processes medical data and execute a task offloading algorithm by leveraging a Blockchain. Performance analysis is conducted to demonstrate the feasibility of the proposed Blockchain leveraged, distributed Patient Agent controlled BASN. © 2019 IEEE.
- Description: E1
Categorical features transformation with compact one-hot encoder for fraud detection in distributed environment
- Authors: Ul Haq, Ikram , Gondal, Iqbal , Vamplew, Peter , Brown, Simon
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 16th Australasian Conference on Data Mining, AusDM 2018; Bathurst, NSW; 28 November 2018 through 30 November 2018 Vol. 996, p. 69-80
- Full Text: false
- Reviewed:
- Description: Fraud detection for online banking is an important research area, but one of the challenges is the heterogeneous nature of transactions data i.e. a combination of numeric as well as mixed attributes. Usually, numeric format data gives better performance for classification, regression and clustering algorithms. However, many machine learning problems have categorical, or nominal features, rather than numeric features only. In addition, some machine learning platforms such as Apache Spark accept numeric data only. One-hot Encoding (OHE) is a widely used approach for transforming categorical features to numerical features in traditional data mining tasks. The one-hot approach has some challenges as well: the sparseness of the transformed data and that the distinct values of an attribute are not always known in advance. Other than the model accuracy, compactness of machine learning models is equally important due to growing memory and storage needs. This paper presents an innovative technique to transform categorical features to numeric features by compacting sparse data even if all the distinct values are not known. The transformed data can be used for the development of fraud detection systems. The accuracy of the results has been validated on synthetic and real bank fraud data and a publicly available anomaly detection (KDD-99) dataset on a multi-node data cluster. © Springer Nature Singapore Pte Ltd. 2019.
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
- Authors: Farivar, Faezeh , Haghighi, Mohammad , Barchinezhad, Soheila , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1143-1148
- Full Text:
- Reviewed:
- Description: Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
Diabetic retinopathy detection : methods and challenges
- Authors: Patil, Shivani , Kulkarni, Pradnya
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2nd IEEE Pune Section International Conference, PuneCon 2019
- Full Text: false
- Reviewed:
- Description: Diabetic retinopathy (DR) mostly affects the people as a result of diabetes and it leads to blindness. Diabetic retinopathy (DR) affects the eyes as a result of increased blood glucose levels. Among people in the 70-year-old age group, 50% of deaths are associated with diabetes. Detection of diabetes at a early stage and taking a proper treatment can reduce vision loss among the patients. Once DR symptoms are recognized, the severity of the disease must be assessed in order to prescribe the correct medication. There are five stages of severity of diabetic retinopathy, Mild Non Proliferative Diabetic Retinopathy (NPDR),Moderate NPDR, Severe NPDR, Proliferative Diabetic Retinopathy(PDR) and No DR(Diabetic Retinopathy).This paper summarizes DR detection methods and problems. © 2019 IEEE.
- Description: E1
Differentially private streaming to untrusted edge servers in intelligent transportation system
- Authors: Ezabadi, Soheila , Jolfaei, Alireza , Kulik, Lars , Ramamohanarao, Kotagiri
- Date: 2019
- Type: Text , Conference paper , Conference proceedings
- Relation: 2019 18th Ieee International Conference on Trust, Security and Privacy in Computing and Communications/13th Ieee International Conference on Big Data Science and Engineering; Rotorua, New Zealand; 5th- 8th August 2019 p. 781-786
- Full Text: false
- Reviewed:
- Description: This paper considers the privacy issues in the intelligent transportation system, in which the data is largely communicated based upon vehicle-to-infrastructure and vehicle-to-vehicle protocols. The sensory data communicated by the vehicles contain sensitive information, such as location and speed, which could violate the driver's privacy if they are leaked with no perturbation. Recent studies suggested mechanisms for randomizing the stream of vehicular data to ensure individuals' privacy. Although the past works on differential privacy provide a strong privacy guarantee, they are limited to applications where communication parties are trusted and/or data is limited to a few types. In this paper, we address this gap by proposing a differentially private mechanism that adds noise in the user side rather than the server. Also, our mechanism is able to perturb various types of data as pointed out by the dedicated short-range communication protocols in the automotive industry. The proposed mechanism is data adaptive and scales the noise with respect to the data type and distribution. Our extensive experiments show the accuracy of our mechanism compared to the recent approaches.
