首页 > 最新文献

Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining最新文献

英文 中文
HGATs: hierarchical graph attention networks for multiple comments integration HGATs:用于多评论集成的分层图注意网络
Huixin Zhan, Kun Zhang, Chenyi Hu, Victor S. Sheng
For decades, research in natural language processing (NLP) has focused on summarization. Sequence-to-sequence models for abstractive summarization have been studied extensively, yet generated summaries commonly suffer from fabricated content, and are often found to be near-extractive. We argue that, to address these issues, summarizers need to acquire the co-references that form multiple types of relations over input sentences, e.g., 1-to-N, N-to-1, and N-to-N relations, since the structured knowledge for text usually appears on these relations. By allowing the decoder to pay different attention to the input sentences for the same entity at different generation states, the structured graph representations generate more informative summaries. In this paper, we propose a hierarchical graph attention networks (HGATs) for abstractive summarization with a topic-sensitive PageRank augmented graph. Specifically, we utilize dual decoders, a sequential sentence decoder, and a graph-structured decoder (which are built hierarchically) to maintain the global context and local characteristics of entities, complementing each other. We further design a greedy heuristic to extract salient users' comments while avoiding redundancy to drive a model to better capture entity interactions. Our experimental results show that our models produce significantly higher ROUGE scores than variants without graph-based attention on both SSECIF and CNN/Daily Mail (CNN/DM) datasets.
几十年来,自然语言处理(NLP)的研究一直集中在摘要上。用于抽象摘要的序列到序列模型已经得到了广泛的研究,但是生成的摘要通常受到虚构内容的影响,并且经常被发现是近乎提取的。我们认为,为了解决这些问题,摘要器需要获取在输入句子上形成多种类型关系的共同引用,例如1对n、n对1和n对n关系,因为文本的结构化知识通常出现在这些关系上。通过允许解码器在不同的生成状态下对同一实体的输入句子给予不同的关注,结构化图表示生成了更多信息丰富的摘要。在本文中,我们提出了一种基于主题敏感的PageRank增强图的抽象摘要层次图注意网络(HGATs)。具体来说,我们使用双解码器、顺序句子解码器和图结构解码器(分层构建)来维护实体的全局上下文和局部特征,相互补充。我们进一步设计了一个贪婪启发式算法来提取显著的用户评论,同时避免冗余,以驱动模型更好地捕获实体交互。我们的实验结果表明,我们的模型在SSECIF和CNN/Daily Mail (CNN/DM)数据集上产生的ROUGE分数明显高于没有基于图的关注的变体。
{"title":"HGATs: hierarchical graph attention networks for multiple comments integration","authors":"Huixin Zhan, Kun Zhang, Chenyi Hu, Victor S. Sheng","doi":"10.1145/3487351.3488322","DOIUrl":"https://doi.org/10.1145/3487351.3488322","url":null,"abstract":"For decades, research in natural language processing (NLP) has focused on summarization. Sequence-to-sequence models for abstractive summarization have been studied extensively, yet generated summaries commonly suffer from fabricated content, and are often found to be near-extractive. We argue that, to address these issues, summarizers need to acquire the co-references that form multiple types of relations over input sentences, e.g., 1-to-N, N-to-1, and N-to-N relations, since the structured knowledge for text usually appears on these relations. By allowing the decoder to pay different attention to the input sentences for the same entity at different generation states, the structured graph representations generate more informative summaries. In this paper, we propose a hierarchical graph attention networks (HGATs) for abstractive summarization with a topic-sensitive PageRank augmented graph. Specifically, we utilize dual decoders, a sequential sentence decoder, and a graph-structured decoder (which are built hierarchically) to maintain the global context and local characteristics of entities, complementing each other. We further design a greedy heuristic to extract salient users' comments while avoiding redundancy to drive a model to better capture entity interactions. Our experimental results show that our models produce significantly higher ROUGE scores than variants without graph-based attention on both SSECIF and CNN/Daily Mail (CNN/DM) datasets.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124442943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community deception in weighted networks 加权网络中的社区欺骗
Valeria Fionda, G. Pirrò
Techniques to hide a community from community detection algorithms are emerging as a new way to protect the privacy of users. Existing techniques either adapt optimization criteria derived from community detection (e.g., minimizing instead of maximizing modularity) or define new ones (e.g., community safeness) to identify a set of updates (e.g., edge addition/deletions) that deceive community detection algorithms from recovering the original structure of a target community C. However, all existing approaches do not take into account the fact that network's edges can be weighted to take into account node similarity or relation strength. The goal of this paper is to present SECRETORUM, a novel community deception approach for community deception in weighted networks.
