首页 > 最新文献

2012 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
Scalable sentiment classification across multiple Dark Web Forums 跨多个暗网论坛的可扩展情感分类
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284095
David Zimbra, Hsinchun Chen
This study examines several approaches to sentiment classification in the Dark Web Forum Portal, and opportunities to transfer classifiers and text features across multiple forums to improve scalability and performance. Although sentiment classifiers typically perform poorly when transferred across domains, experimentation reveals the devised approaches offer performance equivalent to the traditional forum-specific approach in classification in an unknown domain. Furthermore, incorporating the text features identified as significant indicators of sentiment in other forums can greatly improve the classification accuracy of the traditional forum-specific approach.
本研究考察了暗网论坛门户网站中情感分类的几种方法,以及跨多个论坛转移分类器和文本特征以提高可扩展性和性能的机会。虽然情感分类器在跨领域转移时通常表现不佳,但实验表明,所设计的方法在未知领域的分类中提供与传统论坛特定方法相当的性能。此外,结合其他论坛中确定为重要情绪指标的文本特征可以大大提高传统论坛特定方法的分类准确性。
{"title":"Scalable sentiment classification across multiple Dark Web Forums","authors":"David Zimbra, Hsinchun Chen","doi":"10.1109/ISI.2012.6284095","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284095","url":null,"abstract":"This study examines several approaches to sentiment classification in the Dark Web Forum Portal, and opportunities to transfer classifiers and text features across multiple forums to improve scalability and performance. Although sentiment classifiers typically perform poorly when transferred across domains, experimentation reveals the devised approaches offer performance equivalent to the traditional forum-specific approach in classification in an unknown domain. Furthermore, incorporating the text features identified as significant indicators of sentiment in other forums can greatly improve the classification accuracy of the traditional forum-specific approach.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Evaluating an integrated forum portal for terrorist surveillance and analysis 评估用于恐怖分子监视和分析的综合论坛门户网站
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284288
P. H. Hu, Xing Wan, Yan Dang, Catherine A. Larson, Hsinchun Chen
We experimentally evaluated the Dark Web Forum Portal by focusing on user task performance, usability, cognitive processing requirements, and societal benefits. Our results show that the portal performs perform well when compared with a benchmark forum.
我们通过关注用户任务性能、可用性、认知处理要求和社会效益对暗网论坛门户进行了实验评估。我们的结果表明,与基准论坛相比,该门户执行得很好。
{"title":"Evaluating an integrated forum portal for terrorist surveillance and analysis","authors":"P. H. Hu, Xing Wan, Yan Dang, Catherine A. Larson, Hsinchun Chen","doi":"10.1109/ISI.2012.6284288","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284288","url":null,"abstract":"We experimentally evaluated the Dark Web Forum Portal by focusing on user task performance, usability, cognitive processing requirements, and societal benefits. Our results show that the portal performs perform well when compared with a benchmark forum.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115958097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying cliques in dark web forums - An agglomerative clustering approach 识别暗网论坛中的派系——一种聚集聚类方法
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284289
Tarique Anwar, M. Abulaish
In this paper, we present a novel agglomerative clustering method to identify cliques in dark Web forums. Considering each post as an individual entity accompanying all the information about its thread, author, time-stamp, etc., we have defined a similarity function to identify similarity between each pair of posts as a blend of their contextual and temporal coherence. The similarity function is employed in the proposed clustering algorithm to group threads into different clusters that are finally presented as individual cliques. The identified cliques are characterized using the homogeneity of posts therein, which also establishes the homogeneity of their authors and threads as well.
