首页 > 最新文献

Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining最新文献

英文 中文
Cosine similarity for multiplex network summarization 余弦相似度用于多路网络的总结
A. Polychronopoulou, Fang Zhou, Z. Obradovic
Most of the natural systems encountered in all kinds of disciplines consist of a set of elementary units connected by relationships of different kinds. These complex systems are commonly described in terms of networks, where nodes represent the entities and links represent their interactions. As multiple types of distinct interactions are often observed, these systems are described as multiplex networks where the different types of interactions between the nodes constitute the different layers of the network. The ever-increasing size of these networks introduces new computational challenges and is therefore imperative to be able to eliminate the redundant or irrelevant edges of a network and create a summary that maintains the intrinsic properties of the original network, with respect to the overall structure of the system. In this work, we present a summarization technique for multiplex networks designed to maintain the structural characteristics of such complex systems by utilizing the intrinsic multiplex structure of the network and taking into consideration the inter-connectivity of the various graph layers. We validate our approach on real-world systems from different domains and show that our approach allows for the creation of more compact summaries, with minimum change of the structure evaluation measures, when compared to baseline methods that aggregate contributions of multiple types of interactions.
在各种学科中遇到的大多数自然系统都是由一组由不同种类的关系连接起来的基本单位组成的。这些复杂的系统通常用网络来描述,其中节点代表实体,链接代表它们之间的相互作用。由于经常观察到多种不同类型的相互作用,这些系统被描述为多路网络,其中节点之间不同类型的相互作用构成了网络的不同层。这些网络不断增长的规模带来了新的计算挑战,因此必须能够消除网络的冗余或不相关的边缘,并创建一个保持原始网络固有属性的摘要,相对于系统的整体结构。在这项工作中,我们提出了一种多路网络的总结技术,旨在通过利用网络的固有多路结构并考虑到各个图层的互连性来保持这种复杂系统的结构特征。我们在来自不同领域的现实世界系统上验证了我们的方法,并表明,与汇总多种类型交互的贡献的基线方法相比,我们的方法允许创建更紧凑的摘要,并且对结构评估度量的变化最小。
{"title":"Cosine similarity for multiplex network summarization","authors":"A. Polychronopoulou, Fang Zhou, Z. Obradovic","doi":"10.1145/3487351.3488331","DOIUrl":"https://doi.org/10.1145/3487351.3488331","url":null,"abstract":"Most of the natural systems encountered in all kinds of disciplines consist of a set of elementary units connected by relationships of different kinds. These complex systems are commonly described in terms of networks, where nodes represent the entities and links represent their interactions. As multiple types of distinct interactions are often observed, these systems are described as multiplex networks where the different types of interactions between the nodes constitute the different layers of the network. The ever-increasing size of these networks introduces new computational challenges and is therefore imperative to be able to eliminate the redundant or irrelevant edges of a network and create a summary that maintains the intrinsic properties of the original network, with respect to the overall structure of the system. In this work, we present a summarization technique for multiplex networks designed to maintain the structural characteristics of such complex systems by utilizing the intrinsic multiplex structure of the network and taking into consideration the inter-connectivity of the various graph layers. We validate our approach on real-world systems from different domains and show that our approach allows for the creation of more compact summaries, with minimum change of the structure evaluation measures, when compared to baseline methods that aggregate contributions of multiple types of interactions.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129679145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CARE: learning convolutional attentional recurrent embedding for sequential recommendation 学习卷积注意递归嵌入序列推荐
Yu-Che Tsai, Cheng-te Li
Top-N sequential recommendation is to predict the next few items based on user's sequential interactions with past items. This paper aims at boosting the performance of top-N sequential recommendation based on a state-of-the-art model, Caser. We point out three insufficiencies of Caser - do not model variant-sized sequential patterns, treating the impact of each past time step equally, and cannot learn cumulative features. Then we propose a novel Convolutional Attentional Recurrent Embedding (CARE) learning model. Experiments conducted on a large-scale user-location check-in dataset exhibit promising performance, comparing to Caser.
