Open Access CS-1-SVM: Improved One-class SVM for Detecting API Abuse on Open Network Service

Size: px
Start display at page:

Download "Open Access CS-1-SVM: Improved One-class SVM for Detecting API Abuse on Open Network Service"

Transcription

1 Send Orders for Reprints to The Open Automation and Contro Systems Journa, 2015, 7, Open Access CS-1-SVM: Improved One-cass SVM for Detecting API Abuse on Open Network Service Chen Hai-ting * Coege of Network Communication, Zhejiang Yuexiu University of Foreign Languages, Shaoxin, China Abstract: Open network service is threatened by API abusers such as spammers, phishes, compromised users, etc., because of their open API for any user and third-party deveopers. In order to preserve the service resource and security, we proposed an approach caed CS-1-SVM based on cosine simiarity and 1-SVM to detect anomaous accounts who abused API in open network service. Two of the key processes of the method are account modeing and cassifier soving. In account modeing, we vectorized every sampe user by extracting the dynamic features and cacuating the cosine simiarity between static features. In cassifier soving, we improved 1-SVM in reguarization parameter optimization efficiency with cosine simiarity too. Based on the proposed method, we deveoped an experiment to demonstrate that CS-1-SVM has the abiity to detect both maicious and compromised account and simpify the process of parameter optimization without reducing the accuracy of 1-SVM. Keywords: API Abusing, Cosine Simiarity, One-cass SVM, Open Network Service. 1. INTRODUCTION Compared to traditiona network service, open network service (ONS), such as socia network service, coud storage service or eectronic commerce service, is facing more serious security threats. In the traditiona environment where a accounts are under strict contro, a users are ony imited to access the service via their own identities and carry out their business in their assigned range. Therefore abusing is under contro and happens rarey in traditiona network service. Whie in the open environment, a accounts receive fewer restrictions on network access and API usage. In this condition, one might seectivey trusts those third-party appications that rey on open API provided by ONS. Thus, maicious behaviors (spamming and phishing) become more frequent and arge-scae, due to the programmabiity of not ony attack data but aso attack actions. Besides, attackers can easiy access users private data and make unwanted operation by vunerabiities of authorization protoco (such as CSRF or phishing on OAuth) or the open API sef [1, 2]. Those maicious or compromised accounts can then be used for a variety of iega activities, such as sending phishing or spamming messages to other accounts on contact ists. Previous work has shown that abusing API for spam, phishing, and maware are rea threats on open network service [3]. What s more, maicious and compromised accounts on ONS are aready being sod onine in underground markets [4, 5]. To sove the growing probem, researchers have proposed different detection approaches. Earier studies focus on anaysis of static information (e.g. text, URL and IP) *Address correspondence to this author at the Coege of Network Communication, Zhejiang Yuexiu University of Foreign Languages, Shaoxin, China; Te: ; E-mai: chenht80@163.com ike traditiona detection on E-mai spam [3, 6-10], which can be easiy impemented by the mature technoogy on E-mai spam detection. But nowadays, toos and techniques used by attackers are more compicated. Sometimes attack behaviors are not fuy refected in the pubished content, but in getting permission to privacy data or other posted actions through open API. For the new scenario, behavior modeing is proposed. M. Egee et a. provide an idea to extract behavior mode features associated with the actions of pubishing content and cassify norma or compromised account by supervised cassification methods [11]. Unfortunatey, supervised machine earning requires a arge number of abeed sampes so that it needs a ot of pre-processing work and cannot catch the 0-day threats. Besides, they fai to detect a maicious account. G. Wang et a. identify the anomaous account by taking advantage of the cickstream modes [12]. They caim that they have deveoped a detection system on server-side, which can group simiar user cickstreams into behaviora custers through distances between cickstream sequences and then cassified a new cick sequence into norma or Sybi. However, they cannot reay reaize unsupervised custering because of the use of so-caed seed abeed manuay. Besides, the server-side detection does not have patform generaity. In this paper, we presented a new approach caed CS-1- SVM (One-cass Support Vector Machine Improved with Cosine Simiarity) to detect open API abuse incuding not ony compromised but aso maicious accounts based on cosine simiarity [13] and 1-SVM (one-cass SVM, an unsupervised Support Vector Machine [14]). It was worth noting that we aso integrated a vectorization mode in the method, which can combine both dynamic and static user features. With this mode, we can accuratey describe the user's eve of changes, which can refect the eve of abnormaity. Our approach offers four outstanding advantages. First, it does / Bentham Open

