首页 > 最新文献

2019 European Intelligence and Security Informatics Conference (EISIC)最新文献

英文 中文
Program Committee 项目委员会
Pub Date : 2019-11-01 DOI: 10.1109/eisic49498.2019.9108778
Pengcheng Zhang, Junhua Ding, Xiaobing Sun, Mingyue Jiang
Sanghyun Ahn, University of Seoul Amir H. Alavi, University of Missouri Ladjel Bellatreche, LIAS/ENSMA Athman Bouguettaya, The University of Sydney Stephane Bressan, National University of Singapore K. Selcuk Candan, Arizona State University Tru Cao, Ho Chi Minh City University of Technology Songcan Chen, Nanjing University of Aeronautics & Astronautics Hong Chen, Renmin University of China Heeryon Cho, Kookmin University Soo-Mi Choi, Sejong University Mi-Jung Choi, Kangwon National University Hoon Choi, Chungnam National University Jaegul Choo, Korea University Soon Ae Chun, City University of New York Shifei Ding, China University of Mining and Technology Gill Dobbie, The University of Auckland Koji Eguchi, Hiroshima University Sameh Elnikety, Microsoft Young Ik Eom, Sungkyunkwan University Sergio Flesca, University of Calabria Zhipeng Gao, Beijing University of Posts and Telecommunications Wei Gao, Nanjing University Hong Gao, Harbin Institute of Technology Xin Geng, Southeast University Chen Gong, Shanghai Jiao Tong University Hyoil Han, Illinois State University Kenji Hatano, Doshisha University Kazumasa Horie, University of Tsukuba Wen Hua, The University of Queensland Seung-Won Hwang, Yonsei University Eenjun Hwang, Korea University Hyeonseung Im, Kangwon National University Md. Saiful Islam, Griffith University Young-Seob Jeong, SoonChunHyang University Seong-Ho Jeong, Hankuk University of Foreign Studies Xiaolong Jin, Chinese Academy of Sciences
Sanghyun Ahn、首尔大学Amir H. Alavi、密苏里大学Ladjel Bellatreche、LIAS/ENSMA Athman Bouguettaya、悉尼大学Stephane Bressan、新加坡国立大学K. Selcuk Candan、亚利桑那州立大学Tru Cao、胡志明市工业大学Songcan Chen、南京航空航天大学Hong Chen、中国人民大学Heeryon Cho、国民大学Soo-Mi Choi、世宗大学Mi-Jung Choi、江原大学崔勋、忠南大学秋杰居、高丽大学淳爱春、纽约城市大学丁世飞、中国矿业大学吉尔多比、奥克兰大学江口浩二、广岛大学埃尔尼基提、微软严英一、成均馆大学塞尔吉奥·弗莱卡、卡拉布里亚大学高志鹏、北京邮电大学高伟、南京大学高宏、哈尔滨工业大学耿新、东南大学陈公、上海交通大学韩孝、伊利诺州立大学Hatano健二、社社大学堀江昌正、筑波大学文华、昆士兰大学黄承远、延世大学黄恩俊、高丽大学任铉承、江原大学Md. Saiful Islam、格里菲斯大学郑永燮、顺天香大学郑成镐、韩国外国语大学金晓龙,中国科学院
{"title":"Program Committee","authors":"Pengcheng Zhang, Junhua Ding, Xiaobing Sun, Mingyue Jiang","doi":"10.1109/eisic49498.2019.9108778","DOIUrl":"https://doi.org/10.1109/eisic49498.2019.9108778","url":null,"abstract":"Sanghyun Ahn, University of Seoul Amir H. Alavi, University of Missouri Ladjel Bellatreche, LIAS/ENSMA Athman Bouguettaya, The University of Sydney Stephane Bressan, National University of Singapore K. Selcuk Candan, Arizona State University Tru Cao, Ho Chi Minh City University of Technology Songcan Chen, Nanjing University of Aeronautics & Astronautics Hong Chen, Renmin University of China Heeryon Cho, Kookmin University Soo-Mi Choi, Sejong University Mi-Jung Choi, Kangwon National University Hoon Choi, Chungnam National University Jaegul Choo, Korea University Soon Ae Chun, City University of New York Shifei Ding, China University of Mining and Technology Gill Dobbie, The University of Auckland Koji Eguchi, Hiroshima University Sameh Elnikety, Microsoft Young Ik Eom, Sungkyunkwan University Sergio Flesca, University of Calabria Zhipeng Gao, Beijing University of Posts and Telecommunications Wei Gao, Nanjing University Hong Gao, Harbin Institute of Technology Xin Geng, Southeast University Chen Gong, Shanghai Jiao Tong University Hyoil Han, Illinois State University Kenji Hatano, Doshisha University Kazumasa Horie, University of Tsukuba Wen Hua, The University of Queensland Seung-Won Hwang, Yonsei University Eenjun Hwang, Korea University Hyeonseung Im, Kangwon National University Md. Saiful Islam, Griffith University Young-Seob Jeong, SoonChunHyang University Seong-Ho Jeong, Hankuk University of Foreign Studies Xiaolong Jin, Chinese Academy of Sciences","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous Authentication of Smartphone Users via Swipes and Taps Analysis 智能手机用户通过滑动和点击分析的持续身份验证