在社区检测算法中隐藏社区的技术是一种保护用户隐私的新方法。现有的技术要么适应从社区检测中得到的优化标准(例如,最小化而不是最大化模块化),要么定义新的标准(例如,社区安全性)来识别一组更新(例如,边缘添加/删除),这些更新欺骗了社区检测算法,使其无法恢复目标社区c的原始结构。所有现有的方法都没有考虑到网络的边缘可以加权以考虑节点的相似性或关系强度。本文的目标是提出一种新的社区欺骗方法SECRETORUM,用于加权网络中的社区欺骗。
{"title":"Community deception in weighted networks","authors":"Valeria Fionda, G. Pirrò","doi":"10.1145/3487351.3488337","DOIUrl":"https://doi.org/10.1145/3487351.3488337","url":null,"abstract":"Techniques to hide a community from community detection algorithms are emerging as a new way to protect the privacy of users. Existing techniques either adapt optimization criteria derived from community detection (e.g., minimizing instead of maximizing modularity) or define new ones (e.g., community safeness) to identify a set of updates (e.g., edge addition/deletions) that deceive community detection algorithms from recovering the original structure of a target community C. However, all existing approaches do not take into account the fact that network's edges can be weighted to take into account node similarity or relation strength. The goal of this paper is to present SECRETORUM, a novel community deception approach for community deception in weighted networks.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123657359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Similarity ranking using handcrafted stylometric traits in a swedish context 在瑞典语境中使用手工制作的风格特征的相似性排名
Johan Fernquist, Björn Pelzer, Lukas Lundmark, Lisa Kaati, F. Johansson
In this paper we introduce a new type of handcrafted textual features called stylometric traits, used to create a stylistic writeprint of an author's writing style. These can be divided into four categories: (i) word variations, (ii) abbreviations, (iii) internet jargon, and (iv) numbers. A similarity ranking method is developed for ranking users' social media accounts based on how similar their writeprints are. We experiment with both vector distance metrics and machine learning-based class probabilities to measure similarity. The best performance is achieved using stylometric traits combined with the Jensen-Shannon distance metric, outperforming traditional stylometric features used in previous research.