Top-N顺序推荐是基于用户与过去项目的顺序交互来预测接下来的几个项目。本文旨在提高基于最先进模型Caser的top-N顺序推荐的性能。我们指出了Caser的三个不足之处——不为变大小的序列模式建模,平等地对待每个过去时间步的影响,不能学习累积特征。然后,我们提出了一种新的卷积注意递归嵌入(CARE)学习模型。与Caser相比,在大规模用户位置签入数据集上进行的实验显示出很好的性能。
{"title":"CARE: learning convolutional attentional recurrent embedding for sequential recommendation","authors":"Yu-Che Tsai, Cheng-te Li","doi":"10.1145/3487351.3489478","DOIUrl":"https://doi.org/10.1145/3487351.3489478","url":null,"abstract":"Top-N sequential recommendation is to predict the next few items based on user's sequential interactions with past items. This paper aims at boosting the performance of top-N sequential recommendation based on a state-of-the-art model, Caser. We point out three insufficiencies of Caser - do not model variant-sized sequential patterns, treating the impact of each past time step equally, and cannot learn cumulative features. Then we propose a novel Convolutional Attentional Recurrent Embedding (CARE) learning model. Experiments conducted on a large-scale user-location check-in dataset exhibit promising performance, comparing to Caser.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"184 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127547136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DiffuScope: inferring post-specific diffusion network 扩散镜:推断特异后扩散网络
Md Rashidul Hasan, Dheeman Saha, Farhan Asif Chowdhury, J. Degnan, A. Mueen
Post-specific diffusion network elucidates the who-saw-from-whom paths of a post on social media. A diffusion network for a specific post can reveal trustworthy and/or incentivized connections among users. Unfortunately, such a network is not observable from available information from social media platforms; hence an inference mechanism is needed. In this paper, we propose an algorithm to infer the diffusion network of a post, exploiting temporal, textual, and network modalities. The proposed algorithm identifies the maximum likely diffusion network using a conditional point process. The algorithm can scale up to thousands of shares from a single post and can be implemented as a real-time analytical tool. We analyze inferred diffusion networks and show discernible differences in information diffusion within various user groups (i.e. verified vs. unverified, conservative vs. liberal) and across local communities (political, entrepreneurial, etc.). We discover differences in inferred networks showing disproportionate presence of automated bots, a potential way to measure the true impact of a post.
特定后扩散网络阐明了社交媒体上帖子的“谁锯谁”路径。特定帖子的扩散网络可以揭示用户之间值得信赖和/或受激励的联系。不幸的是,从社交媒体平台上的可用信息中无法观察到这样一个网络;因此需要一种推理机制。在本文中,我们提出了一种算法来推断帖子的扩散网络,利用时间,文本和网络模式。该算法采用条件点过程识别最大似然扩散网络。该算法可以从一个帖子扩展到数千个分享,并可以作为实时分析工具实现。我们分析了推断的扩散网络,并显示了不同用户群体(即验证vs.未经验证,保守vs.自由)和当地社区(政治,企业等)之间信息扩散的明显差异。我们发现了推断网络的差异,显示出自动化机器人不成比例的存在,这是衡量帖子真实影响的潜在方法。
{"title":"DiffuScope: inferring post-specific diffusion network","authors":"Md Rashidul Hasan, Dheeman Saha, Farhan Asif Chowdhury, J. Degnan, A. Mueen","doi":"10.1145/3487351.3490967","DOIUrl":"https://doi.org/10.1145/3487351.3490967","url":null,"abstract":"Post-specific diffusion network elucidates the who-saw-from-whom paths of a post on social media. A diffusion network for a specific post can reveal trustworthy and/or incentivized connections among users. Unfortunately, such a network is not observable from available information from social media platforms; hence an inference mechanism is needed. In this paper, we propose an algorithm to infer the diffusion network of a post, exploiting temporal, textual, and network modalities. The proposed algorithm identifies the maximum likely diffusion network using a conditional point process. The algorithm can scale up to thousands of shares from a single post and can be implemented as a real-time analytical tool. We analyze inferred diffusion networks and show discernible differences in information diffusion within various user groups (i.e. verified vs. unverified, conservative vs. liberal) and across local communities (political, entrepreneurial, etc.). We discover differences in inferred networks showing disproportionate presence of automated bots, a potential way to measure the true impact of a post.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130263473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting COVID-19 with AI techniques: current research and future directions 用人工智能技术预测COVID-19:研究现状和未来方向
