• Title/Summary/Keyword: Secure Machine Learning

Search Result 73, Processing Time 0.024 seconds

Estimation of regional flow duration curve applicable to ungauged areas using machine learning technique (머신러닝 기법을 이용한 미계측 유역에 적용 가능한 지역화 유황곡선 산정)

  • Jeung, Se Jin;Lee, Seung Pil;Kim, Byung Sik
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.spc1
    • /
    • pp.1183-1193
    • /
    • 2021
  • Low flow affects various fields such as river water supply management and planning, and irrigation water. A sufficient period of flow data is required to calculate the Flow Duration Curve. However, in order to calculate the Flow Duration Curve, it is essential to secure flow data for more than 30 years. However, in the case of rivers below the national river unit, there is no long-term flow data or there are observed data missing for a certain period in the middle, so there is a limit to calculating the Flow Duration Curve for each river. In the past, statistical-based methods such as Multiple Regression Analysis and ARIMA models were used to predict sulfur in the unmeasured watershed, but recently, the demand for machine learning and deep learning models is increasing. Therefore, in this study, we present the DNN technique, which is a machine learning technique that fits the latest paradigm. The DNN technique is a method that compensates for the shortcomings of the ANN technique, such as difficult to find optimal parameter values in the learning process and slow learning time. Therefore, in this study, the Flow Duration Curve applicable to the unmeasured watershed is calculated using the DNN model. First, the factors affecting the Flow Duration Curve were collected and statistically significant variables were selected through multicollinearity analysis between the factors, and input data were built into the machine learning model. The effectiveness of machine learning techniques was reviewed through statistical verification.

Review the Recent Fraud Detection Systems for Accounting Area using Blockchain Technology

  • Rania Alsulami;Raghad Albalawi;Manal Albalawi;Hetaf Alsugair;Khaled A. Alblowi;Adel R. Alharbi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.109-120
    • /
    • 2023
  • With the increasing interest in blockchain technology and its employment in diverse sectors and industries, including: finance, business, voting, industrial and many other medical and educational applications. Recently, the blockchain technology has played significant role in preventing fraud transactions in accounting systems, as the blockchain offers high security measurements, reduces the need for centralized processing, and blocks access to the organization information and system. Therefore, this paper studies, analyses, and investigates the adoption of blockchain technology with accounting systems, through analyzing the results of several research works which have employed the blockchain technology to secure their accounting systems. In addition, we investigate the performance of applying the deep learning and machine learning approaches for the purpose of fraud detection and classification. As a result of this study, the adoption of blockchain technology will enhance the safety and security of accounting systems, through identifying and classifying the possible frauds that may attack the accounting and business organizations.

A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique (머신러닝을 이용한 사용자 행동 인식 기반의 PIN 입력 기법 연구)

  • Jung, Changhun;Dagvatur, Zayabaatar;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.127-136
    • /
    • 2018
  • In this paper, we propose a PIN entry method that combines with machine learning technique on smartphone. We use not only a PIN but also touch time intervals and locations as factors to identify whether the user is correct or not. In the user registration phase, a remote server was used to train/create a machine learning model using data that collected from end-user device (i.e. smartphone). In the user authentication phase, the pre-trained model and the saved PIN was used to decide the authentication success or failure. We examined that there is no big inconvenience to use this technique (FRR: 0%) and more secure than the previous PIN entry techniques (FAR : 0%), through usability and security experiments, as a result we could confirm that this technique can be used sufficiently. In addition, we examined that a security incident is unlikely to occur (FAR: 5%) even if the PIN is leaked through the shoulder surfing attack experiments.

A Comparative Study on Machine Learning Models for Red Tide Detection (적조 탐지를 위한 기계학습 모델 비교 연구)

  • Park, Mi-So;Kim, Na-Kyeong;Kim, Bo-Ram;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1363-1372
    • /
    • 2021
  • Red tide, defined as the major reproduction of harmful birds, has the characteristics of being generated and diffused in a wide area. This has limitations in detection only with the existing investigation method. Therefore, in this study, red tide was detected using a remote sensing technique. In addition, it was intended to increase the accuracy of detection by using optical characteristics, not just the concentration of chlorophyll. Red tide mainly occurs on the southern coast where sea signals are complex, and the main red tide control species on the southern coast is Cochlodinium polykirkoides. Therefore, it was intended to secure objectivity by reflecting features that could not be found depending on the researcher's observation and experience, not limited to visual judgment using machine learning techniques. In this study, support background machines and random forest were used among machine learning models, and as a result of calculating accuracy as performance evaluation indicators of the two models, the accuracy was 85.7% and 80.2%, respectively.

