The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re...The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.展开更多
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de...Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.展开更多
This paper analyzes the connotation of the undergraduate teaching quality assurance system in agriculture-related colleges and universities,and takes Southwest University Rongchang Campus for example to probe into the...This paper analyzes the connotation of the undergraduate teaching quality assurance system in agriculture-related colleges and universities,and takes Southwest University Rongchang Campus for example to probe into the long-term operating mechanism of multidimensional integrated quality assurance system as well as the sound teaching quality monitoring and management system building assurance system and operational practice effect involving personnel training programs,teaching element control,supervision and control of the teaching process,supervision and control of teaching effectiveness,teaching assurance policy and system,teaching funding system,teaching technical support guarantee,and teaching environment building guarantee,with the purpose of providing a reference for the Chinese universities and colleges to improve the teaching quality.展开更多
Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such atta...Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such attacks.Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users.Machine and deep learning and other methods were used to design detection methods for these attacks.However,there is still a need to enhance detection accuracy.Optimization of an ensemble classification method for phishing website(PW)detection is proposed in this study.A Genetic Algo-rithm(GA)was used for the proposed method optimization by tuning several ensemble Machine Learning(ML)methods parameters,including Random Forest(RF),AdaBoost(AB),XGBoost(XGB),Bagging(BA),GradientBoost(GB),and LightGBM(LGBM).These were accomplished by ranking the optimized classi-fiers to pick out the best classifiers as a base for the proposed method.A PW data-set that is made up of 4898 PWs and 6157 legitimate websites(LWs)was used for this study's experiments.As a result,detection accuracy was enhanced and reached 97.16 percent.展开更多
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen...In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.展开更多
We applied the decision tree algorithm to learn association rules between webpage’s category(pornographic or normal) and the critical features.Based on these rules, we proposed an efficient method of filtering pornog...We applied the decision tree algorithm to learn association rules between webpage’s category(pornographic or normal) and the critical features.Based on these rules, we proposed an efficient method of filtering pornographic webpages with the following major advantages: 1) a weighted window-based technique was proposed to estimate for the condition of concept drift for the keywords found recently in pornographic webpages; 2) checking only contexts of webpages without scanning pictures; 3) an incremental learning mechanism was designed to incrementally update the pornographic keyword database.展开更多
Objectives: To analyze the documental quality of 389 websites in Portuguese about physical activity, healthy lifestyles and sedentary lifestyles found on the Brazilian version of the general search engine Google. Meth...Objectives: To analyze the documental quality of 389 websites in Portuguese about physical activity, healthy lifestyles and sedentary lifestyles found on the Brazilian version of the general search engine Google. Methods: The documental quality of the 389 websites was estimated based upon the following parameters: 1) a combination of quality criteria from the Health Information Locator (LIS—OPS/BIREME) and those from Chile’s Pontifical Catholic University, organized into 17 variables;2) uniformity of reference criteria (Vancouver);3) association between the presence of authorship and a higher number of the quality criteria being fulfilled. We also studied the ranking of the results presented by Google in addition to attributes connected to the websites’ target audience, the types of content, their sponsors and country of origin. Results: Of the 389 websites studied, 111 links were not active (28.53% CI 95% [24.05 - 33.02]) and none of the websites in the sample met all of the 17 quality variables. Authored websites displayed remarkable differences in quality when compared to those which did not identify their authors. Conclusions: Faced with the issue of the proliferation of websites with questionable quality content, and the fact that the ranking of results interferes directly in the internal evaluation of content relevance, we propose that public-health research institutions cooperate with web-searching developers to improve the website-positioning formula, in which the “identified authorship” criterion should play a major role in the ranking system.展开更多
Taking the case of vocational schools in Xuzhou City,we analyze the challenges and opportunities faced by the connotation construction of agriculture-related majors in vocational schools. And we discuss the focus of c...Taking the case of vocational schools in Xuzhou City,we analyze the challenges and opportunities faced by the connotation construction of agriculture-related majors in vocational schools. And we discuss the focus of connotation construction of agriculture-related majors,by establishing one theme,building two aspects,deepening three reforms and highlighting four tasks,aiming to make the connotation construction of agriculture-related majors get somewhere,and provide strong support for agricultural science and technology innovation. Finally we put forth measures for the connotation construction of agriculture-related majors.展开更多
