• Title/Summary/Keyword: Harmful information

Search Result 545, Processing Time 0.031 seconds

A String Analysis based System for Classifying Android Apps Accessing Harmful Sites (유해 사이트를 접속하는 안드로이드 앱을 문자열 분석으로 검사하는 시스템)

  • Choi, Kwang-Hoon;Ko, Kwang-Man;Park, Hee-Wan;Youn, Jong-Hee
    • The KIPS Transactions:PartA
    • /
    • v.19A no.4
    • /
    • pp.187-194
    • /
    • 2012
  • This paper proposes a string analysis based system for classifying Android Apps that may access so called harmful sites, and shows an experiment result for real Android apps on the market. The system first transforms Android App binary codes into Java byte codes, it performs string analysis to compute a set of strings at all program points, and it classifies the Android App as bad ones if the computed set contains URLs that are classified because the sites provide inappropriate contents. In the proposed approach, the system performs such a classification in the stage of distribution before installing and executing the Apps. Furthermore, the system is suitable for the automatic management of Android Apps in the market. The proposed system can be combined with the existing methods using DNS servers or monitoring modules to identify harmful Android apps better in different stages.

Finding the Information Source by Voronoi Inference in Networks (네트워크에서 퍼진 정보의 근원에 대한 Voronoi 추정방법)

  • Choi, Jaeyoung
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.6
    • /
    • pp.684-694
    • /
    • 2019
  • Information spread in networks is universal in many real-world phenomena such as propagation of infectious diseases, diffusion of a new technology, computer virus/spam infection in the internet, and tweeting and retweeting of popular topics. The problem of finding the information source is to pick out the true source if information spread. It is of practical importance because harmful diffusion can be mitigated or even blocked e.g., by vaccinating human or installing security updates. This problem has been much studied, where it has been shown that the detection probability cannot be beyond 31% even for regular trees if the number of infected nodes is sufficiently large. In this paper, we study the impact of an anti-information spreading on the original information source detection. We consider an active defender in the network who spreads the anti-information against to the original information simultaneously and propose an inverse Voronoi partition based inference approach, called Voronoi Inference to find the source. We perform various simulations for the proposed method and obtain the detection probability that outperforms to the existing prior work.

Comparison of Application Effect of Natural Language Processing Techniques for Information Retrieval (정보검색에서 자연어처리 응용효과 분석)

  • Xi, Su Mei;Cho, Young Im
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.11
    • /
    • pp.1059-1064
    • /
    • 2012
  • In this paper, some applications of natural language processing techniques for information retrieval have been introduced, but the results are known not to be satisfied. In order to find the roles of some classical natural language processing techniques in information retrieval and to find which one is better we compared the effects with the various natural language techniques for information retrieval precision, and the experiment results show that basic natural language processing techniques with small calculated consumption and simple implementation help a small for information retrieval. Senior high complexity of natural language processing techniques with high calculated consumption and low precision can not help the information retrieval precision even harmful to it, so the role of natural language understanding may be larger in the question answering system, automatic abstract and information extraction.

Mutual Information in Naive Bayes with Kernel Density Estimation (나이브 베이스에서의 커널 밀도 측정과 상호 정보량)

  • Xiang, Zhongliang;Yu, Xiangru;Kang, Dae-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.86-88
    • /
    • 2014
  • Naive Bayes (NB) assumption has some harmful effects in classification to the real world data. To relax this assumption, we now propose approach called Naive Bayes Mutual Information Attribute Weighting with Smooth Kernel Density Estimation (NBMIKDE) that combine the smooth kernel for attribute and attribute weighting method based on mutual information measure.

  • PDF

Defending and Detecting Audio Adversarial Example using Frame Offsets

  • Gong, Yongkang;Yan, Diqun;Mao, Terui;Wang, Donghua;Wang, Rangding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1538-1552
    • /
    • 2021
  • Machine learning models are vulnerable to adversarial examples generated by adding a deliberately designed perturbation to a benign sample. Particularly, for automatic speech recognition (ASR) system, a benign audio which sounds normal could be decoded as a harmful command due to potential adversarial attacks. In this paper, we focus on the countermeasures against audio adversarial examples. By analyzing the characteristics of ASR systems, we find that frame offsets with silence clip appended at the beginning of an audio can degenerate adversarial perturbations to normal noise. For various scenarios, we exploit frame offsets by different strategies such as defending, detecting and hybrid strategy. Compared with the previous methods, our proposed method can defense audio adversarial example in a simpler, more generic and efficient way. Evaluated on three state-of-the-arts adversarial attacks against different ASR systems respectively, the experimental results demonstrate that the proposed method can effectively improve the robustness of ASR systems.

The implementation of liquefaction equipment monitoring system based on Android (안드로이드 기반의 유증기 액화장치 모니터링 시스템 구현)

  • Park, Man-Kyu;Tack, Han-Ho;Kim, Gwan-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.583-589
    • /
    • 2016
  • Volatile organic compounds(VOCs) are regarded as a harmful cause substance not only causing air pollutions but also causing global warming phenomenon. For this reason, VOCs are managed politically to reduce emissions by each country. In particular, the vapor from the gas station contains VOCs which is harmful to the human body such as carcinogens benzene and pollute the atmosphere, the Ministry of Environment defined every gas station must install vapor recovery equipment to recover volatile organic compounds. Recently, there are many accidents caused by existing vapor treatment methods, the liquefaction recovery technology is getting the spotlight to cool the vapor at the field. However, because the liquefaction recovery technology have risks of fire or explosion in accordance with temperature, the real time monitoring is critical factor. In this paper, we implement an Android-based monitoring application for liquified vapor recovery device which attached sensor module for temperature and power to monitoring real time information.