在本文中,我们介绍了一种被称为文体特征的新型手工文本特征,用于创建作者写作风格的文体印记。这些可以分为四类:(i)单词变体,(ii)缩写,(iii)网络术语,(iv)数字。研究人员开发了一种相似度排名方法,根据用户的文字相似度对他们的社交媒体账户进行排名。我们使用向量距离度量和基于机器学习的类概率来测量相似性。使用文体学特征与Jensen-Shannon距离度量相结合,达到了最佳性能,优于以往研究中使用的传统文体学特征。
{"title":"Similarity ranking using handcrafted stylometric traits in a swedish context","authors":"Johan Fernquist, Björn Pelzer, Lukas Lundmark, Lisa Kaati, F. Johansson","doi":"10.1145/3487351.3492719","DOIUrl":"https://doi.org/10.1145/3487351.3492719","url":null,"abstract":"In this paper we introduce a new type of handcrafted textual features called stylometric traits, used to create a stylistic writeprint of an author's writing style. These can be divided into four categories: (i) word variations, (ii) abbreviations, (iii) internet jargon, and (iv) numbers. A similarity ranking method is developed for ranking users' social media accounts based on how similar their writeprints are. We experiment with both vector distance metrics and machine learning-based class probabilities to measure similarity. The best performance is achieved using stylometric traits combined with the Jensen-Shannon distance metric, outperforming traditional stylometric features used in previous research.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132505865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Which acts model happiness?: an exploratory analysis on Twitter and Goodreads 哪些行为塑造了幸福?:对Twitter和Goodreads的探索性分析
Mayank Bhasin, Harshit, Pawan Goyal
Modeling and analysis of affective and inner states is gaining prominence in research. Articulating the entire spectrum, ranging from recipes of long-term happiness to factors leading to depression, we frame a model of happiness states of people comprising of three states: G (lasting happiness), P (flickering) and I (frustration), respectively. The definitions of these states are based on psychology literature. We used a XgBoost Classifier to categorize 54,066 Twitter users based on their tweets and analysed the results including what kind of friends each category of users have (for 120 users obtained after thresholding 213 manually labelled users). Analysing XgBoost classification we could re-confirm characteristics mentioned in the definition of the three states (G, P, I) and find out more traits/characteristics beyond the definition as well. We observed that G users are more people-oriented. G and P users are more work-oriented than I users. G users are elder in age to P or I users. I users were found to be more religious than P owing to shelter-seeking traits. Qualitative analysis shows that G group suggests long-term vision, selfless and positive qualities, religious mindset and positive demeanour as expected. I group suggests negative feelings and activities and sensual words as expected. P group has traces of both G and I. P group contains dominating, strong words and extreme negative reactions. We found 21,115 users having Twitter and Goodreads handles to study what kind of books users of each category read. Reading patterns of G constitute of academic/technical, religion, inspirational/self-help and romance. Those of P users are fantasy/fiction, sports, LGBT/BDSM/Erotica and horror/violence/betrayal. I users tend to read fantasy/fiction, death and indiscriminately any arbitrary topic. G and P users make friends in the same category whereas I users tend to have friends in P category, but not among themselves.
情感状态和内心状态的建模和分析在研究中日益突出。从长期幸福的秘诀到导致抑郁的因素,我们阐述了整个范围,构建了一个由三种状态组成的人的幸福状态模型:G(持久的幸福),P(闪烁的幸福)和I(沮丧)。这些状态的定义基于心理学文献。我们使用XgBoost Classifier根据推文对54,066名Twitter用户进行了分类,并分析了结果,包括每个类别的用户拥有什么样的朋友(对213个手动标记的用户阈值后获得的120个用户)。通过分析XgBoost分类,我们可以重新确认三种状态(G, P, I)定义中提到的特征,并发现更多超出定义的特征/特征。我们观察到G用户更以人为本。G和P用户比I用户更注重工作。G用户的年龄比P或I用户大。由于寻求庇护的特点,I用户被发现比P用户更虔诚。定性分析表明,G组如预期的那样具有长远的眼光、无私和积极的品质、宗教心态和积极的举止。第一组建议消极的情绪和活动以及预期的感官词汇。P组既有G的痕迹,也有i的痕迹。P组包含支配性的、强势的言语和极端的负面反应。我们找到了21,115名拥有Twitter和Goodreads用户名的用户,以研究每个类别的用户阅读的书籍类型。G的阅读模式包括学术/技术、宗教、励志/自助和浪漫。P用户的那些是幻想/小说,体育,LGBT/BDSM/色情和恐怖/暴力/背叛。I用户倾向于阅读幻想/小说、死亡和任何不加区分的任意主题。G用户和P用户会结交同一类别的朋友,而I用户倾向于结交P类别的朋友,但他们之间没有。
{"title":"Which acts model happiness?: an exploratory analysis on Twitter and Goodreads","authors":"Mayank Bhasin, Harshit, Pawan Goyal","doi":"10.1145/3487351.3489475","DOIUrl":"https://doi.org/10.1145/3487351.3489475","url":null,"abstract":"Modeling and analysis of affective and inner states is gaining prominence in research. Articulating the entire spectrum, ranging from recipes of long-term happiness to factors leading to depression, we frame a model of happiness states of people comprising of three states: G (lasting happiness), P (flickering) and I (frustration), respectively. The definitions of these states are based on psychology literature. We used a XgBoost Classifier to categorize 54,066 Twitter users based on their tweets and analysed the results including what kind of friends each category