C. Comito, C. Pizzuti
Artificial Intelligence (AI), since the onset of the COVID-19 pandemic at the beginning of the last year, is playing an important role in supporting physicians and health authorities in different difficult tasks such as virus spreading, patient diagnosing and monitoring, contact tracing. In this paper, we provide an overview of the methods based on AI technologies proposed for COVID-19 forecasting. Summary statistics of the techniques adopted by researchers, categorized on the base of the underlying AI sub-area, are reported, along with publication venue of papers. The effectiveness of these approaches is investigated and their capabilities or weaknesses in providing reliable predictions are discussed. Future challenges are finally analyzed and research directions for improving current tools are suggested.
自去年年初新冠肺炎疫情爆发以来,人工智能(AI)在帮助医生和卫生当局完成病毒传播、患者诊断和监测、接触者追踪等各种艰巨任务方面发挥了重要作用。本文综述了基于人工智能技术的新冠肺炎预测方法。报告了研究人员采用的技术的汇总统计数据,并根据潜在的人工智能子领域进行了分类,同时报告了论文的发表地点。研究了这些方法的有效性,并讨论了它们在提供可靠预测方面的能力或弱点。最后分析了未来面临的挑战,并提出了改进现有工具的研究方向。
{"title":"Predicting COVID-19 with AI techniques: current research and future directions","authors":"C. Comito, C. Pizzuti","doi":"10.1145/3487351.3490958","DOIUrl":"https://doi.org/10.1145/3487351.3490958","url":null,"abstract":"Artificial Intelligence (AI), since the onset of the COVID-19 pandemic at the beginning of the last year, is playing an important role in supporting physicians and health authorities in different difficult tasks such as virus spreading, patient diagnosing and monitoring, contact tracing. In this paper, we provide an overview of the methods based on AI technologies proposed for COVID-19 forecasting. Summary statistics of the techniques adopted by researchers, categorized on the base of the underlying AI sub-area, are reported, along with publication venue of papers. The effectiveness of these approaches is investigated and their capabilities or weaknesses in providing reliable predictions are discussed. Future challenges are finally analyzed and research directions for improving current tools are suggested.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"62 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113943280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Limitations of link deletion for suppressing real information diffusion on social media 删除链接抑制社交媒体真实信息传播的局限性
Shiori Furukawa, Sho Tsugawa
Although beneficial information abounds on social media, the dissemination of harmful information such as so-called "fake news" has become a serious issue. Therefore, many researchers have devoted considerable effort to limiting the diffusion of harmful information. A promising approach to limiting diffusion of such information is link deletion methods in social networks. Link deletion methods have been shown to be effective in reducing the size of information diffusion cascades generated by synthetic models on a given social network. In this study, we evaluate the effectiveness of link deletion methods on Twitter by using actual logs of retweet cascades, rather than by using synthetic diffusion models. Our results show that even after deleting 50% of links detected by the NetMelt method from a Twitter social network, the size of tweet cascades after link deletion is estimated to be only 50% the original size, which suggests that the effectiveness of the link deletion strategy for suppressing information diffusion on Twitter is limited. Moreover, our results also show that there is a considerable number of cascades with many seed users, which renders link deletion methods inefficient.