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108780
A. Garbuz, A. Epishkina, K. Kogos
Nowadays, smartphones are used for getting access to sensitive and private data. As a result, we need an authentication system that will provide smartphones with additional security and at the same time will not cause annoyance to users. Existing authentication mechanisms provide just a one-time user verification and do not perform re-authentication in the process of further interaction. In this paper, we present a continuous user authentication system based on user's interaction with the touchscreen in conjunction with micromovements, performed by smartphones at the same time. We consider two of the most common types of gestures performed by users (vertical swipes up and down, and taps). The novelty of our approach is that swipes and taps are both analyzed to provide continuous authentication. Swipes are informative gestures, while taps are the most common gestures. This way, we aim to reduce the time of impostors' detection. The proposed scheme collects data from the touchscreen and multiple 3-dimensional sensors integrated in all modern smartphones. We use One-Class Support Vector Machine (OSVM) algorithm to get a model of a legitimate user. The obtained results show that the proposed scheme of continuous authentication can improve smartphone security.
如今,智能手机被用来获取敏感和私人数据。因此,我们需要一种认证系统,既能为智能手机提供额外的安全性,同时又不会给用户带来烦恼。现有的身份验证机制只提供一次性的用户验证,而不会在进一步交互的过程中执行重新身份验证。在本文中,我们提出了一种基于用户与触摸屏交互并结合微动作的连续用户认证系统,该系统同时由智能手机执行。我们考虑用户执行的两种最常见的手势类型(上下垂直滑动和轻击)。我们的方法的新颖之处在于,滑动和点击都被分析以提供连续的身份验证。滑动是信息丰富的手势,而轻击是最常见的手势。这样,我们的目标是减少检测冒名顶替者的时间。该方案从所有现代智能手机中集成的触摸屏和多个三维传感器收集数据。我们使用单类支持向量机(One-Class Support Vector Machine, OSVM)算法得到合法用户的模型。实验结果表明,提出的连续认证方案可以提高智能手机的安全性。
{"title":"Continuous Authentication of Smartphone Users via Swipes and Taps Analysis","authors":"A. Garbuz, A. Epishkina, K. Kogos","doi":"10.1109/EISIC49498.2019.9108780","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108780","url":null,"abstract":"Nowadays, smartphones are used for getting access to sensitive and private data. As a result, we need an authentication system that will provide smartphones with additional security and at the same time will not cause annoyance to users. Existing authentication mechanisms provide just a one-time user verification and do not perform re-authentication in the process of further interaction. In this paper, we present a continuous user authentication system based on user's interaction with the touchscreen in conjunction with micromovements, performed by smartphones at the same time. We consider two of the most common types of gestures performed by users (vertical swipes up and down, and taps). The novelty of our approach is that swipes and taps are both analyzed to provide continuous authentication. Swipes are informative gestures, while taps are the most common gestures. This way, we aim to reduce the time of impostors' detection. The proposed scheme collects data from the touchscreen and multiple 3-dimensional sensors integrated in all modern smartphones. We use One-Class Support Vector Machine (OSVM) algorithm to get a model of a legitimate user. The obtained results show that the proposed scheme of continuous authentication can improve smartphone security.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121224815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks 基于语义神经网络集成的枪械检测与分割
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108871
Alexander Egiazarov, Vasileios Mavroeidis, Fabio Massimo Zennaro, Kamer Vishi
