首页 > 最新文献

2009 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
Topic-based web page recommendation using tags 基于主题的网页推荐使用标签
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137324
Jing Peng, D. Zeng
Collaborative tagging sites allow users to save and annotate their favorite web contents with tags. These tags provide a novel source of information for collaborative filtering. This paper proposes a probabilistic approach to leverage information embedded in tags to improve the effectiveness of Web page recommendation in a social information management context. In our approach, the probability of a Web page visit by a user is estimated by summing up the relevance of this Web page to this user's tags, and then those pages with the highest probabilities are recommended. Experiments using two real-world collaborative tagging datasets show that our algorithms outperform the common collaborative filtering methods.
协作标签网站允许用户用标签保存和注释他们喜欢的网页内容。这些标签为协同过滤提供了一种新的信息源。本文提出了一种概率方法,利用嵌入在标签中的信息来提高社交信息管理环境下网页推荐的有效性。在我们的方法中,通过汇总该Web页面与该用户标记的相关性来估计用户访问Web页面的概率,然后推荐那些具有最高概率的页面。使用两个真实协作标记数据集的实验表明,我们的算法优于常见的协同过滤方法。
{"title":"Topic-based web page recommendation using tags","authors":"Jing Peng, D. Zeng","doi":"10.1109/ISI.2009.5137324","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137324","url":null,"abstract":"Collaborative tagging sites allow users to save and annotate their favorite web contents with tags. These tags provide a novel source of information for collaborative filtering. This paper proposes a probabilistic approach to leverage information embedded in tags to improve the effectiveness of Web page recommendation in a social information management context. In our approach, the probability of a Web page visit by a user is estimated by summing up the relevance of this Web page to this user's tags, and then those pages with the highest probabilities are recommended. Experiments using two real-world collaborative tagging datasets show that our algorithms outperform the common collaborative filtering methods.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124416142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Applying graph-based anomaly detection approaches to the discovery of insider threats 应用基于图的异常检测方法来发现内部威胁
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137304
W. Eberle, L. Holder
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly detection, but little work has been done in terms of detecting anomalies in graph-based data. In this paper we present graph-based approaches to uncovering anomalies in applications containing information representing possible insider threat activity: e-mail, cell-phone calls, and order processing.
挖掘以图表示的数据的能力在检测各种结构模式的几个领域中变得非常重要。数据挖掘的一个重要领域是异常检测,但在基于图的数据中检测异常方面做的工作很少。在本文中,我们提出了基于图的方法来发现应用程序中的异常,这些应用程序包含代表可能的内部威胁活动的信息:电子邮件、手机呼叫和订单处理。
{"title":"Applying graph-based anomaly detection approaches to the discovery of insider threats","authors":"W. Eberle, L. Holder","doi":"10.1109/ISI.2009.5137304","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137304","url":null,"abstract":"The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly detection, but little work has been done in terms of detecting anomalies in graph-based data. In this paper we present graph-based approaches to uncovering anomalies in applications containing information representing possible insider threat activity: e-mail, cell-phone calls, and order processing.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126348219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
PerpSearch: An integrated crime detection system PerpSearch:综合罪案侦查系统
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137289
Li Ding, D. Steil, M. Hudnall, B. Dixon, Randy K. Smith, David Brown, A. Parrish
Information technologies such as data mining and social network analysis have been widely used in law enforcement to solve crimes. Recent research indicates that geographic profiling also plays an important role in facilitating the investigation of crimes. However, lack of integration makes those systems less helpful in practice. In this paper, we propose an integrated system called PerpSearch that will take a given description of a crime, including its location, type, and the physical description of suspects (personal characteristics or vehicles) as input. To detect suspects, the system will process these inputs through four integrated components: geographic profiling, social network analysis, crime patterns, and physical matching. Essentially, geographic profiling determines “where” the suspects are, while other components determine “who” the suspects are. We then process the results using a score engine to give investigators a ranked list of individuals. To date, we have implemented a prototype of the system based on current Alabama law enforcement data.