本文提出了一种新的聚类方法来识别暗网论坛中的派系。考虑到每个帖子都是一个单独的实体,包含有关其线程、作者、时间戳等的所有信息,我们定义了一个相似性函数来识别每对帖子之间的相似性,作为其上下文和时间一致性的混合。本文提出的聚类算法利用相似度函数将线程分组到不同的聚类中,这些聚类最终被表示为单独的团。已识别的派系使用其中的帖子的同质性来表征,这也建立了其作者和线程的同质性。
{"title":"Identifying cliques in dark web forums - An agglomerative clustering approach","authors":"Tarique Anwar, M. Abulaish","doi":"10.1109/ISI.2012.6284289","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284289","url":null,"abstract":"In this paper, we present a novel agglomerative clustering method to identify cliques in dark Web forums. Considering each post as an individual entity accompanying all the information about its thread, author, time-stamp, etc., we have defined a similarity function to identify similarity between each pair of posts as a blend of their contextual and temporal coherence. The similarity function is employed in the proposed clustering algorithm to group threads into different clusters that are finally presented as individual cliques. The identified cliques are characterized using the homogeneity of posts therein, which also establishes the homogeneity of their authors and threads as well.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"55 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123435764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Anomaly detection in spatiotemporal data in the maritime domain 海洋领域时空数据的异常检测
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284274
Vladimir Avram, U. Glässer, H. Y. Shahir
Maritime security is critical for many nations to address the vulnerability of their sea lanes, ports and harbours to a variety of threats and illegal activities. With increasing volume of spatiotemporal data, it is ever more problematic to analyze the enormous volume of data in real time. This paper explores a novel approach to representing spatiotemporal data for model-driven methods for detecting patterns of anomalous behaviour in spatiotemporal datasets.
海上安全对许多国家来说至关重要,因为它们要解决海上通道、港口和港口容易受到各种威胁和非法活动攻击的问题。随着时空数据量的不断增加,对海量数据的实时分析变得越来越困难。本文探讨了一种用于检测时空数据集中异常行为模式的模型驱动方法来表示时空数据的新方法。
{"title":"Anomaly detection in spatiotemporal data in the maritime domain","authors":"Vladimir Avram, U. Glässer, H. Y. Shahir","doi":"10.1109/ISI.2012.6284274","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284274","url":null,"abstract":"Maritime security is critical for many nations to address the vulnerability of their sea lanes, ports and harbours to a variety of threats and illegal activities. With increasing volume of spatiotemporal data, it is ever more problematic to analyze the enormous volume of data in real time. This paper explores a novel approach to representing spatiotemporal data for model-driven methods for detecting patterns of anomalous behaviour in spatiotemporal datasets.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117047498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Preserving privacy for moving objects data mining 为移动对象数据挖掘保护隐私
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284198
S. Ho
The prevalence of mobile devices with geopositioning capability has resulted in the rapid growth in the amount of moving object trajectories. These data have been collected and analyzed for both commercial (e.g., recommendation system) and security (e.g. surveillance and monitoring system) purposes. One needs to ensure the privacy of these raw trajectory data and the derived knowledge by not disclosing or releasing them to adversary. In this paper, we propose a practical implementation of a (ε; δ)-differentially private mechanism for moving objects data mining; in particular, we apply it to the frequent location pattern mining algorithm. Experimental results on the real-world GeoLife dataset are used to compare the performance of the (ε; δ)-differential privacy mechanism with the standard ε-differential privacy mechanism.