A Study on Methods to Prevent the Spread of COVID-19 Based on Machine Learning

  • KWAK, Youngsang;KANG, Min Soo
    • Korean Journal of Artificial Intelligence
    • /
    • v.8 no.1
    • /
    • pp.7-9
    • /
    • 2020
  • In this paper, a study was conducted to find a self-diagnosis method to prevent the spread of COVID-19 based on machine learning. COVID-19 is an infectious disease caused by a newly discovered coronavirus. According to WHO(World Health Organization)'s situation report published on May 18th, 2020, COVID-19 has already affected 4,600,000 cases and 310,000 deaths globally and still increasing. The most severe problem of COVID-19 virus is that it spreads primarily through droplets of saliva or discharge from the nose when an infected person coughs or sneezes, which occurs in everyday life. And also, at this time, there are no specific vaccines or treatments for COVID-19. Because of the secure diffusion method and the absence of a vaccine, it is essential to self-diagnose or do a self-diagnosis questionnaire whenever possible. But self-diagnosing has too many questions, and ambiguous standards also take time. Therefore, in this study, using SVM(Support Vector Machine), Decision Tree and correlation analysis found two vital factors to predict the infection of the COVID-19 virus with an accuracy of 80%. Applying the result proposed in this paper, people can self-diagnose quickly to prevent COVID-19 and further prevent the spread of COVID-19.

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.

Development of Machine Learning Based Precipitation Imputation Method (머신러닝 기반의 강우추정 방법 개발)

  • Heechan Han;Changju Kim;Donghyun Kim
    • Journal of Wetlands Research
    • /
    • v.25 no.3
    • /
    • pp.167-175
    • /
    • 2023
  • Precipitation data is one of the essential input datasets used in various fields such as wetland management, hydrological simulation, and water resource management. In order to efficiently manage water resources using precipitation data, it is essential to secure as much data as possible by minimizing the missing rate of data. In addition, more efficient hydrological simulation is possible if precipitation data for ungauged areas are secured. However, missing precipitation data have been estimated mainly by statistical equations. The purpose of this study is to propose a new method to restore missing precipitation data using machine learning algorithms that can predict new data based on correlations between data. Moreover, compared to existing statistical methods, the applicability of machine learning techniques for restoring missing precipitation data is evaluated. Representative machine learning algorithms, Artificial Neural Network (ANN) and Random Forest (RF), were applied. For the performance of classifying the occurrence of precipitation, the RF algorithm has higher accuracy in classifying the occurrence of precipitation than the ANN algorithm. The F1-score and Accuracy values, which are evaluation indicators of the classification model, were calculated as 0.80 and 0.77, while the ANN was calculated as 0.76 and 0.71. In addition, the performance of estimating precipitation also showed higher accuracy in RF than in ANN algorithm. The RMSE of the RF and ANN algorithms was 2.8 mm/day and 2.9 mm/day, and the values were calculated as 0.68 and 0.73.

Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems (기계 학습 기반의 자동화된 스머지 공격과 패턴 락 시스템 안전성 분석)

  • Jung, Sungmi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.903-910
    • /
    • 2016
  • As smart mobile devices having touchscreens are growingly deployed, a pattern lock system, which is one of the graphical password systems, has become a major authentication mechanism. However, a user's unlocking behaviour leaves smudges on a touchscreen and they are vulnerable to the so-called smudge attacks. Smudges can help an adversary guess a secret pattern correctly. Several advanced pattern lock systems, such as TinyLock, have been developed to resist the smudge attacks. In this paper, we study an automated smudge attack that employs machine learning techniques and its effectiveness in comparison to the human-only smudge attacks. We also compare Android pattern lock and TinyLock schemes in terms of security. Our study shows that the automated smudge attacks are significantly advanced to the human-only attacks with regard to a success ratio, and though the TinyLock system is more secure than the Android pattern lock system.

Analysis of the Construction Cost Prediction Performance according to Feature Scaling and Log Conversion of Target Variable (피처 스케일링과 타겟변수 로그변환에 따른 건축 공사비 예측 성능 분석)

  • Kang, Yoon-Ho;Yun, Seok-Heon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.3
    • /
    • pp.317-326
    • /
    • 2022
  • With the development of various technologies in the area of artificial intelligence, a number of studies to application of artificial intelligence technology in the construction field are underway. Diverse technologies have been applied to the task of predicting construction costs, and construction cost prediction technologies applying artificial intelligence technologies have recently been developed. However, it is difficult to secure the vast amount of construction cost data required for machine learning, which has not yet been practically used. In this study, to predict the construction cost, the latest artificial neural network(ANN) method is used to propose a method to improve the construction cost prediction performance. In particular, to improve predictive performance, a log conversion method of target variables and a feature scaling method to eliminate the difference in the relative influence of each column data are applied, and their performance in predicting construction cost is compared and analyzed.

Development of Convergence Education Program for 'Understanding of Molecular Structure' using Machine Learning Educational Platform (머신러닝 교육 플랫폼 활용 '분자 구조의 이해'를 위한 융합교육 프로그램 개발)

  • Yi, Soyul;Lee, Youngjun
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.6
    • /
    • pp.961-972
    • /
    • 2021
  • In this study, an educational program was developed so that artificial intelligence could be used as a transdisciplinary convergence education with other disciplines. The main educational content is designed for 8 hours using machine learning to help students understand the molecular structure dealt with in high school chemistry. The program developed in this study calculated the I-CVI (Item Content Validity Index) value through expert review, and as a result, none of the items were rejected with a score of .80 or higher. Because the program of this study combines the content elements of the chemistry subject and the information (artificial intelligence) subject academically, it is expected that the learner will be able to increase the convergence talent literacy. In addition, since it is not required to secure a additional number of hours for this educational program, the burden on teachers may be low.