首页 > 最新文献

2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)最新文献

英文 中文
Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection 基于多元全重复模式检测的文本挖掘恶意软件分类
Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj
Mobile phones have become nowadays a commodity to the majority of people. Using them, people are able to access the world of Internet and connect with their friends, their colleagues at work or even unknown people with common interests. This proliferation of the mobile devices has also been seen as an opportunity for the cyber criminals to deceive smartphone users and steel their money directly or indirectly, respectively, by accessing their bank accounts through the smartphones or by blackmailing them or selling their private data such as photos, credit card data, etc. to third parties. This is usually achieved by installing malware to smartphones masking their malevolent payload as a legitimate application and advertise it to the users with the hope that mobile users will install it in their devices. Thus, any existing application can easily be modified by integrating a malware and then presented it as a legitimate one. In response to this, scientists have proposed a number of malware detection and classification methods using a variety of techniques. Even though, several of them achieve relatively high precision in malware classification, there is still space for improvement. In this paper, we propose a text mining all repeated pattern detection method which uses the decompiled files of an application in order to classify a suspicious application into one of the known malware families. Based on the experimental results using a real malware dataset, the methodology tries to correctly classify (without any misclassification) all randomly selected malware applications of 3 categories with 3 different families each.
手机如今已成为大多数人的一种商品。使用它们,人们能够访问互联网的世界,并与他们的朋友,他们的同事在工作,甚至不认识的人有共同的兴趣。移动设备的激增也被视为网络犯罪分子欺骗智能手机用户并直接或间接地分别通过智能手机访问他们的银行账户或勒索他们或将他们的私人数据(如照片,信用卡数据等)出售给第三方的机会。这通常是通过将恶意软件安装到智能手机上,将其恶意负载伪装成合法应用程序,并向用户宣传,希望移动用户将其安装到他们的设备中。因此,任何现有的应用程序都可以很容易地通过集成恶意软件进行修改,然后将其呈现为合法的应用程序。针对这一点,科学家们提出了一些使用各种技术的恶意软件检测和分类方法。尽管其中有几个在恶意软件分类上达到了较高的精度,但仍有改进的空间。本文提出了一种文本挖掘全重复模式检测方法,该方法利用应用程序的反编译文件将可疑应用程序分类到已知的恶意软件家族中。基于使用真实恶意软件数据集的实验结果,该方法尝试对随机选择的3个不同家族的3类恶意软件应用程序进行正确分类(无任何误分类)。
{"title":"Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection","authors":"Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj","doi":"10.1145/3341161.3350841","DOIUrl":"https://doi.org/10.1145/3341161.3350841","url":null,"abstract":"Mobile phones have become nowadays a commodity to the majority of people. Using them, people are able to access the world of Internet and connect with their friends, their colleagues at work or even unknown people with common interests. This proliferation of the mobile devices has also been seen as an opportunity for the cyber criminals to deceive smartphone users and steel their money directly or indirectly, respectively, by accessing their bank accounts through the smartphones or by blackmailing them or selling their private data such as photos, credit card data, etc. to third parties. This is usually achieved by installing malware to smartphones masking their malevolent payload as a legitimate application and advertise it to the users with the hope that mobile users will install it in their devices. Thus, any existing application can easily be modified by integrating a malware and then presented it as a legitimate one. In response to this, scientists have proposed a number of malware detection and classification methods using a variety of techniques. Even though, several of them achieve relatively high precision in malware classification, there is still space for improvement. In this paper, we propose a text mining all repeated pattern detection method which uses the decompiled files of an application in order to classify a suspicious application into one of the known malware families. Based on the experimental results using a real malware dataset, the methodology tries to correctly classify (without any misclassification) all randomly selected malware applications of 3 categories with 3 different families each.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114966258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location, Location, Location! Quantifying the True Impact of Location on Business Reviews Using a Yelp Dataset 位置,位置,位置!使用Yelp数据集量化位置对商业评论的真正影响
Abu Saleh Md Tayeen, Abderrahmen Mtibaa, S. Misra
Today, with the emergence of various business review sites such as Yelp, Trip Advisor, and Zomato, people can write reviews and provide an assessment (often as 1–5 score rating). The success of a business on the crowd-sourced review platform has taken the form of positive reviews and high star ratings (failure are associated with negative reviews and low star ratings). We often claim that location plays a major role in determining the success or the failure of a given business. This paper attempts to verify this claim and quantifies the impact of location, solely, on business success, using two data sets; a Yelp dataset for business information and reviews, and another Location dataset that gathers location-based information in a city or an area. We perform an empirical study to quantify the impact of (i) relative location to well known landmarks and (ii) parameterized location (such as cost of living in a given zip code), on the success of restaurants. In our study, we found that parameterized location using location characteristic parameters such as housing affordability correlate highly with restaurant success with more than 0.81 correlation ratio. We also observe that the closer the restaurant to a landmark (relative location) the more likelihood it succeeds.