具有地理定位功能的移动设备的普及导致了移动物体轨迹数量的快速增长。收集和分析这些数据是为了商业(例如,推荐系统)和安全(例如,监视和监测系统)目的。我们需要确保这些原始轨迹数据和衍生知识的隐私性,不将其泄露或释放给对手。在本文中,我们提出了a (ε;δ)-移动对象数据挖掘的差分私有机制;特别地,我们将其应用于频繁位置模式挖掘算法。在真实的GeoLife数据集上使用实验结果来比较(ε;δ)差分隐私机制与标准ε-差分隐私机制。
{"title":"Preserving privacy for moving objects data mining","authors":"S. Ho","doi":"10.1109/ISI.2012.6284198","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284198","url":null,"abstract":"The prevalence of mobile devices with geopositioning capability has resulted in the rapid growth in the amount of moving object trajectories. These data have been collected and analyzed for both commercial (e.g., recommendation system) and security (e.g. surveillance and monitoring system) purposes. One needs to ensure the privacy of these raw trajectory data and the derived knowledge by not disclosing or releasing them to adversary. In this paper, we propose a practical implementation of a (ε; δ)-differentially private mechanism for moving objects data mining; in particular, we apply it to the frequent location pattern mining algorithm. Experimental results on the real-world GeoLife dataset are used to compare the performance of the (ε; δ)-differential privacy mechanism with the standard ε-differential privacy mechanism.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Extracting opinion explanations from Chinese online reviews 从中文在线评论中提取观点解释
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284313
Yuequn Li, W. Mao, D. Zeng, Luwen Huangfu, Chunyang Liu
Opinion mining has gained increasing attention and shown great practical value in recent years. Existing research on opinion mining mainly focuses on the extraction of lexicon orientation and opinion targets. The explanations of opinions, which are potentially valuable for many applications, are totally ignored. To address this specific research challenge, in this paper, we propose an approach to extract the explanation of reason and/or consequence behind an opinion via learning word pairs and using causal indicators from Chinese online reviews. We also improve our word pair based method by constructing clusters of word paris. Experiments on a Chinese business review corpus show that our method is feasible and effective.
近年来,意见挖掘越来越受到人们的关注,并显示出很大的实用价值。现有的意见挖掘研究主要集中在词汇取向和意见目标的提取上。对许多应用程序具有潜在价值的意见的解释完全被忽略了。为了解决这一具体的研究挑战,在本文中,我们提出了一种方法,通过学习单词对和使用中国在线评论中的因果指标来提取观点背后的原因和/或结果的解释。我们还通过构建词簇来改进基于词对的方法。在中文商业评论语料库上的实验表明了该方法的可行性和有效性。
{"title":"Extracting opinion explanations from Chinese online reviews","authors":"Yuequn Li, W. Mao, D. Zeng, Luwen Huangfu, Chunyang Liu","doi":"10.1109/ISI.2012.6284313","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284313","url":null,"abstract":"Opinion mining has gained increasing attention and shown great practical value in recent years. Existing research on opinion mining mainly focuses on the extraction of lexicon orientation and opinion targets. The explanations of opinions, which are potentially valuable for many applications, are totally ignored. To address this specific research challenge, in this paper, we propose an approach to extract the explanation of reason and/or consequence behind an opinion via learning word pairs and using causal indicators from Chinese online reviews. We also improve our word pair based method by constructing clusters of word paris. Experiments on a Chinese business review corpus show that our method is feasible and effective.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117193284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Impact of anti-phishing tool performance on attack success rates 反钓鱼工具性能对攻击成功率的影响
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6282648
A. Abbasi, F. Zahedi, Yan Chen
Phishing website-based attacks continue to present significant problems for individual and enterprise-level security, including identity theft, malware, and viruses. While the performance of anti-phishing tools has improved considerably, it is unclear how effective such tools are at protecting users. In this study, an experiment involving over 400 participants was used to evaluate the impact of anti-phishing tools' accuracy on users' ability to avoid phishing threats. Each of the participants was given either a high accuracy (90%) or low accuracy (60%) tool and asked to make various decisions about several legitimate and phishing websites. Experiment results revealed that participants using the high accuracy anti-phishing tool significantly outperformed those using the less accurate tool in their ability to: (1) differentiate legitimate websites from phish; (2) avoid visiting phishing websites; and (3) avoid transacting with phishing websites. However, even users of the high accuracy tool often disregarded its correct recommendations, resulting in users' phish detection rates that were approximately 15% lower than those of the anti-phishing tool used. Consequently, on average, participants visited between 74% and 83% of the phishing websites and were willing to transact with as many as 25% of the phishing websites. Anti-phishing tools were also less effective against one particular type of threat. The results suggest that while the accuracy of anti-phishing tools is a critical factor, reducing the success rates of phishing attacks requires other considerations such as improving tool interface/warning design and enhancing users' knowledge of phishing. Given the prevalence of phishing-based web fraud, the findings have important implications for individual and enterprise security.