This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions...This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. Human-Boostassumed that a database of Web user’s PTD would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. Here, this paper explores the types of the users whose PTDs are useful by running a subject experiment, where 309 participants- browsed 40 websites, judged whether the site appeared to be a phishing site, and described the criterion while assessing the credibility of the site. Based on the result of the experiment, this paper classifies the participants into eight groups by clustering approach and evaluates the detection accuracy for each group. It then clarifies the types of the users who can make suitable trust decisions for HumanBoost.展开更多
At first,the ethical dilemmas of rural revitalization and the present situation of ethics in agriculture-related vocational education were analyzed,and then the ethical dilemmas of agriculture-related vocational educa...At first,the ethical dilemmas of rural revitalization and the present situation of ethics in agriculture-related vocational education were analyzed,and then the ethical dilemmas of agriculture-related vocational education serving rural revitalization were studied.Finally,some ethical countermeasures for the dilemmas were proposed to provide reference for the research related to rural revitalization.展开更多
This paper takes the C-E translation of product introductory texts on official websites of three mobile phone makers as the study object under the Skopos theory, with an aim to identify and analyze the distinctive tra...This paper takes the C-E translation of product introductory texts on official websites of three mobile phone makers as the study object under the Skopos theory, with an aim to identify and analyze the distinctive translation features of such special type of text. The exhausted parse and analysis bring out the findings that there exists a significant translation difference between the Chinese and English-version product introductory texts on official websites. It is found that Chinese introductory texts are more inclined to rely on exquisite words and redundant expressions to describe products’ features and functions, while switching to the corresponding English version, simple vocabularies and compact sentence structure are more frequent. Hereafter, this paper raises two practical guidelines to instruct translation activities in business contexts.展开更多
This paper comparatively analyzes the existing evaluation index of websites, and puts forward the evaluation index and method about the support of a website to enterprise's e-commerce. Through researching on 56 su...This paper comparatively analyzes the existing evaluation index of websites, and puts forward the evaluation index and method about the support of a website to enterprise's e-commerce. Through researching on 56 super enterprises of information industry in Sichuan province, throughout China and the world, analyzing and comparatively studying the support ability of a website to an enterprise's e-commerce, this paper brings forward using five levels to categorize the support ability of a website to enterprise's e-commerce. In the end, the flaw of enterprise's e-commerce practice in Sichuan province and corresponding countermeasure will be illustrated.展开更多
The rural revitalization strategy is one of the“seven strategies”clearly listed in the report of the 19th CPC National Congress.In order to better promote the effective implementation of rural revitalization policie...The rural revitalization strategy is one of the“seven strategies”clearly listed in the report of the 19th CPC National Congress.In order to better promote the effective implementation of rural revitalization policies,it is necessary to give full play to the cornerstone role of rural infrastructure in rural revitalization.This paper first analyzes the supervision mechanism of agriculture-related funds,and then selects the rural development data of local governments in 30 provinces,municipalities,and autonomous regions from 2013 to 2017 as samples to regress and analyze the coupling relationship between my country’s rural infrastructure construction and agriculture-related funds.The study found that my country’s rural infrastructure construction and agriculture-related funds are positively correlated,and the greater the proportion of local finance in agriculture-related funds,the stronger the impact of agriculture-related funds on rural infrastructure construction investment.Policy recommendations such as the proportion of local finances are proposed.展开更多
To clarify the concept framework to assess web based information systems (WIS) evolution from an information perspective instead of the usual systems perspective, and to seek for in-depth understanding of maturing pat...To clarify the concept framework to assess web based information systems (WIS) evolution from an information perspective instead of the usual systems perspective, and to seek for in-depth understanding of maturing patterns of WISs based on the framework, several central concepts related to the information aspect of WIS are firstly discussed, then a growth model of local government websites based on a survey study is proposed.展开更多
Publisher Acta Geologica Sinica-English Edition is published by Blackwell Publishing Asia Pty Ltd 155 Cremorne Street Richmond Vic.3121,Australia Tel:+61(0)3 9274 3100 Fax:+61(0)3 9274 3101
基金supported by the National Social Science Fund of China(23BGL272)。
文摘The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models.