In recent years we have seen an upsurge in terror attacks around the world. Such attacks usually happen in public places with large crowds to cause the most damage possible and get the most attention. Even though surveillance cameras are assumed to be a powerful tool, their effect in preventing crime is far from clear due to either limitation in the ability of humans to vigilantly monitor video surveillance or for the simple reason that they are operating passively. In this paper, we present a weapon detection system based on an ensemble of semantic Convolutional Neural Networks that decomposes the problem of detecting and locating a weapon into a set of smaller problems concerned with the individual component parts of a weapon. This approach has computational and practical advantages: a set of simpler neural networks dedicated to specific tasks requires less computational resources and can be trained in parallel; the overall output of the system given by the aggregation of the outputs of individual networks can be tuned by a user to trade-off false positives and false negatives; finally, according to ensemble theory, the output of the overall system will be robust and reliable even in the presence of weak individual models. We evaluated our system running simulations aimed at assessing the accuracy of individual networks and the whole system. The results on synthetic data and real-world data are promising, and they suggest that our approach may have advantages compared to the monolithic approach based on a single deep convolutional neural network.
近年来,我们看到世界各地的恐怖袭击激增。这种袭击通常发生在人群众多的公共场所,以造成最大的破坏,吸引最多的关注。尽管监控摄像头被认为是一种强大的工具,但由于人类警惕监控视频监控的能力有限,或者因为它们是被动操作的简单原因,它们在预防犯罪方面的效果还远未明确。在本文中,我们提出了一种基于语义卷积神经网络集成的武器检测系统,该系统将武器的检测和定位问题分解为与武器各个组成部分有关的一组较小的问题。这种方法具有计算和实用的优点:一组专门用于特定任务的更简单的神经网络需要较少的计算资源,并且可以并行训练;系统的总体输出由单个网络的输出聚合而成,用户可以通过权衡假阳性和假阴性来调整系统的总体输出;最后,根据集成理论,即使存在弱个体模型,整个系统的输出也将是鲁棒和可靠的。我们评估了我们的系统运行模拟,旨在评估单个网络和整个系统的准确性。合成数据和真实世界数据的结果是有希望的,它们表明我们的方法与基于单个深度卷积神经网络的整体方法相比可能具有优势。
{"title":"Firearm Detection and Segmentation Using an Ensemble of Semantic Neural Networks","authors":"Alexander Egiazarov, Vasileios Mavroeidis, Fabio Massimo Zennaro, Kamer Vishi","doi":"10.1109/EISIC49498.2019.9108871","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108871","url":null,"abstract":"In recent years we have seen an upsurge in terror attacks around the world. Such attacks usually happen in public places with large crowds to cause the most damage possible and get the most attention. Even though surveillance cameras are assumed to be a powerful tool, their effect in preventing crime is far from clear due to either limitation in the ability of humans to vigilantly monitor video surveillance or for the simple reason that they are operating passively. In this paper, we present a weapon detection system based on an ensemble of semantic Convolutional Neural Networks that decomposes the problem of detecting and locating a weapon into a set of smaller problems concerned with the individual component parts of a weapon. This approach has computational and practical advantages: a set of simpler neural networks dedicated to specific tasks requires less computational resources and can be trained in parallel; the overall output of the system given by the aggregation of the outputs of individual networks can be tuned by a user to trade-off false positives and false negatives; finally, according to ensemble theory, the output of the overall system will be robust and reliable even in the presence of weak individual models. We evaluated our system running simulations aimed at assessing the accuracy of individual networks and the whole system. The results on synthetic data and real-world data are promising, and they suggest that our approach may have advantages compared to the monolithic approach based on a single deep convolutional neural network.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Directive 2014/41/UE - The European Investigation Order 指令2014/41/UE -欧洲调查令
Pub Date : 2019-11-01 DOI: 10.1109/eisic49498.2019.9108881
Fabrizia Bemer
The EIO is an important contribution to the topic of the conference, because security informatics is strictly related to the EIO in the way the transmission occurs between authorities.