基于网络钓鱼网站的攻击继续给个人和企业级安全带来重大问题,包括身份盗窃、恶意软件和病毒。虽然反网络钓鱼工具的性能有了很大的提高,但目前还不清楚这些工具在保护用户方面的效果如何。在这项研究中,400多名参与者参与了一项实验,以评估反网络钓鱼工具的准确性对用户避免网络钓鱼威胁的能力的影响。每个参与者都有一个准确率高(90%)或低(60%)的工具,并被要求对几个合法和钓鱼网站做出不同的决定。实验结果显示,使用高精度反网络钓鱼工具的参与者在以下方面的能力显著优于使用不太准确工具的参与者:(1)区分合法网站和网络钓鱼网站;(2)避免访问钓鱼网站;(3)避免与钓鱼网站进行交易。然而,即使是高精度工具的用户也经常忽略其正确的建议,导致用户的网络钓鱼检测率比使用的反网络钓鱼工具低约15%。因此,平均而言,参与者访问了74%至83%的网络钓鱼网站,并愿意与多达25%的网络钓鱼网站进行交易。反网络钓鱼工具对一种特定类型的威胁也不太有效。结果显示,虽然反网络钓鱼工具的准确性是一个关键因素,但要降低网络钓鱼攻击的成功率,还需要考虑其他因素,如改进工具界面/警告设计和提高用户对网络钓鱼的认识。鉴于基于网络钓鱼的网络欺诈的盛行,研究结果对个人和企业安全具有重要意义。
{"title":"Impact of anti-phishing tool performance on attack success rates","authors":"A. Abbasi, F. Zahedi, Yan Chen","doi":"10.1109/ISI.2012.6282648","DOIUrl":"https://doi.org/10.1109/ISI.2012.6282648","url":null,"abstract":"Phishing website-based attacks continue to present significant problems for individual and enterprise-level security, including identity theft, malware, and viruses. While the performance of anti-phishing tools has improved considerably, it is unclear how effective such tools are at protecting users. In this study, an experiment involving over 400 participants was used to evaluate the impact of anti-phishing tools' accuracy on users' ability to avoid phishing threats. Each of the participants was given either a high accuracy (90%) or low accuracy (60%) tool and asked to make various decisions about several legitimate and phishing websites. Experiment results revealed that participants using the high accuracy anti-phishing tool significantly outperformed those using the less accurate tool in their ability to: (1) differentiate legitimate websites from phish; (2) avoid visiting phishing websites; and (3) avoid transacting with phishing websites. However, even users of the high accuracy tool often disregarded its correct recommendations, resulting in users' phish detection rates that were approximately 15% lower than those of the anti-phishing tool used. Consequently, on average, participants visited between 74% and 83% of the phishing websites and were willing to transact with as many as 25% of the phishing websites. Anti-phishing tools were also less effective against one particular type of threat. The results suggest that while the accuracy of anti-phishing tools is a critical factor, reducing the success rates of phishing attacks requires other considerations such as improving tool interface/warning design and enhancing users' knowledge of phishing. Given the prevalence of phishing-based web fraud, the findings have important implications for individual and enterprise security.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126614147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Establishing a foundation for automated human credibility screening 为自动化人员可信度筛选奠定基础
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284309
J. Nunamaker, J. Burgoon, Nathan W. Twyman, J. Proudfoot, Ryan M. Schuetzler, J. Giboney
Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be built. This study establishes a foundation for developing automated systems for human credibility screening.
