Refine your search
Collections
Co-Authors
Journals
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Evanjaline, D. J.
- Feature Sub-Spacing Based Stacking for Effective Imbalance Handling in Sensitive Data
Abstract Views :347 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science, Bharathidasan University, IN
1 Department of Computer Science, Bharathidasan University, IN
Source
ICTACT Journal on Soft Computing, Vol 12, No 1 (2021), Pagination: 2510-2514Abstract
Several real world classification applications suffer from an issue called data imbalance. Handling data imbalance is crucial in developing an effective classification system. This work presents an effective classifier ensemble model, Feature Sub-spacing Stacking Model (FSSM) that has been designed to operate on highly imbalanced, complex and sensitive data. The FSSM technique is based on creating subspace of features, to aid in the reduction of data complexity and also to handle data imbalance. First level trains models based on these features, which is followed by creating a stacking architecture. The second level stacking architecture trains on the predictions from the first level base models. This has enabled better and qualitative predictions. Experiments were conducted on bank data and also the NSL-KDD data. Results reveal highly effective performances compared to the existing models.Keywords
Classification, Data Imbalance, Ensemble, Stacking, Feature Sub-Spacing.References
- A. Somasundaram and U.S. Reddy, “Data Imbalance: Effects and Solutions for Classification of Large and Highly Imbalanced Data”, Proceedings of International Conference on Research in Engineering, Computers and Technology, pp. 1-16, 2016.
- A. Somasundaram and U.S. Reddy, “Modelling A Stable Classifier for Handling Large Scale Data with Noise and Imbalance”, Proceedings of International Conference on Computational Intelligence in Data Science, pp. 1-6, 2017.
- M. Koziarski, B. Krawczyk and M. Woźniak, “Radial-Based Oversampling for Noisy Imbalanced Data Classification”, Neurocomputing, Vol. 343, pp. 19-33, 2019.
- C. Tsai, W. Lin, Y. Hu and G. Yao, “Under-Sampling Class Imbalanced Datasets by Combining Clustering Analysis and Instance Selection”, Information Sciences, Vol. 477, pp. 47-54, 2019.
- G. Chen and Z. Ge, “SVM-Tree and SVM-Forest Algorithms for Imbalanced Fault Classification in Industrial Processes”, IFAC Journal of Systems and Control, Vol. 8, pp. 1-8, 2019.
- M. Buda, A. Maki and M.A. Mazurowski, “A Systematic Study of the Class Imbalance Problem in Convolutional Neural Networks”, Neural Networks, Vol. 106, pp. 249-259, 2019.
- Y. Qian, Y. Liang, M. Li and G. Feng, “A Resampling Ensemble Algorithm for Classification of Imbalance Problems”, Neurocomputing, Vol. 143, pp. 57-67, 2014.
- N.V. Chawla and K.W. Bowyer, “SMOTE: Synthetic Minority Over-Sampling Technique”, Journal of Artificial Intelligence Research, Vol. 16, pp. 321-357, 2002.
- X. Tao, Q. Li and W. Guo, “Self-Adaptive Cost Weights-Based Support Vector Machine Cost-Sensitive Ensemble for Imbalanced Data Classification”, Information Sciences, Vol. 487, pp. 1-56, 2019.
- H. Faris, R. Abukhurma and W. Almanaseer, “Improving Financial Bankruptcy Prediction in a Highly Imbalanced Class Distribution using Oversampling and Ensemble Learning: A Case from the Spanish Market”, Progress in Artificial Intelligence, Vol.9, No. 1, pp. 1-23, 2019.
- M. Lazaro, F. Herrera and A. Figueiras Vidal, “Ensembles of Cost-Diverse Bayesian Neural Learners for Imbalanced Binary Classification”, Information Sciences, Vol. 520, pp. 31-45, 2020.
- X. Gao, “An Ensemble Imbalanced Classification Method based on Model Dynamic Selection Driven by Data Partition Hybrid Sampling”, Expert Systems with Applications, Vol. 160, pp. 1-13, 2020.
- Y. Sui, Y. Wei and D. Zhao, “Computer-Aided Lung Nodule Recognition by SVM Classifier based on Combination of Random under Sampling and Smote”, Computational and Mathematical Methods in Medicine, Vol. 620, pp. 1-13, 2015.
- Y. Zuo and C.Z. Jia, “Carsite: Identifying Carbonylated Sites of Human Proteins based on a One-Sided Selection Resampling method. Molecular Biosystems”, Vol. 13, No. 11, pp. 2362-2369, 2017.
- P. Vuttipittayamongkol and E. Elyan, “Neighborhood-Based under Sampling Approach for Handling Imbalanced and Overlapped Data”, Information Sciences, Vol. 509, pp. 47-70, 2020.