尽管社交媒体上充斥着有益的信息,但所谓的“假新闻”等有害信息的传播已经成为一个严重的问题。因此,许多研究人员投入了相当大的努力来限制有害信息的传播。限制此类信息扩散的一种有前途的方法是社交网络中的链接删除方法。链接删除方法已被证明是有效的,以减少规模的信息扩散级联产生的合成模型在给定的社会网络。在本研究中,我们通过使用转发级联的实际日志来评估Twitter上链接删除方法的有效性,而不是使用合成扩散模型。我们的研究结果表明,即使从Twitter社交网络中删除50%的NetMelt方法检测到的链接,删除链接后的tweet级联大小估计仅为原始大小的50%,这表明链接删除策略抑制Twitter上信息扩散的有效性是有限的。此外,我们的结果还表明,存在大量具有许多种子用户的级联,这使得链接删除方法效率低下。
{"title":"Limitations of link deletion for suppressing real information diffusion on social media","authors":"Shiori Furukawa, Sho Tsugawa","doi":"10.1145/3487351.3488351","DOIUrl":"https://doi.org/10.1145/3487351.3488351","url":null,"abstract":"Although beneficial information abounds on social media, the dissemination of harmful information such as so-called \"fake news\" has become a serious issue. Therefore, many researchers have devoted considerable effort to limiting the diffusion of harmful information. A promising approach to limiting diffusion of such information is link deletion methods in social networks. Link deletion methods have been shown to be effective in reducing the size of information diffusion cascades generated by synthetic models on a given social network. In this study, we evaluate the effectiveness of link deletion methods on Twitter by using actual logs of retweet cascades, rather than by using synthetic diffusion models. Our results show that even after deleting 50% of links detected by the NetMelt method from a Twitter social network, the size of tweet cascades after link deletion is estimated to be only 50% the original size, which suggests that the effectiveness of the link deletion strategy for suppressing information diffusion on Twitter is limited. Moreover, our results also show that there is a considerable number of cascades with many seed users, which renders link deletion methods inefficient.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards automatic generated content website based on content classification and auto-article generation 基于内容分类和自动文章生成的自动生成内容网站
I. Ting, Chia-Sung Yen
In recent years, social media has becoming a battle field, not only for online marketing but also for politic, etc. Such as Facebook, online advertisement is now the main revenue of their company and the main idea is to attract users to particular fans page and to create flow. Flow is king is now the important concept for who want to manage their business online. Thus, in this paper, we intend to develop a website based on the concept of auto-article generation (AAG), which can gather useful information or news from other resources from WWW. The techniques that used for the AAG website including web crawler, cloud storage and computing, content classification, etc. The main idea is to attract users to visit the website and by this to create website flow.
近年来,社交媒体已经成为一个战场,不仅是网络营销的战场,也是政治等的战场。像Facebook,在线广告现在是他们公司的主要收入来源,主要的想法是吸引用户到特定的粉丝页面,创造流量。对于那些想要管理在线业务的人来说,“流为王”是一个重要的概念。因此,在本文中,我们打算开发一个基于自动文章生成(AAG)概念的网站,该网站可以从WWW的其他资源中收集有用的信息或新闻。AAG网站使用的技术包括网络爬虫、云存储与计算、内容分类等。主要的想法是吸引用户访问网站,并以此来创建网站流量。
{"title":"Towards automatic generated content website based on content classification and auto-article generation","authors":"I. Ting, Chia-Sung Yen","doi":"10.1145/3487351.3488414","DOIUrl":"https://doi.org/10.1145/3487351.3488414","url":null,"abstract":"In recent years, social media has becoming a battle field, not only for online marketing but also for politic, etc. Such as Facebook, online advertisement is now the main revenue of their company and the main idea is to attract users to particular fans page and to create flow. Flow is king is now the important concept for who want to manage their business online. Thus, in this paper, we intend to develop a website based on the concept of auto-article generation (AAG), which can gather useful information or news from other resources from WWW. The techniques that used for the AAG website including web crawler, cloud storage and computing, content classification, etc. The main idea is to attract users to visit the website and by this to create website flow.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131613166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SCATE: shared cross attention transformer encoders for multimodal fake news detection SCATE:用于多模态假新闻检测的共享交叉注意转换器编码器