基金the Key JCJQ Program of China:2020-JCJQ-ZD-021-00 and 2020-JCJQ-ZD-024-12.
文摘Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent.
基金Supported by Business Management Cultivation Disciplines of Southwest University Rongchang Campus(RCQG207001)
文摘This paper analyzes the connotation of the undergraduate teaching quality assurance system in agriculture-related colleges and universities,and takes Southwest University Rongchang Campus for example to probe into the long-term operating mechanism of multidimensional integrated quality assurance system as well as the sound teaching quality monitoring and management system building assurance system and operational practice effect involving personnel training programs,teaching element control,supervision and control of the teaching process,supervision and control of teaching effectiveness,teaching assurance policy and system,teaching funding system,teaching technical support guarantee,and teaching environment building guarantee,with the purpose of providing a reference for the Chinese universities and colleges to improve the teaching quality.
基金This research has been funded by the Scientific Research Deanship at University of Ha'il-Saudi Arabia through Project Number RG-20023.
文摘Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such attacks.Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users.Machine and deep learning and other methods were used to design detection methods for these attacks.However,there is still a need to enhance detection accuracy.Optimization of an ensemble classification method for phishing website(PW)detection is proposed in this study.A Genetic Algo-rithm(GA)was used for the proposed method optimization by tuning several ensemble Machine Learning(ML)methods parameters,including Random Forest(RF),AdaBoost(AB),XGBoost(XGB),Bagging(BA),GradientBoost(GB),and LightGBM(LGBM).These were accomplished by ranking the optimized classi-fiers to pick out the best classifiers as a base for the proposed method.A PW data-set that is made up of 4898 PWs and 6157 legitimate websites(LWs)was used for this study's experiments.As a result,detection accuracy was enhanced and reached 97.16 percent.
文摘In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.
基金supported by MOST under Grant No.MOST 103-2410-H-004-112
文摘We applied the decision tree algorithm to learn association rules between webpage’s category(pornographic or normal) and the critical features.Based on these rules, we proposed an efficient method of filtering pornographic webpages with the following major advantages: 1) a weighted window-based technique was proposed to estimate for the condition of concept drift for the keywords found recently in pornographic webpages; 2) checking only contexts of webpages without scanning pictures; 3) an incremental learning mechanism was designed to incrementally update the pornographic keyword database.
文摘Objectives: To analyze the documental quality of 389 websites in Portuguese about physical activity, healthy lifestyles and sedentary lifestyles found on the Brazilian version of the general search engine Google. Methods: The documental quality of the 389 websites was estimated based upon the following parameters: 1) a combination of quality criteria from the Health Information Locator (LIS—OPS/BIREME) and those from Chile’s Pontifical Catholic University, organized into 17 variables;2) uniformity of reference criteria (Vancouver);3) association between the presence of authorship and a higher number of the quality criteria being fulfilled. We also studied the ranking of the results presented by Google in addition to attributes connected to the websites’ target audience, the types of content, their sponsors and country of origin. Results: Of the 389 websites studied, 111 links were not active (28.53% CI 95% [24.05 - 33.02]) and none of the websites in the sample met all of the 17 quality variables. Authored websites displayed remarkable differences in quality when compared to those which did not identify their authors. Conclusions: Faced with the issue of the proliferation of websites with questionable quality content, and the fact that the ranking of results interferes directly in the internal evaluation of content relevance, we propose that public-health research institutions cooperate with web-searching developers to improve the website-positioning formula, in which the “identified authorship” criterion should play a major role in the ranking system.