Enhancing branch predictors using genetic algorithm
- Authors: Haque, Md Sarwar , Hassan, Md Rafiul , Sulaiman, Muhammad , Onoruoiza, Salami , Kamruzzaman, Joarder , Arifuzzaman, Md
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 8th International Conference on Modeling Simulation and Applied Optimization, ICMSAO 2019
- Full Text: false
- Reviewed:
- Description: Dynamic branch prediction is a hardware technique used to speculate the direction of control branches. Inaccurate prediction will make all speculative works useless while accurate prediction will significantly improve microprocessors performance. In this work, we have shown that Genetic Algorithm (GA) can be used to select (near) optimal parameters for branch predictors in most cases. The GA-enhanced predictors take time to find suitable parameters, but once the values of these parameters are determined, the GA-enhanced predictors take the same time to execute as the basic predictors with increased accuracy. © 2019 IEEE.
- Description: E1
Generating linked data repositories using UML artifacts
- Authors: Khan, Aqsa , Malik, Saleem
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 1st Intelligent Technologies and Applications, Intap 2018; Bahawalpur, Pakistan; 23rd-25th October 2018; published in Communications in Computer and Information Science book Series Vol. 932, p. 142-152
- Full Text:
- Reviewed:
- Description: The usability of diagrams and models is increasing day by day, because of this we experience problem in searching and accessing from large size repositories of diagrams and models of software systems. This research might be helpful to search and access the diagrams and models in bigger repositories. For this purpose, this research developed linked data repositories which contain UML (Unified Modeling Language) artifacts, these artifacts are being organized with using UML class model. In particular, UML is being broadly applied to data modeling in many application domains, and generating linked data repositories from the UML class model is becoming a challenging task in the context of semantic web. This paper proposes an approach, in which we will build a construction tool by joining the characteristics of RDF (Resource Description Framework) and UML. Firstly we will formally define design artifacts and linked data repositories. After that we will propose a construction tool in which we will extract UML artifacts, these UML class model further transforms into the corresponding RDFs. The generated RDF linked data then will be verified by using W3C RDF, this is a validating service used to generate and verify the RDF triples and graphs. Finally, the proposed construction tool will be implemented with few experiments and research is validated using W3C RDF validating service. The proposed approach aims to give such a design that may facilitate the users to customize linked data repositories so that diagrams and models could be examined from large size data.
Generative malware outbreak detection
- Authors: Park, Sean , Gondal, Iqbal , Kamruzzaman, Joarder , Oliver, Jon
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019 Vol. 2019-February, p. 1149-1154
- Full Text: false
- Reviewed:
- Description: Recently several deep learning approaches have been attempted to detect malware binaries using convolutional neural networks and stacked deep autoencoders. Although they have shown respectable performance on a large corpus of dataset, practical defense systems require precise detection during the malware outbreaks where only a handful of samples are available. This paper demonstrates the effectiveness of the latent representations obtained through the adversarial autoencoder for malware outbreak detection. Using instruction sequence distribution mapped to a semantic latent vector, the model provides a highly effective neural signature that helps detecting variants of a previously identified malware within a campaign mutated with minor functional upgrade, function shuffling, or slightly modified obfuscations. The method demonstrates how adversarial autoencoder can turn a multiclass classification task into a clustering problem when the sample set size is limited and the distribution is biased. The model performance is evaluated on OS X malware dataset against traditional machine learning models. © 2019 IEEE.
- Description: E1