Tanmay Sachan, Nikhil Pinnaparaju, Manish Gupta, Vasudeva Varma
Social media platforms have democratized the publication process resulting into easy and viral propagation of information. Oftentimes this misinformation is accompanied by misleading or doctored images that quickly circulate across the internet and reach many unsuspecting users. Several manual as well as automated efforts have been undertaken in the past to solve this critical problem. While manual efforts cannot keep up with the rate at which this content is churned out, many automated approaches only leverage concatenation (of the image and text representations) thereby failing to build effective crossmodal embeddings. Architectures like this fail in many cases because the text or image doesn't need to be false for the corresponding text, image pair to be misinformation. While some recent work attempts to use attention techniques to compute a crossmodal representation using pretrained text and image embeddings, we show a more effective approach towards utilizing such pretrained embeddings to build richer representations that can be classified better. This involves several challenges like how to handle text variations on Twitter and Weibo, how to encode the image information and how to leverage the text and image encodings together effectively. Our architecture, SCATE (Shared Cross Attention Transformer Encoders), leverages deep convolutional neural networks and transformer-based methods to encode image and text information utilizing crossmodal attention and shared layers for the two modalities. Our experiments with three popular benchmark datasets (Twitter, WeiboA and WeiboB) show that our proposed methods outperform the state-of-the-art methods by approximately three percentage points on all three datasets.
社交媒体平台使出版过程民主化,从而使信息的传播变得容易和病毒式传播。通常情况下,这些错误信息伴随着误导或篡改的图像,迅速在互联网上传播,并到达许多毫无戒心的用户。过去已经进行了一些手动和自动化的工作来解决这个关键问题。虽然手工工作无法跟上内容的生产速度,但许多自动化方法只利用连接(图像和文本表示),因此无法构建有效的跨模式嵌入。这样的架构在很多情况下会失败,因为文本或图像不需要为假,对应的文本或图像对就会是错误的信息。虽然最近的一些工作试图使用注意力技术来计算使用预训练的文本和图像嵌入的跨模态表示,但我们展示了一种更有效的方法来利用这种预训练的嵌入来构建更丰富的表示,可以更好地分类。这涉及到几个挑战,比如如何处理Twitter和微博上的文本变化,如何对图像信息进行编码,以及如何有效地利用文本和图像编码。我们的架构SCATE(共享交叉注意转换器编码器)利用深度卷积神经网络和基于转换器的方法,利用跨模态注意和两种模态的共享层对图像和文本信息进行编码。我们对三个流行的基准数据集(Twitter、WeiboA和WeiboB)进行的实验表明,我们提出的方法在所有三个数据集上的性能都比最先进的方法高出大约三个百分点。
{"title":"SCATE: shared cross attention transformer encoders for multimodal fake news detection","authors":"Tanmay Sachan, Nikhil Pinnaparaju, Manish Gupta, Vasudeva Varma","doi":"10.1145/3487351.3490965","DOIUrl":"https://doi.org/10.1145/3487351.3490965","url":null,"abstract":"Social media platforms have democratized the publication process resulting into easy and viral propagation of information. Oftentimes this misinformation is accompanied by misleading or doctored images that quickly circulate across the internet and reach many unsuspecting users. Several manual as well as automated efforts have been undertaken in the past to solve this critical problem. While manual efforts cannot keep up with the rate at which this content is churned out, many automated approaches only leverage concatenation (of the image and text representations) thereby failing to build effective crossmodal embeddings. Architectures like this fail in many cases because the text or image doesn't need to be false for the corresponding text, image pair to be misinformation. While some recent work attempts to use attention techniques to compute a crossmodal representation using pretrained text and image embeddings, we show a more effective approach towards utilizing such pretrained embeddings to build richer representations that can be classified better. This involves several challenges like how to handle text variations on Twitter and Weibo, how to encode the image information and how to leverage the text and image encodings together effectively. Our architecture, SCATE (Shared Cross Attention Transformer Encoders), leverages deep convolutional neural networks and transformer-based methods to encode image and text information utilizing crossmodal attention and shared layers for the two modalities. Our experiments with three popular benchmark datasets (Twitter, WeiboA and WeiboB) show that our proposed methods outperform the state-of-the-art methods by approximately three percentage points on all three datasets.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128000517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