- A. Somasundaram and S. Reddy, “Parallel and Incremental Credit Card Fraud Detection Model to Handle Concept Drift and Data Imbalance”, Neural Computing and Applications, Vol. 31, No. 1, pp. 3-14, 2018.
- S. Suh, H. Lee, P. Lukowicz and Y. Lee, “CEGAN: Classification Enhancement Generative Adversarial Networks for unraveling data imbalance problems”, Neural Networks, Vol. 133, pp. 69-86, 2021.
- H. Zhu, G. Liu, M. Zhou, Y. Xie, A. Abusorrah and Q. Kang, “Optimizing Weighted Extreme Learning Machines for Imbalanced Classification and Application to Credit Card Fraud Detection”, Neurocomputing, Vol. 407, pp. 50-62, 2020.
- Q.Y. Zhu, A.K. Qin, P.N. Suganthan and G.B. Huang, “Evolutionary Extreme Learning Machine”, Pattern Recognition, Vol. 38, No. 10, pp. 1759-1763, 2005.
- J. Cao, Z. Lin and G. Huang, “Self-Adaptive Evolutionary Extreme Learning Machine”, Neural Processing Letters, Vol. 36, No. 3, pp. 285-305, 2012.
- Y. Xu and Y. Shu, “Evolutionary Extreme Learning Machine - Based on Particle Swarm Optimization”, Proceedings of International Conference on Advances in Neural Networks, pp. 1-26, 2006.
- F. Han, H. Yao and Q. Ling, “An Improved Evolutionary Extreme Learning Machine based on Particle Swarm Optimization”, Neurocomputing, Vol. 116, pp. 87-93, 2013.
- C. Wang, C. Deng and S. Wang, “Imbalance-XGBoost: Leveraging Weighted and Focal Losses for Binary Label-Imbalanced Classification with XGBoost”, Pattern Recognition Letters, Vol. 136, pp. 190-197, 2020.
- H. He, W. Zhang and S. Zhang, “A Novel Ensemble Method for Credit Scoring: Adaption of Different Imbalance Ratios”, Expert System Applications, Vol. 98, pp.105-117, 2018.
- Xu Ying Liu, Jianxin Wu and Zhi Hua Zhou, “Exploratory Undersampling for Class-Imbalance Learning”, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), Vol. 39, No. 2, pp. 539-550, 2009.
- M.F. Kabir and S. Ludwig, “Classification of Breast Cancer Risk Factors using Several Resampling Approaches”, Proceedings of IEEE International Conference on Machine Learning and Applications, pp. 1243-1248, 2018.
- An Efficient and Secure Text Encryption Scheme for Wireless Sensor Network (WSN) Using Dynamic Key Approach
Abstract Views :421 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science, Rajah Serfoji Govt. College (Autonomous), Affiliated to Bharathidasan University, Thanjavur, Tamil Nadu, IN
1 Department of Computer Science, Rajah Serfoji Govt. College (Autonomous), Affiliated to Bharathidasan University, Thanjavur, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 6 (2021), Pagination: 788-794Abstract
In a wireless sensor network (WSN), all detected data is delivered via a wireless communication channel to a sink node, then sent to an information-gathering centre for necessary actions or controls. The sensed data could be readily manipulated or eavesdropped on if security procedures are not used. For WSN, several security solutions based on classical cryptography have been devised, although the sophisticated encryption operations take significant energy. The symmetric and asymmetric key encryption provides efficient data security, but it takes high energy consumption and computational complexity. In this paper, a lightweight, energy-efficient secure text encryption is proposed using the dynamic salt key. There are three primary processes in the suggested paradigm. The first is salt generation. The next step is to encrypt secret text using format-preserving encryption based on the salt key, and the final step is to decrypt the data. The encryption process is more secure, and the hackers cannot capture key values. The proposed approach creates a safe environment for sensors to protect the data quickly, efficiently, and low-computation before sending it across a wireless network to the sink node. The proposed method simulation provides a high level of security while requiring minimal communication and computational resources.Keywords
Wireless Sensor Network, Lightweight Encryption, Dynamic Encryption, Salt Algorithm, Format-Preserving Encryption, Security, Dynamic Key.References
- H. Hayouni, M.A. Hamdi, "A novel energy-efficient encryption algorithm for secure data in WSNs", Journal of Supercomputing, vol. 77, pp. 4754–4777, 2021
- S.A. Bragadeesh and A. Umamakeswari, "Secure Data Aggregation for Wireless Sensor Network using Lightweight Cryptography", Indian Journal of science and technology, vol. 9, no. 48, 2016
- K. Biswas, V. Muthukkumarasamy, E. Sithirasenan, K. Singh, "A Simple Lightweight Encryption Scheme for Wireless Sensor Networks", International Conference on Distributed Computing and Networking, pp. 499-504, 2014
- L. Yi, X. Tong, Z. Wang, M. Zhang, H. Zhu and J. Liu, "A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network," in IEEE Access, vol. 7, pp. 53079-53090, 2019
- S. Rajesh, V. Paul, V.G. Menon, M.R. Khosravi, "A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices", Symmetry, vol. 11, no. 2, 2019
- M. Alotaibi, "Security to wireless sensor networks against malicious attacks using Hamming residue method", Journal of Wireless Communications and Networking, vol. 8, 2019
- Denis R, Madhubala P, "Evolutionary Computing Assisted Visually-Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment", International Journal of Computer Networks and Applications (IJCNA), 7(6), PP: 208 - 230, 2020, DOI: 10.22247/ijcna/2020/205321.