2 1294 The Open Automation and Contro Systems Journa, 2015, Voume 7 Chen Hai-ting not depend on open network service provider s patform. Second, rea unsupervised machine earning simpifies the mode training in compared with taking cumbersome task of abeing sampes. Third, it can detect both maicious and compromised accounts. The ast but not the east, individua behaviora features and overa distribution of sampes are combined to improve the accuracy of cassification with twice use of cosine simiarity. 2. ACCOUNT MODELING Like a automatic detection methods based on machine earning, we need to abstract the users states and behaviors into a set of vectors first. This process is caed account modeing, which has a very significant effect on the detection resuts. A strong account modeing has to capture the rea ways in which a user empoyed his ONS account as competey as possibe. Otherwise, a weak account modeing might ead to incorrect cassification (e.g. identify a egitimate user as anomaous, and vice versa). To buid a patform-independent system, we adopted the pubic stream on ONS from users posting instead of back-end statistics. Once obtained the user s stream, we extracted a set of feature vaues caed static features from each posted message as static features vector (SFV). And then, a vector caed dynamic features vector (DFV) that can describe important changes of static features with cosine simiarity and abstract other features associated with the time sequence was computed. The fina account mode can be described as DFV, a Hibert space vector used to represent a user Extracting Static Features In order to abstract the characteristics that can provide avaiabe reference vaues for dynamic features, a proper static features group must meet the foowing requirements: Vectorizabe: Vectorizing users static features is the basis of not ony dynamic feature abstracting but aso CS-1- SVM mode. Vectorizabe means that those used features must be numeric and directiona. If a feature such as image content cannot be described as a number (numeric), it is not easy to refect the feature to Hibert space. Besides, if you cannot distinguish between each feature in different dimensions (directiona), the features number group wi not form a vector. For exampe, the number of sentences and the number of punctuation, in most conditions, represent the same dimension as the content structure. They cannot form a group of feature vectors. Intent-reated: Intuitivey, a user abusing open API wi achieve a specific purpose in a great probabiity. Therefore, an appropriate static feature is required to describe the user's purpose. When a user purposes are abstracted into numbers, we can catch the purpose non-manuay. For instance, in a socia network, the intent of spreading, which the spam accounts reease information with, can be measured by the counts of interactions counts, forwarding counts etc.). Changeabe: An unchangeabe feature wi make the mode insensitive to users action, because dynamic features vector depends on the fuctuations in static features vaues, and the more accuratey the dynamic features match user s action sequence, the better CS-1-SVM works. Those static features without changing trend are meaningess for the mode presented in this paper. Take user name or user password as an exampe, it changes rarey, so a vector composed by it makes no sense. We denote user s SFV as S. Here is the recommended S using one pubishing in the conventiona open network service. Socia network: Take anguage as u (u {1,1, 2}, when 1 means oca anguage, 2 means Engish and -1 means other anguages), incuding inks number as n (n N and n number as n a (n a N and n a 0), pubished time as t (t N and 0 t < 24). In socia network service, S = (u, n, n a, t). Coud storage: Take anguage of fie name as u ( u {1,1, 2}, when 1 means oca anguage, 2 means Engish and -1 means other anguages), fie type as f ( f {1,1}, when 1 means norma fie type and -1 means executabe binary fie type), shared or not as s ( s {1,1} ), upoading time as t (t N and 0 t < 24). In coud storage service, S = (u, f, s, t). Eectronic commerce: Take order numbers once as n o (n o N and n o > 0), simiar or not for order comments as s ( s {1,1} ), order paced time as t (t N and 0 t < 24). In eectronic commerce service, S = (n o, s, t). 2.2 Extracting Dynamic Features If we have extracted avaiabe static features of one account into a series of muti-dimensiona vectors, we can construct the dynamic features vector that can accuratey refect the changing eve of this account s actions by cosine simiarity and other statistica methods. Considering the user s inear actions, we described dynamic features on time sequence Cosine Simiarity of static Features The most important dimension in DFV is the change eve of user s historica actions through which anomaous sudden changes can be found. So we need a quantitative metric to describe the change eve of SFVs, which is caed Change Rate Index (CRI) in this paper. An effective and easy way to compute CRI is the variance of cosine simiarity. Cosine simiarity is a measurement of simiarity between two vectors of an inner product space that measures the cosine of the ange between them. Comparing two SFVs by cosine simiarity can capture the change eve between user s two actions accuratey. And then take the variance of these cosine simiarity vaues as CRI. Considering the user s inear actions and imited computing resources, we do not need to cacuate the cosine simiarity between each pair of static features, but between a basic SFV and other one. That means we need choose a SFV (e.g. first SFV) for basic vector, and compute cosine simiarity for other SFV with basic one in accordance with the time