of users have (for 120 users obtained after thresholding 213 manually labelled users). Analysing XgBoost classification we could re-confirm characteristics mentioned in the definition of the three states (G, P, I) and find out more traits/characteristics beyond the definition as well. We observed that G users are more people-oriented. G and P users are more work-oriented than I users. G users are elder in age to P or I users. I users were found to be more religious than P owing to shelter-seeking traits. Qualitative analysis shows that G group suggests long-term vision, selfless and positive qualities, religious mindset and positive demeanour as expected. I group suggests negative feelings and activities and sensual words as expected. P group has traces of both G and I. P group contains dominating, strong words and extreme negative reactions. We found 21,115 users having Twitter and Goodreads handles to study what kind of books users of each category read. Reading patterns of G constitute of academic/technical, religion, inspirational/self-help and romance. Those of P users are fantasy/fiction, sports, LGBT/BDSM/Erotica and horror/violence/betrayal. I users tend to read fantasy/fiction, death and indiscriminately any arbitrary topic. G and P users make friends in the same category whereas I users tend to have friends in P category, but not among themselves.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictions of drug metabolism pathways through CYP 3A4 enzyme by analysing drug-target interactions network graph 通过分析药物-靶标相互作用网络图预测cyp3a4酶的药物代谢途径
M. T. Albrijawi, Amrou Haj Ibrahim, R. Alhajj
The available data of drugs and their targets has increased widely in recent years. Far from the traditional way of studying the drug-target interactions, we propose a network-based computational method to identify new targets for known drugs. In this study, the Stanford Biomedical Network Dataset Collection (BIOSNAP Datasets) is used. A network graph is constructed and analyzed to study the relationship between the drugs and their targets. Different centrality and similarity measures analyses are applied and predict new potential metabolism pathways for five drugs, namely (Wortmannin, Voacamine, Vancomycin, Dactinomycin and Arundic acid) through Cytochrome P450 3A4 enzyme in the liver. The application of network theory to the analysis of this dataset reveals a new significant approach. Finally the molecular docking is performed to confirm the results. Also, the importance of the presented method in drug discovery is highlighted/pointed out.
近年来,有关药物及其靶点的可用数据已广泛增加。与传统的药物-靶点相互作用研究方法不同,我们提出了一种基于网络的计算方法来识别已知药物的新靶点。本研究使用斯坦福生物医学网络数据集(BIOSNAP Datasets)。构建并分析了网络图,研究了药物与靶点之间的关系。应用不同的中心性和相似性测度分析,通过肝脏细胞色素P450 3A4酶预测五种药物(Wortmannin、Voacamine、万古霉素、放线菌霉素和环亚酸)新的潜在代谢途径。将网络理论应用于该数据集的分析,揭示了一种新的有意义的方法。最后进行分子对接验证。此外,本文还强调了该方法在药物发现中的重要性。
{"title":"Predictions of drug metabolism pathways through CYP 3A4 enzyme by analysing drug-target interactions network graph","authors":"M. T. Albrijawi, Amrou Haj Ibrahim, R. Alhajj","doi":"10.1145/3487351.3490959","DOIUrl":"https://doi.org/10.1145/3487351.3490959","url":null,"abstract":"The available data of drugs and their targets has increased widely in recent years. Far from the traditional way of studying the drug-target interactions, we propose a network-based computational method to identify new targets for known drugs. In this study, the Stanford Biomedical Network Dataset Collection (BIOSNAP Datasets) is used. A network graph is constructed and analyzed to study the relationship between the drugs and their targets. Different centrality and similarity measures analyses are applied and predict new potential metabolism pathways for five drugs, namely (Wortmannin, Voacamine, Vancomycin, Dactinomycin and Arundic acid) through Cytochrome P450 3A4 enzyme in the liver. The application of network theory to the analysis of this dataset reveals a new significant approach. Finally the molecular docking is performed to confirm the results. Also, the importance of the presented method in drug discovery is highlighted/pointed out.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating 4-cliques in streaming graphs: the power of dual sampling 流图中近似4-团:双采样的威力
Anmol Mann, Venkatesh Srinivasan, Alex Thomo
Clique counting is considered to be a challenging problem in graph mining. The reason is combinatorial explosion; even moderate graphs with a few million edges could have clique counts in the order of many billions. In this paper, we propose a fast and scalable algorithm for approximating 4-clique counts in a single-pass streaming model. By leveraging a combination of sampling approaches, we estimate the 4-clique count with high accuracy. Our algorithm performs well on massive graphs containing several billions of 4-cliques, and terminates within a reasonable amount of time.