如今,随着各种商业评论网站的出现,如Yelp、Trip Advisor和Zomato,人们可以撰写评论并提供评估(通常为1-5分)。在众包点评平台上,企业的成功以正面评价和高星级的形式呈现(失败与负面评价和低星级相关)。我们经常说,地点在决定一个企业的成败方面起着重要作用。本文试图验证这一说法,并使用两个数据集量化地理位置对商业成功的影响;一个用于商业信息和评论的Yelp数据集,以及另一个用于收集城市或地区基于位置的信息的Location数据集。我们进行了一项实证研究,以量化(i)相对于知名地标的位置和(ii)参数化位置(如给定邮政编码的生活成本)对餐馆成功的影响。在我们的研究中,我们发现使用位置特征参数(如住房负担能力)的参数化位置与餐厅成功高度相关,相关比超过0.81。我们还观察到,餐厅离地标(相对位置)越近,成功的可能性越大。
{"title":"Location, Location, Location! Quantifying the True Impact of Location on Business Reviews Using a Yelp Dataset","authors":"Abu Saleh Md Tayeen, Abderrahmen Mtibaa, S. Misra","doi":"10.1145/3341161.3345334","DOIUrl":"https://doi.org/10.1145/3341161.3345334","url":null,"abstract":"Today, with the emergence of various business review sites such as Yelp, Trip Advisor, and Zomato, people can write reviews and provide an assessment (often as 1–5 score rating). The success of a business on the crowd-sourced review platform has taken the form of positive reviews and high star ratings (failure are associated with negative reviews and low star ratings). We often claim that location plays a major role in determining the success or the failure of a given business. This paper attempts to verify this claim and quantifies the impact of location, solely, on business success, using two data sets; a Yelp dataset for business information and reviews, and another Location dataset that gathers location-based information in a city or an area. We perform an empirical study to quantify the impact of (i) relative location to well known landmarks and (ii) parameterized location (such as cost of living in a given zip code), on the success of restaurants. In our study, we found that parameterized location using location characteristic parameters such as housing affordability correlate highly with restaurant success with more than 0.81 correlation ratio. We also observe that the closer the restaurant to a landmark (relative location) the more likelihood it succeeds.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129818108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Artificial Intelligence for ETF Market Prediction and Portfolio Optimization 人工智能在ETF市场预测和投资组合优化中的应用
Min-Yuh Day, Jian-Ting Lin
In asset allocation and time-series forecasting studies, few have shed light on using the different machine learning and deep learning models to verify the difference in the result of investment returns and optimal asset allocation. To fill this research gap, we develop a robo-advisor with different machine learning and deep learning forecasting methodologies and utilize the forecasting result of the portfolio optimization model to support our investors in making decisions. This research integrated several dimensions of technologies, which contain machine learning, data analytics, and portfolio optimization. We focused on developing robo-advisor framework and utilized algorithms by integrating machine learning and deep learning approaches with the portfolio optimization algorithm by using our predicted trends and results to replace the historical data and investor views. We eliminate the extreme fluctuation to maintain our trading within the acceptable risk coefficient. Accordingly, we can minimize the investment risk and reach a relatively stable return. We compared different algorithms and found that the F1 score of the model prediction significantly affects the result of the optimized portfolio. We used our deep learning model with the highest winning rate and leveraged the prediction result with the portfolio optimization algorithm to reach 12% of annual return, which outperform our benchmark index 0050. TW and the optimized portfolio with the integration of historical data.