数据挖掘和社会网络分析等信息技术已广泛应用于执法部门破案。最近的研究表明,地理侧写在促进犯罪调查方面也起着重要作用。然而,缺乏整合使得这些系统在实践中没有多大帮助。在本文中,我们提出了一个称为PerpSearch的集成系统,该系统将对犯罪的给定描述,包括其位置,类型和嫌疑人的物理描述(个人特征或车辆)作为输入。为了检测嫌疑人,该系统将通过四个集成组件处理这些输入:地理特征分析、社会网络分析、犯罪模式和物理匹配。从本质上讲,地理侧写决定了嫌疑人的“位置”,而其他组件决定了嫌疑人是“谁”。然后,我们使用分数引擎处理结果,为调查人员提供个人排名列表。到目前为止,我们已经实现了基于当前阿拉巴马州执法数据的系统原型。
{"title":"PerpSearch: An integrated crime detection system","authors":"Li Ding, D. Steil, M. Hudnall, B. Dixon, Randy K. Smith, David Brown, A. Parrish","doi":"10.1109/ISI.2009.5137289","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137289","url":null,"abstract":"Information technologies such as data mining and social network analysis have been widely used in law enforcement to solve crimes. Recent research indicates that geographic profiling also plays an important role in facilitating the investigation of crimes. However, lack of integration makes those systems less helpful in practice. In this paper, we propose an integrated system called PerpSearch that will take a given description of a crime, including its location, type, and the physical description of suspects (personal characteristics or vehicles) as input. To detect suspects, the system will process these inputs through four integrated components: geographic profiling, social network analysis, crime patterns, and physical matching. Essentially, geographic profiling determines “where” the suspects are, while other components determine “who” the suspects are. We then process the results using a score engine to give investigators a ranked list of individuals. To date, we have implemented a prototype of the system based on current Alabama law enforcement data.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Traffic and security analysis on Sony Playstation 3 索尼Playstation 3的流量和安全分析
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137325
Michael Perelman, Ping Ji, Weifeng Chen
Online games are clearly growing as a significant component of the current and future Internet. As a major online game console, the Sony PlayStation 3 (PS3) produces more and more network traffic. People also begin to use PS3 for emails and web surfing besides playing games due to its enhanced web capabilities. Recognizing the traffic patterns of PS3 is important to network administrators whereas understanding its security is essential for users. However, traffic and security analysis of PS3 has been either done or unpublished. In this paper, we present our initial efforts on game traffic analysis for PS3 and explore the vulnerabilities of PS3 by testing a few attacking schemes on a PS3 console. The research will benefit both network administrators and PS3 users to understand the PS3 systems better.
网络游戏显然正在成为当前和未来互联网的重要组成部分。作为主要的在线游戏主机,索尼PlayStation 3 (PS3)产生了越来越多的网络流量。由于其增强的网络功能,除了玩游戏外,人们还开始使用PS3发电子邮件和上网。认识PS3的流量模式对于网络管理员很重要,而了解其安全性对于用户则至关重要。但是,PS3的流量和安全性分析已经完成或未发布。在本文中,我们介绍了针对PS3的游戏流量分析的初步工作,并通过在PS3主机上测试几种攻击方案来探索PS3的漏洞。这项研究将有利于网络管理员和PS3用户更好地理解PS3系统。
{"title":"Traffic and security analysis on Sony Playstation 3","authors":"Michael Perelman, Ping Ji, Weifeng Chen","doi":"10.1109/ISI.2009.5137325","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137325","url":null,"abstract":"Online games are clearly growing as a significant component of the current and future Internet. As a major online game console, the Sony PlayStation 3 (PS3) produces more and more network traffic. People also begin to use PS3 for emails and web surfing besides playing games due to its enhanced web capabilities. Recognizing the traffic patterns of PS3 is important to network administrators whereas understanding its security is essential for users. However, traffic and security analysis of PS3 has been either done or unpublished. In this paper, we present our initial efforts on game traffic analysis for PS3 and explore the vulnerabilities of PS3 by testing a few attacking schemes on a PS3 console. The research will benefit both network administrators and PS3 users to understand the PS3 systems better.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128229663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unifying strategies and tactics: A survivability framework for countering cyber attacks 统一战略和战术:应对网络攻击的生存能力框架
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137282
Yanjun Zuo, B. Panda
This paper presents a framework to enhance a system's survivability to thwart malicious attacks and to continuously provide critical services to users. We focus on two key survivability elements: strategy and tactic. The latter further includes a set of activities and operations. We show how survivability activities are developed in light of tactics to implement the chosen survivability strategies in face of malicious attacks. An example of military command and control system is presented, where a set of survivability activities are specified to carry out two strategies: dynamic system reconfiguration and transparent system repairs. An architectural model is proposed to facilitate system design in building survivable systems.