3 CS-1-SVM: Improved One-cass SVM for The Open Automation and Contro Systems Journa, 2015, Voume sequence. In this process, we need to define a constant g (- 1<g<1) as sudden change threshod. If the cosine simiarity is beow g, we say this situation coud be a sudden change and take the new SFV as the basic one with which the rest SFV wi be compared. This is a trick that can make simiarity vaues more discrete to stand out fuctuations of sudden change. For exampe, we can take the first SFV as initia basic SFV, and compute cosine simiarity with other SFV in according with time sequence. When the cosine simiarity beow g, we know that the user make a sudden change and change the basic SFV to the new one. If the SFV after is simiar, this method wi not make the sum of simiarity vaue become too ow to effectivey distinguish. If the SFV after is become norma, this method can stand out the sudden change SFV because the cosine simiarity beow g are compute twice. Fig. (1) shows the differences between changeabe and unchangeabe basic SFV on cosine simiarity vaue distributions and the vaue of g is The part of SFV matric M is Fig. (1). Different distributions between changeabe and unchangeabe basic SFV. We can see from Fig. (1) obviousy that an norma SFV (M [4] ) produced a significant fuctuation and an abnorma SFV (M [8] ) was not sensitive to sudden changes in the method of unchangeabe basic SFV. Conversey, the changeabe basic SFV performed we on trade-off between sudden change and norma change. If we define L as a user s CRI, function D(x i ) as variance fuction, n as number of user s SFV, S i (i N and 0 i n-1) as the ith SFV according to the order of time, S b as the basic SFV and sim i (i N and 0 i n-1) as cosine simiarity between S i and S b, then Equation (1) shows how to compute the user s CRI. L = D(sim i ) = 1 n1 2 1 sim i ( n 1 n Other Dynamic Features Besides CRI, some other dimensions are needed to form the DFV. These dimensions must meet the requirements of SFV-reated and statisticay significant to stand out the suspect features of user s actions sequence. That means we must form a vector, which can capture the action features of anomaies or outiers. Content repeatabiity (R) and action frequency (T) are two dimensions recommended on most ONS for commonaity. Content repeatabiity means that to compare consecutive posting (text on socia network, md5 of fie on coud storage or order comments on eectronic commerce) different or not. Action frequency means to get the interva time of consecutive posting because an anomaous account may submit with open API frequenty. In order to reduce the impact of ong interva time, we took those interva times more than one day as one day (86400 seconds) for the sake of simpicity. If we denote a user s DFV as D, posting number as n, content repeatabiity of consecutive posting as r i (r i {1,1}, i N and 1 i n-1), interva time of consecutive posting as t i (t i (0,86400], i N and 1 i n-1), the function to take the first y minimum numbers in x i as fmin(x i, y), the average function of x i as E(x i ), then we can get Equation (2) where the vaue of L has been computed in Equation (1). D = (L, R,T ) (2) where. R = E(r i ) = 1 n1 r i n 1 T = E( fmin(t i,cei((n 1) c))), 0 < c 1 The vector D is the fina mode for one user; cei means rounding up and c is a constant to contro the number range of t i. For exampe, if n is 100, c is 0.1, the vaue of T can be cacuated as foowing steps: 1) chose the first 10 (cei(990.1)=10) minimum numbers in t i ; 2) take the average of this 10 numbers. 3. DESCRIPTION OF CS-1-SVM = 1 S bis n1 i ( n 1 S b i S 1 ) 2 ( i n 1 initia condition. S b := S 0 and then. sim i < g S b := S i sim i ) 2 When a user is abstracted into a specific vector D, cassification methods on vectors in Hibert space can be used to detect the abnorma account. Because of D can describe how a user use a network service API, an appropriate cassification method wi produce an exceent resut to find out those API abuse accounts. In a common ONS system, most of vectors D are norma and difficut to be abeed if we get sampes through n1 n1 S bis i S b i S i ) 2 (1)