GPT-2C: a parser for honeypot logs using large pre-trained language models GPT-2C:使用大型预训练语言模型的蜜罐日志解析器
Febrian Setianto, Erion Tsani, Fatima Sadiq, Georgios Domalis, Dimitris Tsakalidis, Panos Kostakos
Deception technologies like honeypots generate large volumes of log data, which include illegal Unix shell commands used by latent intruders. Several prior works have reported promising results in overcoming the weaknesses of network-level and program-level Intrusion Detection Systems (IDSs) by fussing network traffic with data from honeypots. However, because honeypots lack the plug-in infrastructure to enable real-time parsing of log outputs, it remains technically challenging to feed illegal Unix commands into downstream predictive analytics. As a result, advances on honeypot-based user-level IDSs remain greatly hindered. This article presents a run-time system (GPT-2C) that leverages a large pre-trained language model (GPT-2) to parse dynamic logs generated by a live Cowrie SSH honeypot instance. After fine-tuning the GPT-2 model on an existing corpus of illegal Unix commands, the model achieved 89% inference accuracy in parsing Unix commands with acceptable execution latency.
蜜罐之类的欺骗技术会生成大量日志数据,其中包括潜在入侵者使用的非法Unix shell命令。一些先前的工作已经报告了克服网络级和程序级入侵检测系统(ids)的弱点的有希望的结果,通过混淆来自蜜罐的数据的网络流量。但是,由于蜜罐缺乏支持日志输出实时解析的插件基础设施,因此将非法Unix命令提供给下游预测分析仍然具有技术挑战性。因此,基于蜜罐的用户级入侵防御系统的进展仍然受到很大阻碍。本文介绍了一个运行时系统(GPT-2C),它利用一个大型预训练语言模型(GPT-2)来解析由一个实时的Cowrie SSH蜜罐实例生成的动态日志。在现有的非法Unix命令语料库上对GPT-2模型进行微调后,该模型在解析Unix命令时达到了89%的推理准确率,并且执行延迟是可以接受的。
{"title":"GPT-2C: a parser for honeypot logs using large pre-trained language models","authors":"Febrian Setianto, Erion Tsani, Fatima Sadiq, Georgios Domalis, Dimitris Tsakalidis, Panos Kostakos","doi":"10.1145/3487351.3492723","DOIUrl":"https://doi.org/10.1145/3487351.3492723","url":null,"abstract":"Deception technologies like honeypots generate large volumes of log data, which include illegal Unix shell commands used by latent intruders. Several prior works have reported promising results in overcoming the weaknesses of network-level and program-level Intrusion Detection Systems (IDSs) by fussing network traffic with data from honeypots. However, because honeypots lack the plug-in infrastructure to enable real-time parsing of log outputs, it remains technically challenging to feed illegal Unix commands into downstream predictive analytics. As a result, advances on honeypot-based user-level IDSs remain greatly hindered. This article presents a run-time system (GPT-2C) that leverages a large pre-trained language model (GPT-2) to parse dynamic logs generated by a live Cowrie SSH honeypot instance. After fine-tuning the GPT-2 model on an existing corpus of illegal Unix commands, the model achieved 89% inference accuracy in parsing Unix commands with acceptable execution latency.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132646588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Social influence under improved multi-objective metaheuristics 改进多目标元启发式下的社会影响
Fabián Riquelme, Francisco Muñoz, Rodrigo Olivares
The influence maximization problem (IMP) and the least cost influence problem (LCI) are two relevant and widely studied problems in social network analysis. The first one consists of maximizing the influence spread in a social network, starting with a given seed size of actors; the second one consists of minimizing the seed set to reach a given number of influenced nodes. Recently, both problems have been studied together with a multi-objective metaheuristic approach. In this work, diffusion filter restrictions based on the network topology are proposed to reduce the search space and thus improving the convergence speed of the solutions. This proposal allows increasing the quality of the results. As the influence spread model, the Linear Threshold model will be used. The solution is tested in three social networks of different sizes, finding promising improvements in harder instances.