团计数被认为是图挖掘中的一个具有挑战性的问题。原因是组合爆炸;即使是有几百万条边的中等图也可能有几十亿条的团计数。在本文中,我们提出了一种快速且可扩展的算法来近似单通道流模型中的4团计数。通过利用采样方法的组合,我们以高精度估计4团计数。我们的算法在包含数十亿个4-clique的大规模图上表现良好,并在合理的时间内终止。
{"title":"Approximating 4-cliques in streaming graphs: the power of dual sampling","authors":"Anmol Mann, Venkatesh Srinivasan, Alex Thomo","doi":"10.1145/3487351.3489471","DOIUrl":"https://doi.org/10.1145/3487351.3489471","url":null,"abstract":"Clique counting is considered to be a challenging problem in graph mining. The reason is combinatorial explosion; even moderate graphs with a few million edges could have clique counts in the order of many billions. In this paper, we propose a fast and scalable algorithm for approximating 4-clique counts in a single-pass streaming model. By leveraging a combination of sampling approaches, we estimate the 4-clique count with high accuracy. Our algorithm performs well on massive graphs containing several billions of 4-cliques, and terminates within a reasonable amount of time.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of active reconnaissance phase: an automated API-based port and vulnerability scanner 主动侦察阶段的自动化:基于api的自动化端口和漏洞扫描器
Malek Malkawi, Tansel Özyer, R. Alhajj
The unprecedented growth in technology has increased the importance of the required information security that is still hard to be reached. Recently, network and web application attacks have occurred frequently, causing confidential data to be stolen by the available vulnerabilities in the systems and the most prominent is in the form of open ports. This causes the CIA (Confidentiality Integrity and Availability) Triad Model to break. Penetration testing is one of the key techniques used in real life to accurately detect the possible threats and potential attacks against the system, and the first step for hackers to conduct attacks is information collection. In this paper, we present a useful schema for the active information-gathering phase that can be used during penetration testing and by system administrators. It will be the first feature of a security engine going to be implemented. The work involves an automated API-based IP and port scanner, service-version enumerator, and vulnerability detection system. This scheme is based on the Network Mapper (Nmap) to collect the information with high accuracy depending on the provided rules in our schema. Besides, the work has been implemented as a RESTful-API server, aiming at easy integration for real-life cases and allowing administrators to scan and secure their networks more quickly and easily. The effectiveness and efficiency of this technique has been proved by the various test cases applied considering different scenarios from the real world. The average time of scanning a server and detecting the vulnerabilities is 2.2 minutes. Regardless of the number of vulnerabilities, the increase in time for each open port is just about 12 seconds.