4 1296 The Open Automation and Contro Systems Journa, 2015, Voume 7 Chen Hai-ting simpe random samping (ike web crawing). So here, the data do not contain any abeing information and ony a sma fraction of the data is abnorma, but the outiers exhibit a significanty different behavior than the norma records. Theoreticay, the 1-SVM coud aso be empoyed in an unsupervised anomay detection setup, where no prior training is needed [15]. That is the reason we choose 1-SVM as the basic agorithm in this paper. Based on this, we made some improvements on the estimate of v vaue with the cosine simiarity and overa dynamic features to propose an improved agorithm caed CS-1-SVM Introduction of 1-SVM In contrast to traditiona SVMs, 1-SVM attempts to earn a decision boundary that achieves the maximum separation between the points and the origin [16]. It is predicated on the assumption that the origin in the transformed space beongs to outiers and then separates most of the sampes from the origin by a hyperpane with maximum margin which is as far away from the origin as possibe. Suppose that {x i } N is the target dataset, and noninear transformation function is used to map the target dataset from N into a higher dimensiona Hibert feature space. To determine the hyperpane, we need to deduce its norma vector w and bias term by soving the foowing optimization probem: 1 min w,, 2 w i v s.t. w,(x i ) i, i 0 Here, i caed sack variabes are introduced to dea with the outying sampes. The parameter (0,1] is a specia parameter for 1-SVM. It represents an upper bound on the fraction of outiers and a ower bound on the number of support vectors. Varying contros the trade-off between and. An effective vauation method to v wi be proposed in next section. Equation (3) caed prima probem can be soved by its Lagrange dua probem and avoid cacuating the inner product of non-inear mapping function by defining a kerne function K(x i, x j )=(x i ), (x j that fufis Mercer s conditions. The dua probem is ike Equation (4): 1 min 2 i, j=1 i j K(x i, x j ) s. t. 0 i 1 v, i = 1 where are the Lagrange mutipiers. After soving the dua probem, the decision function for any test vector x t is given by Equation (5): f (x) = sign i K(x i, x t ) (3) (4) (5) 3.2. Estimation of v by Cosine Simiarity In section 3.1 we notice that the parameter is an upper bound on the fraction of outiers and a ower bound on the fraction of support vectors. In most practice, the vaue of is decided by artificia ways depending on the experience to features of training sampes. Unfortunatey, this approach is difficut to impement for ONS because of the users uncertainty and diversity. Nevertheess, we can sti estimate the vaue of v by the simiarity reations of sampe users DFVs. Before setting forth the methods of estimating, we show two properties of ONS: Proposition 1. Suppose A={ D } is a sampe set of users DFVs from ONS, M(A) (0,1) is the metric function for overa simiarity of DFVs, and O (0,1) is the ratio of anomaous users among a sampes, then O changes aong with M(A). In other words, if more users have high simiarity of DFVs in the case of the appropriate features to be extracted, then there is a high probabiity that more API abusing attacks happened in this ONS. Because those attackers are bound to post the simiar action, in order to achieve a cear purpose. This proposition has been iustrated effectivey by experiments in M. Egee s work [11]. Proposition 2. Suppose E(A) (0,1] is the average of cosine simiarity of sampes DFVs between each other, constant μ (0,1) is the threshod near 1 to determine the extremey simiar vectors, then O E(A)/ μ. To prove proposition 2, we introduced as the average of cosine simiarity of DFVs whose cosine simiarity with any other DFV is ower than μ. Then we supposed that m is the number of DFVs in high simiar custer, p is the average of cosine simiarity of them. Finay, the deduction of proposition 2 was ike Equation (6): E(A) = p m + 1 m E(A) = p m + m E(A) = ( p ) m + E(A) p = m p μ, m O, 0 E(A) μ O Since v is an estimated vaue and represent the upper bound of outiers rate, we can cacuate a reference vaue O as v according to proposition 2 and make adjustments for vaue of μ to fine-tune the process. This can significanty reduce the amount of computation to find out v. Furthermore, the singe user s behaviora features and overa distribution of sampes were effectivey inked together Objective of CS-1-SVM Foowing the above propositions, we can generaize the CS-1-SVM method to the probem of API abuse detection in (6)