本文提出了一个框架,以提高系统的生存能力,以阻止恶意攻击,并持续为用户提供关键服务。我们专注于两个关键的生存要素:战略和战术。后者还包括一系列活动和业务。我们展示了在面对恶意攻击时如何根据战术来实施所选择的生存策略来开发生存能力活动。以军事指挥控制系统为例,提出了一组生存能力活动,以实现两种策略:动态系统重构和透明系统修复。提出了一种便于构建可生存系统的体系结构模型。
{"title":"Unifying strategies and tactics: A survivability framework for countering cyber attacks","authors":"Yanjun Zuo, B. Panda","doi":"10.1109/ISI.2009.5137282","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137282","url":null,"abstract":"This paper presents a framework to enhance a system's survivability to thwart malicious attacks and to continuously provide critical services to users. We focus on two key survivability elements: strategy and tactic. The latter further includes a set of activities and operations. We show how survivability activities are developed in light of tactics to implement the chosen survivability strategies in face of malicious attacks. An example of military command and control system is presented, where a set of survivability activities are specified to carry out two strategies: dynamic system reconfiguration and transparent system repairs. An architectural model is proposed to facilitate system design in building survivable systems.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dark web forums portal: Searching and analyzing jihadist forums 暗网论坛门户:搜索和分析圣战论坛
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137274
Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen
With the advent of Web 2.0, the Web is acting as a platform which enables end-user content generation. As a major type of social media in Web 2.0, Web forums facilitate intensive interactions among participants. International Jihadist groups often use Web forums to promote violence and distribute propaganda materials. These Dark Web forums are heterogeneous and widely distributed. Therefore, how to access and analyze the forum messages and interactions among participants is becoming an issue. This paper presents a general framework for Web forum data integration. Specifically, a Web-based knowledge portal, the Dark Web Forums Portal, is built based on the framework. The portal incorporates the data collected from different international Jihadist forums and provides several important analysis functions, including forum browsing and searching (in single forum and across multiple forums), forum statistics analysis, multilingual translation, and social network visualization. Preliminary results of our user study show that the Dark Web Forums Portal helps users locate information quickly and effectively. Users found the forum statistics analysis, multilingual translation, and social network visualization functions of the portal to be particularly valuable.
随着Web 2.0的出现,Web正在充当一个支持最终用户生成内容的平台。作为Web 2.0社会媒体的主要类型,Web论坛促进了参与者之间的密集互动。国际圣战组织经常利用网络论坛宣传暴力和分发宣传材料。这些暗网论坛种类繁多,分布广泛。因此,如何访问和分析论坛信息以及参与者之间的互动成为一个问题。本文提出了一个Web论坛数据集成的通用框架。具体来说,一个基于Web的知识门户,暗网论坛门户,是基于该框架建立的。该门户网站整合了从不同的国际圣战论坛收集的数据,并提供了几个重要的分析功能,包括论坛浏览和搜索(在单个论坛和跨多个论坛)、论坛统计分析、多语言翻译和社交网络可视化。我们用户研究的初步结果表明,暗网论坛门户网站可以帮助用户快速有效地定位信息。用户发现该门户网站的论坛统计分析、多语种翻译和社交网络可视化功能特别有价值。
{"title":"Dark web forums portal: Searching and analyzing jihadist forums","authors":"Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen","doi":"10.1109/ISI.2009.5137274","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137274","url":null,"abstract":"With the advent of Web 2.0, the Web is acting as a platform which enables end-user content generation. As a major type of social media in Web 2.0, Web forums facilitate intensive interactions among participants. International Jihadist groups often use Web forums to promote violence and distribute propaganda materials. These Dark Web forums are heterogeneous and widely distributed. Therefore, how to access and analyze the forum messages and interactions among participants is becoming an issue. This paper presents a general framework for Web forum data integration. Specifically, a Web-based knowledge portal, the Dark Web Forums Portal, is built based on the framework. The portal incorporates the data collected from different international Jihadist forums and provides several important analysis functions, including forum browsing and searching (in single forum and across multiple forums), forum statistics analysis, multilingual translation, and social network visualization. Preliminary results of our user study show that the Dark Web Forums Portal helps users locate information quickly and effectively. Users found the forum statistics analysis, multilingual translation, and social network visualization functions of the portal to be particularly valuable.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131002275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Voronoi representation for areal data processing in data-rich environments 在数据丰富的环境中进行实际数据处理的Voronoi表示
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137291
D. Breitkreutz, Ickjai Lee
Privacy and data explosion issues are major concerns in intelligence and security informatics. An areal data representation is a popular way to overcome these two issues. As data grows at an unprecedented rate, there still needs an improvement in area data representations to be more scalable. This paper determines the potential for an alternative areal representation that can offer performance benefits over traditional methods for use within data-rich environments. From the experiments performed, improvements are promising, especially within time-critical applications that need to consider large amounts of data quickly.