前所未有的技术发展增加了所需要的信息安全的重要性,这仍然很难达到。近年来,网络和web应用程序攻击频繁发生,利用系统中存在的漏洞窃取机密数据,最突出的是开放端口。这会导致CIA(机密性、完整性和可用性)三元模型崩溃。渗透测试是现实生活中用于准确检测系统可能存在的威胁和潜在攻击的关键技术之一,而黑客进行攻击的第一步是信息收集。在本文中,我们为主动信息收集阶段提供了一个有用的模式,该模式可在渗透测试期间和系统管理员使用。这将是即将实现的安全引擎的第一个特性。这项工作涉及基于api的自动化IP和端口扫描程序、服务版本枚举器和漏洞检测系统。该方案基于网络映射器(Nmap),根据模式中提供的规则以高精度收集信息。此外,这项工作已经作为restful api服务器实现,旨在轻松集成实际案例,并允许管理员更快速,更轻松地扫描和保护他们的网络。该技术的有效性和效率已通过考虑来自现实世界的不同场景的各种测试用例得到了证明。扫描一台服务器并检测漏洞的平均时间为2.2分钟。无论漏洞的数量如何,每个开放端口的时间增加大约只有12秒。
{"title":"Automation of active reconnaissance phase: an automated API-based port and vulnerability scanner","authors":"Malek Malkawi, Tansel Özyer, R. Alhajj","doi":"10.1145/3487351.3492720","DOIUrl":"https://doi.org/10.1145/3487351.3492720","url":null,"abstract":"The unprecedented growth in technology has increased the importance of the required information security that is still hard to be reached. Recently, network and web application attacks have occurred frequently, causing confidential data to be stolen by the available vulnerabilities in the systems and the most prominent is in the form of open ports. This causes the CIA (Confidentiality Integrity and Availability) Triad Model to break. Penetration testing is one of the key techniques used in real life to accurately detect the possible threats and potential attacks against the system, and the first step for hackers to conduct attacks is information collection. In this paper, we present a useful schema for the active information-gathering phase that can be used during penetration testing and by system administrators. It will be the first feature of a security engine going to be implemented. The work involves an automated API-based IP and port scanner, service-version enumerator, and vulnerability detection system. This scheme is based on the Network Mapper (Nmap) to collect the information with high accuracy depending on the provided rules in our schema. Besides, the work has been implemented as a RESTful-API server, aiming at easy integration for real-life cases and allowing administrators to scan and secure their networks more quickly and easily. The effectiveness and efficiency of this technique has been proved by the various test cases applied considering different scenarios from the real world. The average time of scanning a server and detecting the vulnerabilities is 2.2 minutes. Regardless of the number of vulnerabilities, the increase in time for each open port is just about 12 seconds.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123950378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The centrality of edges based on their role in induced triads 边的中心性基于它们在诱导三角中的作用
Lauren Hudson, R. Whitaker, S. M. Allen, Liam D. Turner, Diane H Felmlee
The prevalence of induced triads play an important role in characterising complex networks, supporting approaches for assessment of dynamic and partially obfuscated scenarios. In this paper we introduce a new local edge-centrality measure that is designed to be deployed in this context for complex networks and is highly scalable. It signifies the importance an edge plays within induced triads for a directed network. We observe that an edge can play one of two roles in providing connectivity within any particular triad, based on whether the edge supports connectivity to the third node or not. We call these alternative states overt and covert. As an edge may play alternative roles in different induced triads, this allows us to assess the local importance of an edge across multiple induced substructures. We introduce theory to count the number of induced triads in which an edge is overt and covert. Using 34 data sets derived from public sources, we show how the presence of overt and covert edges can be used to profile diverse real-world networks. The relationship with global network analysis metrics is examined. We observe that overt and covert edge centrality is useful in further differentiating classes of network, when considered in combination with conventional global network analysis metrics.