EIO对本次会议的主题做出了重要贡献,因为安全信息学在当局之间传输的方式上与EIO严格相关。
{"title":"The Directive 2014/41/UE - The European Investigation Order","authors":"Fabrizia Bemer","doi":"10.1109/eisic49498.2019.9108881","DOIUrl":"https://doi.org/10.1109/eisic49498.2019.9108881","url":null,"abstract":"The EIO is an important contribution to the topic of the conference, because security informatics is strictly related to the EIO in the way the transmission occurs between authorities.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121406119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Timing Covert Channels Detection Cases via Machine Learning 基于机器学习的定时隐蔽通道检测案例
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108873
A. Epishkina, Mikhail Finoshin, K. Kogos, Aleksandra Yazykova
Currently, packet data networks are widespread. Their architectural features allow constructing covert channels that are able to transmit covert data under the conditions of using standard protection measures. However, encryption or packets length normalization, leave the possibility for an intruder to transfer covert data via timing covert channels (TCCs). In turn, inter-packet delay (IPD) normalization leads to reducing communication channel capacity. Detection is an alternative countermeasure. At the present time, detection methods based on machine learning are widely studied. The complexity of TCCs detection based on machine learning depends on the availability of traffic samples, and on the possibility of an intruder to change covert channels parameters. In the current work, we explore the cases of TCCs detection via
目前,分组数据网络已经广泛应用。它们的结构特点允许构建隐蔽通道,能够在使用标准保护措施的条件下传输隐蔽数据。然而,加密或数据包长度规范化给入侵者留下了通过定时隐蔽通道(tcc)传输隐蔽数据的可能性。反过来,包间延迟(IPD)规范化导致通信信道容量的减少。探测是另一种对策。目前,基于机器学习的检测方法得到了广泛的研究。基于机器学习的tcc检测的复杂性取决于流量样本的可用性,以及入侵者改变隐蔽通道参数的可能性。在当前的工作中,我们探索了通过
{"title":"Timing Covert Channels Detection Cases via Machine Learning","authors":"A. Epishkina, Mikhail Finoshin, K. Kogos, Aleksandra Yazykova","doi":"10.1109/EISIC49498.2019.9108873","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108873","url":null,"abstract":"Currently, packet data networks are widespread. Their architectural features allow constructing covert channels that are able to transmit covert data under the conditions of using standard protection measures. However, encryption or packets length normalization, leave the possibility for an intruder to transfer covert data via timing covert channels (TCCs). In turn, inter-packet delay (IPD) normalization leads to reducing communication channel capacity. Detection is an alternative countermeasure. At the present time, detection methods based on machine learning are widely studied. The complexity of TCCs detection based on machine learning depends on the availability of traffic samples, and on the possibility of an intruder to change covert channels parameters. In the current work, we explore the cases of TCCs detection via","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131102416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack 鉴别欺骗性评论:特征探索、模型可转移性和分类攻击
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108852
Marianela García Lozano, Johan Fernquist
The temptation to influence and sway public opinion most certainly increases with the growth of open online forums where anyone anonymously can express their views and opinions. Since online review sites are a popular venue for opinion influencing attacks, there is a need to automatically identify deceptive posts. The main focus of this work is on automatic identification of deceptive reviews, both positive and negative biased. With this objective, we build a deceptive review SVM based classification model and explore the performance impact of using different feature types (TF-IDF, word2vec, PCFG). Moreover, we study the transferability of trained classification models applied to review data sets of other types of products, and, the classifier robustness, i.e., the accuracy impact, against attacks by stylometry obfuscation trough machine translation. Our findings show that i) we achieve an accuracy of over 90% using different feature types, ii) the trained classification models do not perform well when applied on other data sets containing reviews of different products, and iii) machine translation only slightly impacts the results and can not be used as a viable attack method.