- H. Tawalbeh, S. Hashish, L. Tawalbeh, A. Aldairi, "Security in Wireless Sensor Networks Using Lightweight Cryptography", Journal of Information Assurance and Security, vol. 12, pp. 118-123, 2017
- T. A. Alghamdi, "Secure and Energy-Efficient Path Optimization Technique in Wireless Sensor Networks Using DH Method," in IEEE Access, vol. 6, pp. 53576-53582, 2018
- K.L. Tsai, F.Y. Leu, T.H. Su, and Y.C. Chang, "A Light Weight Data Encryption Method for WSN Communication", International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 788-795, 2018
- S.R. Ghorashi, T. Zia and Y. Jiang, "Optimisation of Lightweight Klein Encryption Algorithm With 3 S-box," 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 1-5, 2020
- L. Feng, H. Zhang, L. Lou and Y. Chen, "A Blockchain-Based Collocation Storage Architecture for Data Security Process Platform of WSN," 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD)), pp. 75-80, 2018
- S.M. Pournaghi, M. Bayat, and Y. Farjami, "MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption", J Ambient Intell Human Comput, vol. 11, pp. 4613–4641, 2020
- B. Sun, Q. Li, and B. Tian, "Local Dynamic Key Management Scheme Based on Layer-Cluster Topology in WSN", Wireless Pers Commun, vol. 103, pp. 699–714, 2018
- S. Athmani, A. Bilami, D.E. Boubiche, "EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs", Future Generation Computer Systems, vol. 92, pp. 789-799, 2019
- S. Mesmoudi,B. Benadda,A. Mesmoudi, "SKWN: Smart and dynamic key management scheme for wireless sensor networks", International Journal of Communication Systems, vol. 32, no. 7, 2019
- M. Elhoseny, X. Yuan, H.K. El-Minir, and A.M. Riad, "An energy efficient encryption method for secure dynamic WSN", Security and Communication Networks, vol. 9, no. 13, pp. 2024–2031, 2016
- M. Elhoseny, H. Elminir, A. Riad, and X. Yuan, "A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption", Journal of King Saud University-Computer and Information Sciences, vol. 28, no. 3, pp. 262–275., 2016
- O.A. Khashan, R. Ahmad, N.M. Khafajah, "An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks", Ad Hoc Networks, vol. 115, 2021
- A. Nanda, P. Nanda, X. He, A. Jamdagni, D. Puthal, "A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks", Future Generation Computer Systems, vol. 109, pp. 521-530, 2020
- J. Jeong, D. Woo and Y. Cha, "Enhancement of Website Password Security by Using Access Log-based Salt," 2019 International Conference on Systems of Collaboration Big Data, Internet of Things & Security (SysCoBIoTS), pp. 1-3, 2019
- N.S. Ali, M.H. Alattar A.A. Farawn, "Anti-continuous collisions user-based unpredictable iterative password salted hash encryption", In Int. J. Internet Technology and Secured Transactions, volume 8, page 619–634, 2018.
- P. Chandrashekar, S. Dara and V. N. Muralidhara, "Efficient Format Preserving encrypted databases," 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), pp. 1-4, 2015
- S. Boonkrong, C. Somboonpattanakit, "Dynamic Salt Generation and Placement for Secure Password Storing", International Journal of Computer Science, vol. 43, no. 1, 2015How to cite this article:
- B. Cui, B. Zhang, and K. Wang, "A data masking scheme for sensitive big data based on format-preserving encryption", in Proc. IEEE Int. Conf. Comput. Sci. Eng. (CSE) IEEE Int. Conf. Embedded Ubiquitous Comput., (EUC), pp. 518–524, 2017
- I. Oh, T. Kim, K. Yim, and S.-Y. Lee, "A novel message-preserving scheme with format-preserving encryption for connected cars in multi-access edge computing", Sensors, vol. 19, no. 18, 2019.
- H. Sun, H. Luo, and Y. Sun, "Data hiding for ensuring the quality of the host image and the security of the message", IEEE Access, vol. 7, pp. 64767–64777, 2019