5 CS-1-SVM: Improved One-cass SVM for The Open Automation and Contro Systems Journa, 2015, Voume ONS. The objective of the proposed CS-1-SVM is stated in Equation (7). Here, the reguarization parameter v was dropped from the minimization objective. Instead, we cacuated the average of cosine simiarities between any two users DFVs and divided it by μ to represent the upper bound on the fraction of outiers and a ower bound on the fraction of support vectors. a 2-dimensiona ce for struct incuding 1500 rows by Matab. Each row was a ce incuding a posted information of one user, and each eement in row ce was a struct that represents one posting. The data in struct ooks ike Fig. (2). 1 min w,, 2 w 2 + μ i s.t. w,(x i ) i, i 0 The threshod μ is an adjustabe vaue very cose to 1. Those users, whose cosine simiarity with each other higher than μ, were considered as suspect group. After Lagrange mutipiers and kerne function introduced, the dua objective of CS-1-SVM can be summarized as Equation (8): 1 min 2 i, j=1 i j K(x i, x j ) s. t. 0 i μ, i = 1 It can be seen that it is ony a minor modification to the objective of the origina 1-SVM in Equation (3) and (4). Hence, it can be soved easiy with the origina methods or toos ike SMO [17], LibSVM [18] and so on. 4. EXPERIMENTS In order to evauate the effectiveness of the proposed detecting API abusing method, we compared our CS-1-SVM with the traditiona 1-SVM. In our experiments, the kerne of the two methods was a Gaussian kerne ike Equation (9), where > 0 is kerne radius. The optimum vaue for the parameter was determined by cross vaidation. K(x i, x j ) = e x i x j Another important comparison among content anaysis method ike those proposed by reference [6-10], COMPA [11] and the proposed CS-1-SVM shows different appication efficiency Sampe Set We randomy samped 1500 users posted data from Weibo.com (the predominant socia network service in China which is akin to a hybrid of Twitter and Facebook) by crawing with the open API that Weibo provides. The dataset contained 26 anomaous accounts incuding 10 spammers, 10 phishers and 6 compromised users (which were abeed by us to compare with experiment resuts) and a historica posted information of these 1500 users before 12:40:00 PM, 14 November In addition, we pre-processed these data to eiminate dirty data such as system error messages, empty response, invaid URL and so on. Because of the imitations of provided open API, the origina data was JSON format. We reorganized the data into (7) (8) (9) Fig. (2). Data in one posting. For the sake of simpicity and reiabiity, we randomy drew 5 sampes in both anomaous and egitimate sampes as 10 test data each time. Every method was tested 20 times. The goa of our experiment was to check whether a test sampe was miscassified and the resut for a tests was averaged as the comparison basis Account Modeing As shown in Fig. (2), the struct data was very easy to be extracted because of the key-vaue pair structure. Considering the probabiity of change anguage was minima in Weibo, we abandoned the anguage feature. Finay, We chose the foowing keys to form SFV. content : This fied stored the text content in one posting, which contained ots of important features. Despite the semantic anaysis for a text was difficut, there were sti some specia symbos can be used to extract features (e.g. text between two # represents the hot topic means intention to interact with another user). In our experiment, we extracted the number of hot topic as n h, the number as n a, the number of URL (excuding the ocation share) as n. creattime : The vaue of this key was the Unix timestamp when the posting was pubished. We converted it into oca standard time and took the number of hour as t. source : This fied indicated the appications (e.g. web browser, phone app, third-part app) that the posting was submitted with. This is aso an important feature. Those compromised account can be caught cause of the sudden change of this fied. We took this fied as s. musicur, pic_ist and videour : We can consider these ce type fieds as mutimedia attachments. Due to space constraints, we wi discuss the detection of these attachments in other papers. In this paper, we temporay ignored these fieds. So one SFV can be represented by S = (n h, n a, n, t, s). Then we cacuated the CRI L for these 1500 users by the

6 1298 The Open Automation and Contro Systems Journa, 2015, Voume 7 Chen Hai-ting method mentioned in section and formed the fina DFV with other features. In this process, we set the threshod of sudden change g to be Meanwhie, the other dimensions were cacuated by Equation (2) where c equas 0.1. Finay, D =(L, R, T). R represented repeating degree of content text and T meant abnorma degree of submitting frequency Resuts To measure the effectiveness, we denoted anomaous accounts as positive sampes and norma accounts as negative ones, and used the standard metrics such as accuracy (ACC), fase positive rate (FPR) and true positive rate (TPR) [19]. Accuracy is the proportion of the tota number of the experiment resuts that were correct. Fase positive rate is the ratio of incorrecty cassified positive sampes to tota actua negative sampes. True positive rate is the ratio of correcty cassified positive sampes to tota actua positive sampes. With Tabe 1, these metrics can be described as foows: the accuracy is (n t +p t ) / (n t +n f +p t +p f ), the fase positive rate is p f / (n t +p f ) and the true positive rate is p t / (p t +n f ). Tabe 1. Metric reference tabe. Experiment Actua Negative Positive negative n t p f positive n f p t n t means the number of correcty cassified negative sampes, whie n f means the number of incorrecty. p t means the number of correcty cassified positive sampes, whie p f means the number of incorrecty. To compare the discrimination between CS-1-SVM and origina 1-SVM, we generated a Receiver Operating Characteristics (ROC) curve in (Fig. 3). The curves pot FPR on the X-axis and TPR on the Y-axis. Since the proposed improvement is the vauation of v, Tabe 2 shows the advantage in the reguarization parameter optimization of CS-1-SVM. The resuts in (Fig. 3) and Tabe 2 obtained by independent experiments were the comparison of accuracy and tria times between 1-SVM and CS-1-SVM. With Fig. (3) and Tabe 2, we can concude that our proposed method can improve the efficiency of reguarization parameter optimization without reducing the discrimination. In more detai, the overa resuts for our experiments were presented in Fig. (4). We can find that in the change of μ differenty impacted on different anomaous groups detections. The detection capabiity of spammers and phishers tended to change with μ, whie the capabiity of detecting compromised accounts was insensitive to variations of μ. However, due to the proper account modeing, the detection resuts of compromised accounts were sti exceent. 5. DISCUSSION Fig. (3). ROC comparison between 1-SVM and CS-1-SVM. Tabe 2. Comparison of reguarization parameter optimization times between 1-SVM and CS-1-SVM. Method ACC (±0.005) The experiments showed that the proposed CS-1-SVM is we suited for the unsupervised API abuse detection probem. There were two key factors that determine the performance of CS-1-SVM. One was the design for SFV and DFV and another was the optimization of parameter μ. The former described singe user s behavior whie the atter embodied out the overa simiar features of sampes. Thus, proper account mode and vaue of μ can make the detection resuts more idea. Fig. (4). Detaied ACC of anomaous accounts SVM (v) CS-1-SVM (μ) When comparing with other anomaous accounts detection methods, CS-1-SVM can be the more promising one on ONS. In detais, Most of those text based detection [6-10] methods just focused on text anayze but ignored the user s behaviors, and then induced the high FNR (fase negative rate) and ow TPR. Likewise most behavior mode based