诱发三联征的流行在描述复杂网络、支持评估动态和部分模糊情景的方法方面发挥着重要作用。在本文中,我们介绍了一种新的局部边缘中心性度量,该度量旨在部署在复杂网络的这种上下文中,并且具有高度可扩展性。它表明了有向网络中诱导三元组中边的重要性。我们观察到,根据边缘是否支持与第三个节点的连接,在任何特定三元组中,边缘可以扮演两个角色中的一个。我们称这两种状态为公开状态和隐蔽状态。由于一条边可能在不同的诱导三联中扮演不同的角色,这使我们能够评估一条边在多个诱导子结构中的局部重要性。我们引入了一个理论来计算一个边是显性和隐性的诱导三联的数目。使用来自公共来源的34个数据集,我们展示了如何使用公开和隐蔽边缘的存在来描述不同的现实世界网络。研究了与全局网络分析指标的关系。我们观察到,当与传统的全局网络分析指标结合考虑时,显性和隐性边缘中心性在进一步区分网络类别方面是有用的。
{"title":"The centrality of edges based on their role in induced triads","authors":"Lauren Hudson, R. Whitaker, S. M. Allen, Liam D. Turner, Diane H Felmlee","doi":"10.1145/3487351.3493825","DOIUrl":"https://doi.org/10.1145/3487351.3493825","url":null,"abstract":"The prevalence of induced triads play an important role in characterising complex networks, supporting approaches for assessment of dynamic and partially obfuscated scenarios. In this paper we introduce a new local edge-centrality measure that is designed to be deployed in this context for complex networks and is highly scalable. It signifies the importance an edge plays within induced triads for a directed network. We observe that an edge can play one of two roles in providing connectivity within any particular triad, based on whether the edge supports connectivity to the third node or not. We call these alternative states overt and covert. As an edge may play alternative roles in different induced triads, this allows us to assess the local importance of an edge across multiple induced substructures. We introduce theory to count the number of induced triads in which an edge is overt and covert. Using 34 data sets derived from public sources, we show how the presence of overt and covert edges can be used to profile diverse real-world networks. The relationship with global network analysis metrics is examined. We observe that overt and covert edge centrality is useful in further differentiating classes of network, when considered in combination with conventional global network analysis metrics.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130227660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Will you dance to the challenge?: predicting user participation of TikTok challenges 你愿意跳舞迎接挑战吗?:预测TikTok挑战的用户参与度
L. Ng, John Yeh Han Tan, Darryl Jing Heng Tan, R. Lee
TikTok is a popular new social media, where users express themselves through short video clips. A common form of interaction on the platform is participating in "challenges", which are songs and dances for users to iterate upon. Challenge contagion can be measured through replication reach, i.e., users uploading videos of their participation in the challenges. The uniqueness of the TikTok platform where both challenge content and user preferences are evolving requires the combination of challenge and user representation. This paper investigates social contagion of TikTok challenges through predicting a user's participation. We propose a novel deep learning model, deepChallenger, to learn and combine latent user and challenge representations from past videos to perform this user-challenge prediction task. We collect a dataset of over 7,000 videos from 12 trending challenges on the ForYouPage, the app's landing page, and over 10,000 videos from 1303 users. Extensive experiments are conducted and the results show that our proposed deepChallenger (F1=0.494) outperforms baselines (F1=0.188) in the prediction task.