隐私和数据爆炸问题是情报和安全信息学的主要关注点。实景数据表示是克服这两个问题的常用方法。随着数据以前所未有的速度增长,区域数据表示仍然需要改进,以提高可扩展性。本文确定了在数据丰富的环境中使用一种可以提供优于传统方法的替代区域表示的潜力。从所进行的实验来看,改进是有希望的,特别是在需要快速考虑大量数据的时间关键应用程序中。
{"title":"Voronoi representation for areal data processing in data-rich environments","authors":"D. Breitkreutz, Ickjai Lee","doi":"10.1109/ISI.2009.5137291","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137291","url":null,"abstract":"Privacy and data explosion issues are major concerns in intelligence and security informatics. An areal data representation is a popular way to overcome these two issues. As data grows at an unprecedented rate, there still needs an improvement in area data representations to be more scalable. This paper determines the potential for an alternative areal representation that can offer performance benefits over traditional methods for use within data-rich environments. From the experiments performed, improvements are promising, especially within time-critical applications that need to consider large amounts of data quickly.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Social Networks in Persistent Video Surveillance 在持续视频监控中构建社会网络
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137307
Daniel T. Schmitt, S. Kurkowski, M. Mendenhall
Social networks are a beneficial analysis tool in counterterrorism and counterinsurgent activities. The difficulty lies in the amount of time and resources it takes to construct a social network. By exploiting existing 24-hour overhead persistent video, we can build a social network from vehicle to vehicle and vehicle to building interactions. This paper demonstrates building a social network from vehicle tracks based on their interactions in an urban environment. From this social network we can see relationships among actors and their locations of interest. This information provides additional intelligence about terrorist activities to exploit them.
在反恐和反叛乱活动中,社交网络是一种有益的分析工具。困难在于构建社交网络需要花费大量的时间和资源。通过利用现有的24小时头顶持续视频,我们可以建立一个从车辆到车辆以及车辆到建筑物互动的社交网络。本文演示了基于车辆轨迹在城市环境中的相互作用来构建一个社会网络。从这个社交网络中,我们可以看到演员之间的关系和他们感兴趣的地点。这些信息提供了关于恐怖主义活动的额外情报,以便利用它们。
{"title":"Building Social Networks in Persistent Video Surveillance","authors":"Daniel T. Schmitt, S. Kurkowski, M. Mendenhall","doi":"10.1109/ISI.2009.5137307","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137307","url":null,"abstract":"Social networks are a beneficial analysis tool in counterterrorism and counterinsurgent activities. The difficulty lies in the amount of time and resources it takes to construct a social network. By exploiting existing 24-hour overhead persistent video, we can build a social network from vehicle to vehicle and vehicle to building interactions. This paper demonstrates building a social network from vehicle tracks based on their interactions in an urban environment. From this social network we can see relationships among actors and their locations of interest. This information provides additional intelligence about terrorist activities to exploit them.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132051038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A natural language interface for crime-related spatial queries 用于犯罪相关空间查询的自然语言界面
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137290
Chengyang Zhang, Y. Huang, Rada Mihalcea, Hector Cuellar
Web-based mapping applications such as Google Maps or Virtual Earth have become increasingly popular. However, current map search is still keyword-based and supports a limited number of spatial predicates. In this paper, we build towards a natural language query interface to spatial databases to answer crime-related spatial queries. The system has two main advantages compared with interfaces such as Google Maps: (1) It allows query conditions to be expressed in natural language, and (2) It supports a larger number of spatial predicates, such as “within 3 miles” and “close to”. The system is evaluated using a set of crime-related queries run against a dataset that contains many spatial layers in the Denton, Texas area. The results show that our approach significantly outperforms Google Maps when processing complicated spatial queries.