7 CS-1-SVM: Improved One-cass SVM for The Open Automation and Contro Systems Journa, 2015, Voume Tabe 3. Comparison of features between CS-1-SVM and other works. Spammer Detection Phisher Detection Compromised Users Detection Unsupervised Cross-patform methods [11, 12] performed not so idea in terms of AUC because of their ack of we-designed extraction method for account modes and consideration of overa sampes features. Besides, the unsupervised cassification method this paper based on make the 0-day detection become possibe. With these anayze of experiments resuts and comparison with other methods proposed by previous papers, we can find the different appication scenarios between them to form the Tabe 3. CONCLUSION CS-1-SVM Text based detection [6-10] COMPA [11] Cick Stream [12] In this paper, we designed and evauated CS-1-SVM, a feature modeing simiarity and 1-SVM based approach for detecting both maicious and compromised account in Open Network Service. We firsty extracted users static features into SFV, and formed DFV by cosine simiarity of SFV and other dynamic features. Then, we trained a cassifier with these DFV sampes by proposed CS-1-SVM. Finay, we used the cassifier to detect anomaous accounts. The fina experiments proved that our proposed method coud improve the efficiency of reguarization parameter optimization without reducing the discrimination of origina 1-SVM. Furthermore, the abiity to capture both maicious and compromised account in 0-day and the patform- generaization was highighted by comparing with other previous works. Due to increasingy stringent restrictions on open API provided by ONS, sampe data coection has become more and more difficut especiay in coud storage service and eectronic commerce service. Our future work wi focus on the detection of API abuse by means of interna cooperation with some ONS in. Through the study of proper custering methods and anaysis of a arge number of sampe data, we are expected to be abe to find a method to group account into refined category and dea with coordinated attacks and Sybi attacks on ONS. CONFLICT OF INTEREST The author confirms that this artice content has no confict of interest. ACKNOWLEDGEMENTS Decared none. REFERENCES [1] D. Hardt, The OAuth 2.0 authorization framework, Avaiabe: [2] T. Lodderstedt, M. McGoin, and P. Hunt, OAuth 2.0 threat mode and security considerations, Avaiabe: ietf. org/htm/rfc6819 [3] H. Gao, J. Hu, C. Wison, Z. Li, Y. Chen, and B. Zhao, Detecting and Characterizing Socia Spam Campaigns, In: Internet Measurement Conference (IMC), [4] G. Stringhini, M. Egee, C. Kruege, and G. Vigna, Poutry markets: On the underground economy of Twitter foowers, In: Proceedings of the 2012 ACM workshop on Workshop on onine socia networks, 2012 [5] Eweek staff Verisign, 1.5m facebook accounts for sae in web forum, PC Magazine, [6] A. Pitsiidis, K. Levchenko, C. Kreibich, C. Kanich, M. Voeker, V. Paxson, N. Weaver, and S. Savage, Botnet Judo: Fighting Spam with Itsef, In: Proceedings of the 17 th Annua Network and Distributed System Security Symposium (NDSS), [7] C. Grier, K. Thomas, V. Paxson, and M. the underground on 140 characters or ess, In: ACM Conference on Computer and Communications Security (CCS), [8] H. Gao, Y. Chen, K. Lee, D. Pasetia, and A. Choudhary, Towards onine spam fitering in socia networks, In: Symposium on Network and Distributed System Security (NDSS), [9] S. Lee and J. Kim, WarningBird: Detecting suspicious URLs in twitter stream, In: Symposium on Network and Distributed System Security (NDSS), [10] K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, Design and Evauation of a Rea-Time URL Spam Fitering Service, IEEE Symposium on Security and Privacy, [11] M. Egee, G. Stringhini, C. Kruege, and G. Vigna, COMPA: detecting compromised accounts on socia networks, In: ISOC Network and Distributed System Security Symposium (NDSS), [12] G. Wang, T. Konoige, C. Wison, X. Wang, H. Zheng, and B. Y. Zhao, You are how you cick: Cickstream anaysis for sybi detection, Symposium on USENIX Security, [13] A. Singha, Modern information retrieva: A brief overview, Buetin of the IEEE Computer Society Technica Committee on Data Engineering, vo. 24, no. 4, pp , [14] B. Schökopf, R.C. Wiiamson, A.J. Smoa, J. Shawe-Tayor, and J.C. Patt, Support vector method for novety detection, NIPS, vo. 12, pp , [15] M. Amer, M. Godstein, and S. Abdennadher, Enhancing onecass support vector machines for unsupervised anomay detection, In: Proceedings of the ACM SIGKDD Workshop on Outier Detection and Description, 2013, pp [16] B. Schökopf, J. C. Patt, J. Shawe-Tayor, A. J. Smoa, and R. C. Wiiamson, Estimating the support of a high-dimensiona distribution, Neura Computation, vo. 13, no. 7, pp , [17] J. Patt, Sequentia Minima Optimization: A Fast Agorithm for Training Support Vector Machines, TechReport, MSR-TR-98-14, 1998.