自动化的人类可信度筛选是一个新兴的研究领域,在国土安全和会计欺诈检测等领域具有很高的影响潜力。需要建立进行访谈和做出可信度判断的系统,这些系统可以为可信度评估实践提供客观性、改进的准确性和更高的可靠性。本研究为开发人类可信度筛选自动化系统奠定了基础。
{"title":"Establishing a foundation for automated human credibility screening","authors":"J. Nunamaker, J. Burgoon, Nathan W. Twyman, J. Proudfoot, Ryan M. Schuetzler, J. Giboney","doi":"10.1109/ISI.2012.6284309","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284309","url":null,"abstract":"Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be built. This study establishes a foundation for developing automated systems for human credibility screening.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125155140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Cloud-enabled data sharing model 支持云的数据共享模型
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6281922
Nguyen Thanh Hung, Do Hoang Giang, W. Ng, Huafei Zhu
Database-as-a-Service is becoming more and more popular for many organizations. Storing data on the cloud can significantly reduce costs in terms of maintenance costs and initial investment costs. But due to data privacy and security concerns, many companies are still reluctant to use outsourced database service. In this paper, we present a solution to protect data privacy on the cloud, at the same time, allowing multiple users accessing the shared database with security assurance.
对于许多组织来说,数据库即服务正变得越来越流行。将数据存储在云中可以显著降低维护成本和初始投资成本。但是由于数据隐私和安全方面的考虑,许多公司仍然不愿意使用外包的数据库服务。在本文中,我们提出了一种解决方案来保护云上的数据隐私,同时允许多个用户访问共享数据库并保证安全。
{"title":"Cloud-enabled data sharing model","authors":"Nguyen Thanh Hung, Do Hoang Giang, W. Ng, Huafei Zhu","doi":"10.1109/ISI.2012.6281922","DOIUrl":"https://doi.org/10.1109/ISI.2012.6281922","url":null,"abstract":"Database-as-a-Service is becoming more and more popular for many organizations. Storing data on the cloud can significantly reduce costs in terms of maintenance costs and initial investment costs. But due to data privacy and security concerns, many companies are still reluctant to use outsourced database service. In this paper, we present a solution to protect data privacy on the cloud, at the same time, allowing multiple users accessing the shared database with security assurance.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126091543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Structural inference in political science datasets 政治科学数据集中的结构推理
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284270
Minh Tam Le, J. Sweeney, B. Russett, S. Zucker
Sociopolitical databases provide a rich source of high-dimensional data with hidden spatial-temporal structure; for example countries voting for/against certain UN resolutions is a manifestation of the underlying political alignment among nations. We introduce the notion of diffusion distance as a natural measure in such datasets. and applied diffusion maps to databases of intergovernmental organizations' memberships and UN roll calls. Examination of the embeddings from these data across time reveals interesting historical narratives, suggesting the results serve as a proxy for analysis of security and terrorism datasets.
社会政治数据库提供了丰富的高维数据来源,具有隐藏的时空结构;例如,国家投票赞成或反对某些联合国决议是国家之间潜在政治联盟的表现。我们引入了扩散距离的概念,作为这类数据集的自然度量。并将扩散图应用于政府间组织成员和联合国唱名的数据库。对这些数据在不同时期的嵌入进行检查,揭示了有趣的历史叙述,表明这些结果可以作为安全和恐怖主义数据集分析的代理。
{"title":"Structural inference in political science datasets","authors":"Minh Tam Le, J. Sweeney, B. Russett, S. Zucker","doi":"10.1109/ISI.2012.6284270","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284270","url":null,"abstract":"Sociopolitical databases provide a rich source of high-dimensional data with hidden spatial-temporal structure; for example countries voting for/against certain UN resolutions is a manifestation of the underlying political alignment among nations. We introduce the notion of diffusion distance as a natural measure in such datasets. and applied diffusion maps to databases of intergovernmental organizations' memberships and UN roll calls. Examination of the embeddings from these data across time reveals interesting historical narratives, suggesting the results serve as a proxy for analysis of security and terrorism datasets.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125384115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1