基于网络的地图应用程序,如谷歌地图或虚拟地球已经变得越来越流行。然而,当前的地图搜索仍然是基于关键字的,并且支持有限数量的空间谓词。在本文中,我们构建了一个空间数据库的自然语言查询接口,以回答与犯罪相关的空间查询。与谷歌地图等界面相比,该系统有两个主要优势:(1)允许用自然语言表达查询条件;(2)支持更多的空间谓词,如“在3英里内”和“靠近”。该系统使用一组与犯罪相关的查询来对包含德克萨斯州丹顿地区许多空间层的数据集进行评估。结果表明,在处理复杂的空间查询时,我们的方法明显优于谷歌地图。
{"title":"A natural language interface for crime-related spatial queries","authors":"Chengyang Zhang, Y. Huang, Rada Mihalcea, Hector Cuellar","doi":"10.1109/ISI.2009.5137290","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137290","url":null,"abstract":"Web-based mapping applications such as Google Maps or Virtual Earth have become increasingly popular. However, current map search is still keyword-based and supports a limited number of spatial predicates. In this paper, we build towards a natural language query interface to spatial databases to answer crime-related spatial queries. The system has two main advantages compared with interfaces such as Google Maps: (1) It allows query conditions to be expressed in natural language, and (2) It supports a larger number of spatial predicates, such as “within 3 miles” and “close to”. The system is evaluated using a set of crime-related queries run against a dataset that contains many spatial layers in the Denton, Texas area. The results show that our approach significantly outperforms Google Maps when processing complicated spatial queries.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A two-level protocol to answer private location-based queries 一个两级协议,用于回答基于位置的私人查询
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137287
Roopa Vishwanathan, Y. Huang
An important privacy issue in Location Based Services (LBS) is to hide a user's identity and location while still providing quality location based services. A user's identity can be easily hidden through anonymous web browsing services. However, a user's location can reveal a user's identity. For example, a user at home may want to ask queries such as “Find the nearest hospital around me” through a GPS enabled mobile phone but he may not be willing to dislose his own location. A common way to achieve location privacy is through cloaking, e.g. the client sends a cloaked region to the server and filters the results to find the exact answer. Recently, Private Information Retrieval has been adopted to answer private location-based queries. However, we argue that ensuring the server does not reveal more data than what is queried is important at the same time. In this paper, we propose an efficient two-level solution based on two cryptographic protocols: PIR and Oblivious Transfer. Our solution is a general-purpose one and can use either a two-level PIR [2] or it can use a combination of PIR and Oblivious Transfer [11]. Our approach provides privacy for the user/client, does not use a trusted party or anonymizer, is provably privacy-preserving, and when compared to previous approaches ensures that the server reveals as minimum data as is required, and the data that is released by the server is as fine-grained or precise as possible.
基于位置的服务(LBS)中一个重要的隐私问题是在提供高质量的基于位置的服务的同时隐藏用户的身份和位置。通过匿名网络浏览服务,用户的身份很容易被隐藏。然而,用户的位置可以暴露用户的身份。例如,家中的用户可能希望通过启用GPS的移动电话询问诸如“找到我周围最近的医院”之类的问题,但他可能不愿意透露自己的位置。实现位置隐私的一种常见方法是通过隐蔽,例如,客户端发送一个隐蔽的区域给服务器,并过滤结果以找到确切的答案。最近,私有信息检索被用来回答基于私有位置的查询。然而,我们认为同时确保服务器不会显示比所查询的数据更多的数据也很重要。本文提出了一种基于PIR和遗忘传输两种加密协议的高效两级解决方案。我们的解决方案是通用的,可以使用两级PIR[2],也可以使用PIR和遗忘传输的组合[11]。我们的方法为用户/客户端提供隐私,不使用可信方或匿名器,可证明是隐私保护的,与以前的方法相比,确保服务器显示尽可能少的数据,并且服务器发布的数据尽可能细粒度或精确。
{"title":"A two-level protocol to answer private location-based queries","authors":"Roopa Vishwanathan, Y. Huang","doi":"10.1109/ISI.2009.5137287","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137287","url":null,"abstract":"An important privacy issue in Location Based Services (LBS) is to hide a user's identity and location while still providing quality location based services. A user's identity can be easily hidden through anonymous web browsing services. However, a user's location can reveal a user's identity. For example, a user at home may want to ask queries such as “Find the nearest hospital around me” through a GPS enabled mobile phone but he may not be willing to dislose his own location. A common way to achieve location privacy is through cloaking, e.g. the client sends a cloaked region to the server and filters the results to find the exact answer. Recently, Private Information Retrieval has been adopted to answer private location-based queries. However, we argue that ensuring the server does not reveal more data than what is queried is important at the same time. In this paper, we propose an efficient two-level solution based on two cryptographic protocols: PIR and Oblivious Transfer. Our solution is a general-purpose one and can use either a two-level PIR [2] or it can use a combination of PIR and Oblivious Transfer [11]. Our approach provides privacy for the user/client, does not use a trusted party or anonymizer, is provably privacy-preserving, and when compared to previous approaches ensures that the server reveals as minimum data as is required, and the data that is released by the server is as fine-grained or precise as possible.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123146962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2009 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1