抖音是一种流行的新型社交媒体,用户可以通过短视频片段表达自己。平台上一种常见的互动形式是参与“挑战”,这是用户迭代的歌曲和舞蹈。挑战传染可以通过复制范围来衡量,即用户上传他们参与挑战的视频。挑战内容和用户偏好都在不断变化的TikTok平台的独特性需要挑战和用户表现的结合。本文通过预测用户参与来研究TikTok挑战的社会传染。我们提出了一种新的深度学习模型,deepChallenger,来学习和结合过去视频中的潜在用户和挑战表示来执行这个用户挑战预测任务。我们从ForYouPage(应用程序的登陆页面)上的12个趋势挑战中收集了超过7000个视频的数据集,以及来自1303名用户的10,000多个视频。大量实验结果表明,我们提出的deepChallenger (F1=0.494)在预测任务中优于baseline (F1=0.188)。
{"title":"Will you dance to the challenge?: predicting user participation of TikTok challenges","authors":"L. Ng, John Yeh Han Tan, Darryl Jing Heng Tan, R. Lee","doi":"10.1145/3487351.3488276","DOIUrl":"https://doi.org/10.1145/3487351.3488276","url":null,"abstract":"TikTok is a popular new social media, where users express themselves through short video clips. A common form of interaction on the platform is participating in \"challenges\", which are songs and dances for users to iterate upon. Challenge contagion can be measured through replication reach, i.e., users uploading videos of their participation in the challenges. The uniqueness of the TikTok platform where both challenge content and user preferences are evolving requires the combination of challenge and user representation. This paper investigates social contagion of TikTok challenges through predicting a user's participation. We propose a novel deep learning model, deepChallenger, to learn and combine latent user and challenge representations from past videos to perform this user-challenge prediction task. We collect a dataset of over 7,000 videos from 12 trending challenges on the ForYouPage, the app's landing page, and over 10,000 videos from 1303 users. Extensive experiments are conducted and the results show that our proposed deepChallenger (F1=0.494) outperforms baselines (F1=0.188) in the prediction task.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Constraint-embedded paraphrase generation for commercial tweets 嵌入约束的商业推文释义生成
Renhao Cui, G. Agrawal, R. Ramnath
Automated generation of commercial tweets has become a useful and important tool in the use of social media for marketing and advertising. In this context, paraphrase generation has emerged as an important problem. This type of paraphrase generation has the unique requirement of requiring certain elements to be kept in the result, such as the product name or the promotion details. To address this need, we propose a Constraint-Embedded Language Modeling (CELM) framework, in which hard constraints are embedded in the text content and learned through a language model. This embedding helps the model learn not only paraphrase generation but also constraints in the content of the paraphrase specific to commercial tweets. In addition, we apply knowledge learned from a general domain to the generation task of commercial tweets. Our model is shown to outperform general paraphrase generation models as well as the state-of-the-art CopyNet model, in terms of paraphrase similarity, diversity, and the ability to conform to hard constraints.
自动生成商业推文已经成为利用社交媒体进行营销和广告的一个有用和重要的工具。在这种背景下,释义生成已成为一个重要的问题。这种类型的释义生成具有独特的需求,要求在结果中保留某些元素,例如产品名称或促销细节。为了解决这一需求,我们提出了一个约束嵌入式语言建模(CELM)框架,其中硬约束嵌入到文本内容中,并通过语言模型学习。这种嵌入不仅可以帮助模型学习释义生成,还可以学习特定于商业推文的释义内容的约束。此外,我们将从一般领域学习到的知识应用于商业推文的生成任务。我们的模型在释义相似性、多样性和符合硬约束的能力方面,表现优于一般的释义生成模型以及最先进的CopyNet模型。
{"title":"Constraint-embedded paraphrase generation for commercial tweets","authors":"Renhao Cui, G. Agrawal, R. Ramnath","doi":"10.1145/3487351.3490974","DOIUrl":"https://doi.org/10.1145/3487351.3490974","url":null,"abstract":"Automated generation of commercial tweets has become a useful and important tool in the use of social media for marketing and advertising. In this context, paraphrase generation has emerged as an important problem. This type of paraphrase generation has the unique requirement of requiring certain elements to be kept in the result, such as the product name or the promotion details. To address this need, we propose a Constraint-Embedded Language Modeling (CELM) framework, in which hard constraints are embedded in the text content and learned through a language model. This embedding helps the model learn not only paraphrase generation but also constraints in the content of the paraphrase specific to commercial tweets. In addition, we apply knowledge learned from a general domain to the generation task of commercial tweets. Our model is shown to outperform general paraphrase generation models as well as the state-of-the-art CopyNet model, in terms of paraphrase similarity, diversity, and the ability to conform to hard constraints.","PeriodicalId":320904,"journal":{"name":"Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116010284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1