Putra Wanda
Harbin University of Science and Technology

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

DeepOSN: Bringing deep learning as malicious detection scheme in online social network Putra Wanda; Marselina Endah Hiswati; Huang J. Jie
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (533.382 KB) | DOI: 10.11591/ijai.v9.i1.pp146-154

Abstract

Manual analysis for malicious prediction in Online Social Networks (OSN) is time-consuming and costly. With growing users within the environment, it becomes one of the main obstacles. Deep learning is growing algorithm that gains a big success in computer vision problem. Currently, many research communities have proposed deep learning techniques to automate security tasks, including anomalous detection, malicious link prediction, and intrusion detection in OSN. Notably, this article describes how deep learning makes the OSN security technique more intelligent for detecting malicious activity by establishing a classifier model.
Efficient Data Security for Mobile Instant Messenger Putra Wanda; Huang J. Jie
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.4045

Abstract

Instant Messenger (IM) becomes one of the most popular applications in mobile technology and communication. A lot of users around the world installed it for daily activities. Current IM found security lacks both in authentication and encryption matters. Various IM growing today still not apply an efficient method in authentication and encryption process, conventional security methods and client-server architecture system have to risk too many users for attacking server such as compromising, cracking password or PINs by Unauthorized people. Common IM services lack native encryption to protect information being transmitted over the public network and still used high computation in the mobile environment, this problem needs efficient security methods. Then, in public IM also found various messages with fake users, it occurs because public IM carry out the separate system in authentication and encryption process, strong authentication need to solve this issue in messenger environment. The tremendous growth of mobile IM user needs efficient and secure communication way. This paper proposes a new efficient method for securing message both in encryption and authentication within the end-to-end model. In this research, security method proposes new algorithms based on Elliptic Curve (EC) works in Peer to Peer (P2P) architecture than a conventional client-server model. The result shows this method produces efficient time in authentication and encryption process while applying in a mobile environment. Besides, it is compatible with the mobile phone which has a limitation of computation capabilities and resources.