随着开放的在线论坛的增长,任何人都可以匿名表达自己的观点和意见,影响和左右公众舆论的诱惑无疑会增加。由于在线评论网站是影响舆论攻击的热门场所,因此有必要自动识别欺骗性帖子。这项工作的主要重点是自动识别欺骗性评论,包括积极和消极的偏见。为此,我们建立了一个基于欺骗评论SVM的分类模型,并探讨了使用不同特征类型(TF-IDF, word2vec, PCFG)对性能的影响。此外,我们还研究了训练后的分类模型的可移植性,用于审查其他类型产品的数据集,以及分类器的鲁棒性,即通过机器翻译抵御文体混淆攻击的准确性影响。我们的研究结果表明,i)我们使用不同的特征类型获得了超过90%的准确率,ii)训练好的分类模型在应用于包含不同产品评论的其他数据集时表现不佳,iii)机器翻译仅对结果产生轻微影响,不能用作可行的攻击方法。
{"title":"Identifying Deceptive Reviews: Feature Exploration, Model Transferability and Classification Attack","authors":"Marianela García Lozano, Johan Fernquist","doi":"10.1109/EISIC49498.2019.9108852","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108852","url":null,"abstract":"The temptation to influence and sway public opinion most certainly increases with the growth of open online forums where anyone anonymously can express their views and opinions. Since online review sites are a popular venue for opinion influencing attacks, there is a need to automatically identify deceptive posts. The main focus of this work is on automatic identification of deceptive reviews, both positive and negative biased. With this objective, we build a deceptive review SVM based classification model and explore the performance impact of using different feature types (TF-IDF, word2vec, PCFG). Moreover, we study the transferability of trained classification models applied to review data sets of other types of products, and, the classifier robustness, i.e., the accuracy impact, against attacks by stylometry obfuscation trough machine translation. Our findings show that i) we achieve an accuracy of over 90% using different feature types, ii) the trained classification models do not perform well when applied on other data sets containing reviews of different products, and iii) machine translation only slightly impacts the results and can not be used as a viable attack method.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117029388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting Account Attributes for Analyzing Influence on Twitter 提取账户属性用于分析Twitter上的影响力
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108896
Johan Fernquist, Ola Svenonius, Lisa Kaati, F. Johansson
The last years has witnessed a surge of auto-generated content on social media. While many uses are legitimate, bots have also been deployed in influence operations to manipulate election results, affect public opinion in a desired direction, or to divert attention from a specific event or phenomenon. Today, many approaches exist to automatically identify bot-like behaviour in order to curb illegitimate influence operations. While progress has been made, existing models are exceedingly complex and nontransparent, rendering validation and model testing difficult. We present a transparent and parsimonious method to study influence operations on Twitter. We define nine different attributes that can be used to describe and reason about different characteristics of a Twitter account. The attributes can be used to group accounts that have similar characteristics and the result can be used to identify accounts that are likely to be used to influence public opinion. The method has been tested on a Twitter data set consisting of 66,000 accounts. Clustering the accounts based on the proposed features show promising results for separating between different groups of reference accounts.