影响最大化问题(IMP)和最小成本影响问题(LCI)是社会网络分析中两个相关且被广泛研究的问题。第一个包括最大化社交网络中的影响传播,从给定参与者的种子大小开始;第二种方法包括最小化种子集以达到给定数量的受影响节点。近年来,这两个问题被结合多目标元启发式方法进行了研究。在这项工作中,提出了基于网络拓扑的扩散滤波限制,以减少搜索空间,从而提高解的收敛速度。这个建议可以提高结果的质量。作为影响扩散模型,我们将使用线性阈值模型。该解决方案在三个不同规模的社交网络中进行了测试,在较困难的情况下发现了有希望的改进。
{"title":"Social influence under improved multi-objective metaheuristics","authors":"Fabián Riquelme, Francisco Muñoz, Rodrigo Olivares","doi":"10.1145/3487351.3488558","DOIUrl":"https://doi.org/10.1145/3487351.3488558","url":null,"abstract":"The influence maximization problem (IMP) and the least cost influence problem (LCI) are two relevant and widely studied problems in social network analysis. The first one consists of maximizing the influence spread in a social network, starting with a given seed size of actors; the second one consists of minimizing the seed set to reach a given number of influenced nodes. Recently, both problems have been studied together with a multi-objective metaheuristic approach. In this work, diffusion filter restrictions based on the network topology are proposed to reduce the search space and thus improving the convergence speed of the solutions. This proposal allows increasing the quality of the results. As the influence spread model, the Linear Threshold model will be used. The solution is tested in three social networks of different sizes, finding promising improvements in harder instances.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HawkEye 鹰眼
Rohit Mujumdar, Srijan Kumar
Twitter's Birdwatch is a new community-driven misinformation detection platform where users provide notes to label tweet accuracy, and rate the 'helpfulness' of other users' notes. This work investigates the robustness of Birdwatch against adversaries injecting fake ratings and shows that the current Birdwatch system is vulnerable to adversarial attacks. To overcome this vulnerability, we develop HawkEye, a cold-start-aware graph-based recursive algorithm and show that HawkEye is more robust against adversarial manipulation and outperforms Birdwatch in identifying accurate and misleading tweets. Code and data are available at https://github.com/srijankr/hawkeye.
{"title":"HawkEye","authors":"Rohit Mujumdar, Srijan Kumar","doi":"10.1145/3487351.3488343","DOIUrl":"https://doi.org/10.1145/3487351.3488343","url":null,"abstract":"Twitter's Birdwatch is a new community-driven misinformation detection platform where users provide notes to label tweet accuracy, and rate the 'helpfulness' of other users' notes. This work investigates the robustness of Birdwatch against adversaries injecting fake ratings and shows that the current Birdwatch system is vulnerable to adversarial attacks. To overcome this vulnerability, we develop HawkEye, a cold-start-aware graph-based recursive algorithm and show that HawkEye is more robust against adversarial manipulation and outperforms Birdwatch in identifying accurate and misleading tweets. Code and data are available at https://github.com/srijankr/hawkeye.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123478338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1