Basic Concepts of Western Medicine Toxicology and $LD_{50}$ in Herbal Drugs (서양의학 독성학의 기본적 개념 및 한약의 $LD_{50}$)

  • Park Yeon-Chul;Lee Sun-Dong;Park Kyoung-Sik
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.3 no.2
    • /
    • pp.91-100
    • /
    • 1999
  • Today, toxicology is used for many purpose, in many fields. Classification of special toxic effect is related next 4 important principles. 1. The chemical substance must move to target organ or tissue that can induce Biological effect. For this movement, we have to understand the physical-chemical characteristic of substance, and the rout of absorption, metabolism, diffusion and excretion of toxic substance. 2. Every biological effect that induced by chemical substance is not harmful. For example, some specific chemical substance is not harmful in liver enzyme system. 3. The strength of biological effect induced by chemical substance is deep related with dose. Nearly all substance is not effective below the specific dose, and it may toxic to death over the specific dose. It is the 'Dose - response relationship' But carcinogen may toxic whether it is law dose or not. 4. The information that was obtained by experimental animal test, could have to adapt in human biology. Because biological effect of chemical substance could be different in every biological species. In past, drugs was obtained by animal or plants. But in the future, it could be obtained by biochemistry, and genome project. Therefore, in Oriental medicine, research and approach is needed at this time, and have to develop new method of experience in toxic method.

  • PDF

Characteristics of Photosynthetic Pigments during the Outbreak of Harmful Algal Bloom at the South Coastal Area in the Korean Sea Waters

  • Kim, Sook-Yang;Lim, Woel-Ae;Kang, Young-Sil
    • Korean Journal of Environmental Biology
    • /
    • v.28 no.1
    • /
    • pp.20-29
    • /
    • 2010
  • Cochlodinium polykrikoides has occurs regularly during the summer in the South Sea of Korea. To investigate photosynthetic pigments concerned with phytoplankton community structure as bloom of Cochlodinium polykrikoides, the experiment was sampled at 20 stations three times between July and September 2002 in the Southern Sea of Korea. The distribution of peridinin, the biomarker of dinoflagellate, was higher at the blooming time than it was before and it disappeared after bloom. The correlative coefficients between Chl. a and peridinin at the blooming time and out of bloom were 0.9253 and 0.1613, respectively. This result indicated that the bloom was caused by dinoflagellate. The correlative coefficients between Chl. a and fucoxanthin were 0.3282 and 0.9759, respectively, and the correlative coefficients showed the succession from dinoflagellate to diatom. This result means that the bloom of Cochlodinium polykrikoides can be detected by Chl. a information from satellite remote sensing. Therefore, if the algorithm to detect peridinin in addition to Chl. a were to be developed, dinoflagellate red tide could be monitored more effectively.

Clinical efficacy of Gyeongshingangjeehwan16 according to bioimpedence analysis system (생체전기임피던스 측정법에 의한 경신강지환16의 비만개선 효과 평가)

  • Jung, Yang-Sam;Yoon, Ki-Hyeon;Choi, Seung-Bae;Yoon, Mi-Chung;Shin, Soon-Shik
    • Journal of Oriental Neuropsychiatry
    • /
    • v.19 no.1
    • /
    • pp.71-81
    • /
    • 2008
  • Objective: Obesity threatens not only the problem of beauty but also health. Furthermore, it could be harmful a chronic disease to increase mortality rate. A purpose of this study is to show a effect of obesity control as developing a herbal medicine, Gyeongshingangjeehwan16 (GGEx16), in order to control obesity that is a harmful factor for healthy. Method : In order to prove the effect of GGEx16, BMI, fat distribution, fat control and fitness score which are closely related with obesity are considered as variables. Each variable is measured, for statistical analysis, using measurement implement of InBody 3.0 which applied a theory of bioimpedence analysis. Result and Conclusion : As a result of statistical analysis for four variables, it was improved that there are the improved effect for obesity because GGEx16 is statistically meaningful better than prior to taking.

  • PDF

Identification of Contaminant Injection in Water Distribution Network

  • Marlim, Malvin Samuel;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.114-114
    • /
    • 2020
  • Water contamination in a water distribution network (WDN) is harmful since it directly induces the consumer's health problem and suspends water service in a wide area. Actions need to be taken rapidly to countermeasure a contamination event. A contaminant source ident ification (CSI) is an important initial step to mitigate the harmful event. Here, a CSI approach focused on determining the contaminant intrusion possible location and time (PLoT) is introduced. One of the methods to discover the PLoT is an inverse calculation to connect all the paths leading to the report specification of a sensor. A filtering procedure is then applied to narrow down the PLoT using the results from individual sensors. First, we spatially reduce the suspect intrusion points by locating the highly suspicious nodes that have similar intrusion time. Then, we narrow the possible intrusion time by matching the suspicious intrusion time to the reported information. Finally, a likelihood-score is estimated for each suspect. Another important aspect that needs to be considered in CSI is that there are inherent uncertainties, such as the variations in user demand and inaccuracy of sensor data. The uncertainties can lead to overlooking the real intrusion point and time. To reflect the uncertainties in the CSI process, the Monte-Carlo Simulation (MCS) is conducted to explore the ranges of PLoT. By analyzing all the accumulated scores through the random sets, a spread of contaminant intrusion PLoT can then be identified in the network.

  • PDF