8 1300 The Open Automation and Contro Systems Journa, 2015, Voume 7 Chen Hai-ting [18] C.C. Chang, and C.J. Lin, LIBSVM: a ibrary for support vector machines, ACM Transactions on Inteigent Systems and Technoogy (TIST) vo. 2, no. 3, pp. 1-27, [19] K. Lee, J. Caveree, and S. Webb, Uncovering socia spammers: socia honeypots+ machine earning, In: Proceedings of the 33 rd Internationa ACM SIGIR Conference on Research and Deveopment in Information Retrieva, 2010, pp Received: February 23, 2015 Revised: Apri 20, 2015 Accepted: May 24, 2015 Chen Hai-ting; Licensee Bentham Open. This is an open access artice icensed under the terms of the Creative Commons Attribution Non-Commercia License ( icenses/by-nc/3.0/) which permits unrestricted, non-commercia use, distribution and reproduction in any medium, provided the work is propery cited.

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra

More information

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code A Top-to-Bottom View: Energy Anaysis for Mobie Appication Source Code Xueiang Li John P. Gaagher Roskide University Emai: {xueiang, jpg}@ruc.dk arxiv:1510.04165v1 [cs.oh] 14 Oct 2015 Abstract Energy efficiency

More information

Modification of Support Vector Machine for Microarray Data Analysis

Modification of Support Vector Machine for Microarray Data Analysis Goba Journa of Computer Science and Technoogy Hardware & Computation Voume 13 Issue 1 Version 1.0 Year 2013 Type: Doube Bind Peer Reviewed Internationa Research Journa Pubisher: Goba Journas Inc. (USA)

More information

Sparse Representation based Face Recognition with Limited Labeled Samples

Sparse Representation based Face Recognition with Limited Labeled Samples Sparse Representation based Face Recognition with Limited Labeed Sampes Vijay Kumar, Anoop Namboodiri, C.V. Jawahar Center for Visua Information Technoogy, IIIT Hyderabad, India Abstract Sparse representations

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points.

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points. Probem 1 a. K means is ony capabe of discovering shapes that are convex poygons [1] Cannot discover X shape because X is not convex. [1] DBSCAN can discover X shape. [1] b. K-means is prototype based and

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis

Subgrade Cumulative Plastic Deformation under the Bridge in the Transitional Period of Orbit Dynamics Analysis 499 A pubication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 2017 Guest Editors: Zhuo Yang, Junjie Ba, Jing Pan Copyright 2017, AIDIC Servizi S.r.. ISBN 978-88-95608-49-5; ISSN 2283-9216 The Itaian Association

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT

More information

Privacy Preserving Subgraph Matching on Large Graphs in Cloud

Privacy Preserving Subgraph Matching on Large Graphs in Cloud Privacy Preserving Subgraph Matching on Large Graphs in Coud Zhao Chang,#, Lei Zou, Feifei Li # Peing University, China; # University of Utah, USA; {changzhao,zouei}@pu.edu.cn; {zchang,ifeifei}@cs.utah.edu