基金Supported by Agricultural Vocational Education Reform and Development Research Project in Jiangsu Province (20110108)
文摘Taking the case of vocational schools in Xuzhou City,we analyze the challenges and opportunities faced by the connotation construction of agriculture-related majors in vocational schools. And we discuss the focus of connotation construction of agriculture-related majors,by establishing one theme,building two aspects,deepening three reforms and highlighting four tasks,aiming to make the connotation construction of agriculture-related majors get somewhere,and provide strong support for agricultural science and technology innovation. Finally we put forth measures for the connotation construction of agriculture-related majors.
文摘This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. Human-Boostassumed that a database of Web user’s PTD would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. Here, this paper explores the types of the users whose PTDs are useful by running a subject experiment, where 309 participants- browsed 40 websites, judged whether the site appeared to be a phishing site, and described the criterion while assessing the credibility of the site. Based on the result of the experiment, this paper classifies the participants into eight groups by clustering approach and evaluates the detection accuracy for each group. It then clarifies the types of the users who can make suitable trust decisions for HumanBoost.
基金Recognized Scientific Research Project for General Universities in 2021 of Guangdong Provincial Department of Education(2021wtscx239)Guangdong Society of Vocational and Technical Education([2021]No.4202103G166)+1 种基金Guangdong Society of Vocational and Technical Education([2021]No.4202103G164)Rural Science and Technology Commissioner Team for Rural Revitalization in Henghe Town,Boluo County,Huizhou City,Guangdong Province.
文摘At first,the ethical dilemmas of rural revitalization and the present situation of ethics in agriculture-related vocational education were analyzed,and then the ethical dilemmas of agriculture-related vocational education serving rural revitalization were studied.Finally,some ethical countermeasures for the dilemmas were proposed to provide reference for the research related to rural revitalization.
文摘This paper takes the C-E translation of product introductory texts on official websites of three mobile phone makers as the study object under the Skopos theory, with an aim to identify and analyze the distinctive translation features of such special type of text. The exhausted parse and analysis bring out the findings that there exists a significant translation difference between the Chinese and English-version product introductory texts on official websites. It is found that Chinese introductory texts are more inclined to rely on exquisite words and redundant expressions to describe products’ features and functions, while switching to the corresponding English version, simple vocabularies and compact sentence structure are more frequent. Hereafter, this paper raises two practical guidelines to instruct translation activities in business contexts.
文摘This paper comparatively analyzes the existing evaluation index of websites, and puts forward the evaluation index and method about the support of a website to enterprise's e-commerce. Through researching on 56 super enterprises of information industry in Sichuan province, throughout China and the world, analyzing and comparatively studying the support ability of a website to an enterprise's e-commerce, this paper brings forward using five levels to categorize the support ability of a website to enterprise's e-commerce. In the end, the flaw of enterprise's e-commerce practice in Sichuan province and corresponding countermeasure will be illustrated.
基金This paper is supported by the Project of Zhejiang Provincial Department of Education(Grant No.Y202045208).
文摘The rural revitalization strategy is one of the“seven strategies”clearly listed in the report of the 19th CPC National Congress.In order to better promote the effective implementation of rural revitalization policies,it is necessary to give full play to the cornerstone role of rural infrastructure in rural revitalization.This paper first analyzes the supervision mechanism of agriculture-related funds,and then selects the rural development data of local governments in 30 provinces,municipalities,and autonomous regions from 2013 to 2017 as samples to regress and analyze the coupling relationship between my country’s rural infrastructure construction and agriculture-related funds.The study found that my country’s rural infrastructure construction and agriculture-related funds are positively correlated,and the greater the proportion of local finance in agriculture-related funds,the stronger the impact of agriculture-related funds on rural infrastructure construction investment.Policy recommendations such as the proportion of local finances are proposed.
文摘To clarify the concept framework to assess web based information systems (WIS) evolution from an information perspective instead of the usual systems perspective, and to seek for in-depth understanding of maturing patterns of WISs based on the framework, several central concepts related to the information aspect of WIS are firstly discussed, then a growth model of local government websites based on a survey study is proposed.
文摘Publisher Acta Geologica Sinica-English Edition is published by Blackwell Publishing Asia Pty Ltd 155 Cremorne Street Richmond Vic.3121,Australia Tel:+61(0)3 9274 3100 Fax:+61(0)3 9274 3101