过去几年,社交媒体上的自动生成内容激增。虽然许多用途是合法的,但机器人也被部署在影响行动中,以操纵选举结果,朝着预期的方向影响公众舆论,或转移对特定事件或现象的注意力。今天,有许多方法可以自动识别类似机器人的行为,以遏制非法的影响操作。虽然已经取得了进展,但现有的模型非常复杂和不透明,使得验证和模型测试变得困难。我们提出了一种透明和简洁的方法来研究Twitter上的影响力操作。我们定义了9个不同的属性,可以用来描述和推断Twitter帐户的不同特征。这些属性可用于对具有相似特征的账户进行分组,其结果可用于识别可能被用来影响公众舆论的账户。该方法已在由6.6万个账户组成的Twitter数据集上进行了测试。基于所提出的特征对帐户进行聚类,在区分不同组的参考帐户方面显示出有希望的结果。
{"title":"Extracting Account Attributes for Analyzing Influence on Twitter","authors":"Johan Fernquist, Ola Svenonius, Lisa Kaati, F. Johansson","doi":"10.1109/EISIC49498.2019.9108896","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108896","url":null,"abstract":"The last years has witnessed a surge of auto-generated content on social media. While many uses are legitimate, bots have also been deployed in influence operations to manipulate election results, affect public opinion in a desired direction, or to divert attention from a specific event or phenomenon. Today, many approaches exist to automatically identify bot-like behaviour in order to curb illegitimate influence operations. While progress has been made, existing models are exceedingly complex and nontransparent, rendering validation and model testing difficult. We present a transparent and parsimonious method to study influence operations on Twitter. We define nine different attributes that can be used to describe and reason about different characteristics of a Twitter account. The attributes can be used to group accounts that have similar characteristics and the result can be used to identify accounts that are likely to be used to influence public opinion. The method has been tested on a Twitter data set consisting of 66,000 accounts. Clustering the accounts based on the proposed features show promising results for separating between different groups of reference accounts.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114240993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Remote KYC: Attacks and Counter-Measures 远程KYC:攻击与对策
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108787
M. Pic, Gaël Mahfoudi, Anis Trabelsi
Onboarding of new customers is a sensitive task for various services, like Banks who have to follow the Know Your Customer (KYC) rules. Mobile Onboarding Applications or KYC by Streaming are expanding rapidly to provide this capacity at home. Unfortunately, this leaves the authentication tools in the hand of end-users, allowing the attacker to directly tamper the video stream. With the rise of new digital face manipulation technologies, traditional face spoofing attacks such as presentation attacks or replay attacks should not be the only one to be considered. A new kind of face spoofing attacks (i.e. digital face spoofing) needs to be studied carefully. In this paper, we analyze those new kinds of attacks and propose a method to secure identity documents against both the traditional attacks and the new ones.
对于各种服务来说,新客户的入职是一项敏感的任务,比如银行必须遵守“了解你的客户”(KYC)规则。移动入职应用程序或流媒体KYC正在迅速扩展,以在家中提供这种能力。不幸的是,这将身份验证工具留在最终用户手中,从而允许攻击者直接篡改视频流。随着新的数字人脸处理技术的兴起,传统的人脸欺骗攻击,如呈现攻击或重放攻击不应该是唯一要考虑的。一种新的人脸欺骗攻击(即数字人脸欺骗)需要认真研究。本文对这些新型攻击进行了分析,并提出了一种针对传统攻击和新型攻击保护身份文件安全的方法。
{"title":"Remote KYC: Attacks and Counter-Measures","authors":"M. Pic, Gaël Mahfoudi, Anis Trabelsi","doi":"10.1109/EISIC49498.2019.9108787","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108787","url":null,"abstract":"Onboarding of new customers is a sensitive task for various services, like Banks who have to follow the Know Your Customer (KYC) rules. Mobile Onboarding Applications or KYC by Streaming are expanding rapidly to provide this capacity at home. Unfortunately, this leaves the authentication tools in the hand of end-users, allowing the attacker to directly tamper the video stream. With the rise of new digital face manipulation technologies, traditional face spoofing attacks such as presentation attacks or replay attacks should not be the only one to be considered. A new kind of face spoofing attacks (i.e. digital face spoofing) needs to be studied carefully. In this paper, we analyze those new kinds of attacks and propose a method to secure identity documents against both the traditional attacks and the new ones.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Crime Prediction Using Hotel Reviews? 利用酒店评论预测犯罪?