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

NCH Software Spin 3D Mesh Converter

NCH Software Spin 3D Mesh Converter NCH Software Spin 3D Mesh Converter This user guide has been created for use with Spin 3D Mesh Converter Version 1.xx NCH Software Technica Support If you have difficuties using Spin 3D Mesh Converter

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

Identifying and Tracking Pedestrians Based on Sensor Fusion and Motion Stability Predictions

Identifying and Tracking Pedestrians Based on Sensor Fusion and Motion Stability Predictions Sensors 2010, 10, 8028-8053; doi:10.3390/s100908028 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors Artice Identifying and Tracking Pedestrians Based on Sensor Fusion and Motion Stabiity

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Automated Segmentation of Whole Cardiac CT Images based on Deep Learning

Automated Segmentation of Whole Cardiac CT Images based on Deep Learning Vo. 9, No., 08 Automated Segmentation of Whoe Cardiac CT Images based on Deep Learning Rajpar Suhai Ahmed, Dr. Jie Liu* Schoo of Computer & Information Technoogy Beijing Jiaotong University, Beijing, China

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

The Classification of Stored Grain Pests based on Convolutional Neural Network

The Classification of Stored Grain Pests based on Convolutional Neural Network 2017 2nd Internationa Conference on Mechatronics and Information Technoogy (ICMIT 2017) The Cassification of Stored Grain Pests based on Convoutiona Neura Network Dexian Zhang1, Wenun Zhao*, 1 1 Schoo

More information

Handling Outliers in Non-Blind Image Deconvolution

Handling Outliers in Non-Blind Image Deconvolution Handing Outiers in Non-Bind Image Deconvoution Sunghyun Cho 1 Jue Wang 2 Seungyong Lee 1,2 sodomau@postech.ac.kr juewang@adobe.com eesy@postech.ac.kr 1 POSTECH 2 Adobe Systems Abstract Non-bind deconvoution

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

Outerjoins, Constraints, Triggers

Outerjoins, Constraints, Triggers Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Interpreting Individual Classifications of Hierarchical Networks

Interpreting Individual Classifications of Hierarchical Networks Interpreting Individua Cassifications of Hierarchica Networks Wi Landecker, Michae D. Thomure, Luís M. A. Bettencourt, Meanie Mitche, Garrett T. Kenyon, and Steven P. Brumby Department of Computer Science

More information

CNN and RNN Based Neural Networks for Action Recognition

CNN and RNN Based Neural Networks for Action Recognition Journa of Physics: Conference Series PAPER OPEN ACCESS CNN and RNN Based Neura Networks for Action Recognition To cite this artice: Chen Zhao et a 2018 J. Phys.: Conf. Ser. 1087 062013 View the artice

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators Mechanics and Mechanica Engineering Vo. 12, No. 4 (2008) 349 356 c Technica University of Lodz Substitute Mode of Deep-groove Ba Bearings in Numeric Anaysis of Compex Constructions Like Manipuators Leszek

More information

A Column Generation Approach for Support Vector Machines

A Column Generation Approach for Support Vector Machines A Coumn Generation Approach for Support Vector Machines Emiio Carrizosa Universidad de Sevia (Spain). ecarrizosa@us.es Beén Martín-Barragán Universidad de Sevia (Spain). bemart@us.es Doores Romero Moraes

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Complex Human Activity Searching in a Video Employing Negative Space Analysis

Complex Human Activity Searching in a Video Employing Negative Space Analysis Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Quality Assessment using Tone Mapping Algorithm

Quality Assessment using Tone Mapping Algorithm Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,

More information

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.

More information

Fuzzy Perceptual Watermarking For Ownership Verification

Fuzzy Perceptual Watermarking For Ownership Verification Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive

More information

Layer-Specific Adaptive Learning Rates for Deep Networks

Layer-Specific Adaptive Learning Rates for Deep Networks Layer-Specific Adaptive Learning Rates for Deep Networks arxiv:1510.04609v1 [cs.cv] 15 Oct 2015 Bharat Singh, Soham De, Yangmuzi Zhang, Thomas Godstein, and Gavin Tayor Department of Computer Science Department

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

AUTOMATIC gender classification based on facial images

AUTOMATIC gender classification based on facial images SUBMITTED TO IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Gender Cassification Using a Min-Max Moduar Support Vector Machine with Incorporating Prior Knowedge Hui-Cheng Lian and Bao-Liang Lu, Senior Member,

More information

The Internet and the web

The Internet and the web The Internet and the web Contents Introduction 3 1 The Internet at home 4 2 Loca Area Networks sma office/home office 5 3 Loca Area Networks business 6 4 Wide Area Networks 8 5 Wireess networks 9 6 Mobie

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information