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108861
Panos Kostakos, Somkiadcharoen Robroo, Bofan Lin, M. Oussalah
Can hotel reviews be used as a proxy for predicting crime hotspots? Domain knowledge indicates that hotels are crime attractors, and therefore, hotel guests might be reliable “human crime sensors”. In order to assess this heuristic, we propose a novel method by mapping actual crime events into hotel reviews from London, using spatial clustering and sentiment feedback. Preliminary findings indicate that sentiment scores from hotel reviews are inversely correlated with crime intensity. Hotels with positive reviews are more likely to be adjacent to crime hotspots, and vice versa. One possible explanation for this counterintuitive finding that the review data are not mapped against specific crime types, and thus the crime data capture mostly police visibility on the site. More research and domain knowledge are needed to establish the strength of hotel reviews as a proxy for crime prediction.
酒店评论可以作为预测犯罪热点的代理吗?领域知识表明,酒店是犯罪的吸引者,因此,酒店客人可能是可靠的“人类犯罪传感器”。为了评估这种启发式,我们提出了一种新颖的方法,即使用空间聚类和情感反馈将实际犯罪事件映射到伦敦的酒店评论中。初步发现表明,酒店评论的情绪得分与犯罪强度呈负相关。拥有正面评价的酒店更有可能靠近犯罪热点,反之亦然。对于这一违反直觉的发现,一种可能的解释是,评论数据没有映射到特定的犯罪类型,因此犯罪数据主要捕获了网站上警察的可见性。需要更多的研究和领域知识来建立酒店评论作为犯罪预测代理的力量。
{"title":"Crime Prediction Using Hotel Reviews?","authors":"Panos Kostakos, Somkiadcharoen Robroo, Bofan Lin, M. Oussalah","doi":"10.1109/EISIC49498.2019.9108861","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108861","url":null,"abstract":"Can hotel reviews be used as a proxy for predicting crime hotspots? Domain knowledge indicates that hotels are crime attractors, and therefore, hotel guests might be reliable “human crime sensors”. In order to assess this heuristic, we propose a novel method by mapping actual crime events into hotel reviews from London, using spatial clustering and sentiment feedback. Preliminary findings indicate that sentiment scores from hotel reviews are inversely correlated with crime intensity. Hotels with positive reviews are more likely to be adjacent to crime hotspots, and vice versa. One possible explanation for this counterintuitive finding that the review data are not mapped against specific crime types, and thus the crime data capture mostly police visibility on the site. More research and domain knowledge are needed to establish the strength of hotel reviews as a proxy for crime prediction.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Deep Learning Models for Ear Recognition Against Image Distortions 针对图像失真的深度学习耳识别模型评价
Pub Date : 2019-11-01 DOI: 10.1109/EISIC49498.2019.9108870
S. El-Naggar, T. Bourlai
Automated human authentication is becoming increasingly popular on a variety of daily activities, ranging from surveillance to commercial related applications. While there are many biometric modalities that can be used, ear recognition has earned its value if and when available to be captured. Ears demonstrate specific advantages over other competitors in an effort to identify cooperative and non-cooperative individuals in either controlled or challenging environments. The performance of ear recognition systems can be impacted by several factors, including standoff distance, ear pose angle, and ear image quality. While all three factors can degrade ear recognition performance, here we focus on the latter two using real data, and assess the standoff distance factor by synthetically generating blurry and noisy images to simulate longer distance ear images. Thus, in this work we are inspired by various studies in the literature that discuss the how and why challenging biometric images of different modalities impact the associated biometric system recognition. Specifically, we focus on how different ear image distortions and yaw pose angles affect the performance of various deep learning based ear recognition models. Our contributions are threefold. Firstly, we are using challenging ear dataset, with a wide range of yaw pose angles, to evaluate the ear recognition performance of various original ear matching approaches. Secondly, by examining multiple convolutional neural network (CNN) architectures and employing multiple techniques for the learning process, we determine the most efficient CNN - based ear recognition approach. Thirdly, we investigated the impact on performance of a set of ear recognition CNN models in the presence of multiple image degradation factors, including variations of blurriness, additive noise, brightness and contrast.
从监控到商业相关应用,自动化人工身份验证在各种日常活动中越来越受欢迎。虽然有许多生物识别模式可以使用,耳朵识别已经赢得了它的价值,如果和当可以捕获。耳朵在控制或挑战环境中识别合作和非合作个体方面,比其他竞争对手表现出特殊的优势。耳朵识别系统的性能会受到几个因素的影响,包括距离、耳朵姿态角度和耳朵图像质量。虽然这三个因素都会降低耳朵识别的性能,但在这里,我们将重点关注后两个因素,并通过综合生成模糊和噪声图像来模拟更远距离的耳朵图像来评估距离因素。因此,在这项工作中,我们受到文献中各种研究的启发,这些研究讨论了不同模式的挑战性生物识别图像如何以及为什么会影响相关的生物识别系统识别。具体来说,我们关注不同的耳朵图像失真和偏航姿态角度如何影响各种基于深度学习的耳朵识别模型的性能。我们的贡献是三重的。首先,我们使用具有广泛偏航姿态角度的挑战性耳朵数据集来评估各种原始耳朵匹配方法的耳朵识别性能。其次,通过研究多个卷积神经网络(CNN)架构,并在学习过程中采用多种技术,我们确定了最有效的基于CNN的耳朵识别方法。第三,我们研究了一组耳朵识别CNN模型在多种图像退化因素(包括模糊度、加性噪声、亮度和对比度的变化)存在下对性能的影响。
{"title":"Evaluation of Deep Learning Models for Ear Recognition Against Image Distortions","authors":"S. El-Naggar, T. Bourlai","doi":"10.1109/EISIC49498.2019.9108870","DOIUrl":"https://doi.org/10.1109/EISIC49498.2019.9108870","url":null,"abstract":"Automated human authentication is becoming increasingly popular on a variety of daily activities, ranging from surveillance to commercial related applications. While there are many biometric modalities that can be used, ear recognition has earned its value if and when available to be captured. Ears demonstrate specific advantages over other competitors in an effort to identify cooperative and non-cooperative individuals in either controlled or challenging environments. The performance of ear recognition systems can be impacted by several factors, including standoff distance, ear pose angle, and ear image quality. While all three factors can degrade ear recognition performance, here we focus on the latter two using real data, and assess the standoff distance factor by synthetically generating blurry and noisy images to simulate longer distance ear images. Thus, in this work we are inspired by various studies in the literature that discuss the how and why challenging biometric images of different modalities impact the associated biometric system recognition. Specifically, we focus on how different ear image distortions and yaw pose angles affect the performance of various deep learning based ear recognition models. Our contributions are threefold. Firstly, we are using challenging ear dataset, with a wide range of yaw pose angles, to evaluate the ear recognition performance of various original ear matching approaches. Secondly, by examining multiple convolutional neural network (CNN) architectures and employing multiple techniques for the learning process, we determine the most efficient CNN - based ear recognition approach. Thirdly, we investigated the impact on performance of a set of ear recognition CNN models in the presence of multiple image degradation factors, including variations of blurriness, additive noise, brightness and contrast.","PeriodicalId":117256,"journal":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114806693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 European Intelligence and Security Informatics Conference (EISIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1