在资产配置和时间序列预测研究中,很少有人阐明使用不同的机器学习和深度学习模型来验证投资回报和最优资产配置结果的差异。为了填补这一研究空白,我们开发了一个具有不同机器学习和深度学习预测方法的机器人顾问,并利用投资组合优化模型的预测结果来支持我们的投资者做出决策。这项研究整合了几个维度的技术,包括机器学习、数据分析和投资组合优化。我们专注于开发机器人顾问框架,并利用算法将机器学习和深度学习方法与投资组合优化算法相结合,使用我们预测的趋势和结果来取代历史数据和投资者的观点。我们消除极端波动,以保持我们的交易在可接受的风险系数。因此,我们可以将投资风险降到最低,并获得相对稳定的回报。我们比较了不同的算法,发现模型预测的F1分数显著影响优化投资组合的结果。我们使用了胜率最高的深度学习模型,并将预测结果与投资组合优化算法相结合,达到了12%的年回报率,超过了基准指数0050。TW和整合历史数据的优化投资组合。
{"title":"Artificial Intelligence for ETF Market Prediction and Portfolio Optimization","authors":"Min-Yuh Day, Jian-Ting Lin","doi":"10.1145/3341161.3344822","DOIUrl":"https://doi.org/10.1145/3341161.3344822","url":null,"abstract":"In asset allocation and time-series forecasting studies, few have shed light on using the different machine learning and deep learning models to verify the difference in the result of investment returns and optimal asset allocation. To fill this research gap, we develop a robo-advisor with different machine learning and deep learning forecasting methodologies and utilize the forecasting result of the portfolio optimization model to support our investors in making decisions. This research integrated several dimensions of technologies, which contain machine learning, data analytics, and portfolio optimization. We focused on developing robo-advisor framework and utilized algorithms by integrating machine learning and deep learning approaches with the portfolio optimization algorithm by using our predicted trends and results to replace the historical data and investor views. We eliminate the extreme fluctuation to maintain our trading within the acceptable risk coefficient. Accordingly, we can minimize the investment risk and reach a relatively stable return. We compared different algorithms and found that the F1 score of the model prediction significantly affects the result of the optimized portfolio. We used our deep learning model with the highest winning rate and leveraged the prediction result with the portfolio optimization algorithm to reach 12% of annual return, which outperform our benchmark index 0050. TW and the optimized portfolio with the integration of historical data.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Large-Scale Empirical Study of Geotagging Behavior on Twitter Twitter上地理标记行为的大规模实证研究
Binxuan Huang, Kathleen M. Carley
Geotagging on social media has become an important proxy for understanding people's mobility and social events. Research that uses geotags to infer public opinions relies on several key assumptions about the behavior of geotagged and non-geotagged users. However, these assumptions have not been fully validated. Lack of understanding the geotagging behavior prohibits people further utilizing it. In this paper, we present an empirical study of geotagging behavior on Twitter based on more than 40 billion tweets collected from 20 million users. There are three main findings that may challenge these common assumptions. Firstly, different groups of users have different geotagging preferences. For example, less than 3% of users speaking in Korean are geotagged, while more than 40% of users speaking in Indonesian use geotags. Secondly, users who report their locations in profiles are more likely to use geotags, which may affects the generability of those location prediction systems on non-geotagged users. Thirdly, strong homophily effect exists in users' geotagging behavior, that users tend to connect to friends with similar geotagging preferences.
社交媒体上的地理标记已经成为了解人们流动性和社会事件的重要代理。使用地理标签来推断公众意见的研究依赖于对地理标签和非地理标签用户行为的几个关键假设。然而,这些假设尚未得到充分证实。缺乏对地理标记行为的理解阻碍了人们进一步使用它。在本文中,我们基于从2000万用户收集的400多亿条推文,对Twitter上的地理标记行为进行了实证研究。有三个主要的发现可能会挑战这些普遍的假设。首先,不同的用户群体有不同的地理标记偏好。例如,不到3%的韩语用户使用地理标签,而超过40%的印尼语用户使用地理标签。其次,在个人资料中报告其位置的用户更有可能使用地理标签,这可能会影响这些位置预测系统对非地理标签用户的可泛化性。第三,用户地理标记行为存在较强的同质效应,用户倾向于与地理标记偏好相似的朋友建立联系。
{"title":"A Large-Scale Empirical Study of Geotagging Behavior on Twitter","authors":"Binxuan Huang, Kathleen M. Carley","doi":"10.1145/3341161.3342870","DOIUrl":"https://doi.org/10.1145/3341161.3342870","url":null,"abstract":"Geotagging on social media has become an important proxy for understanding people's mobility and social events. Research that uses geotags to infer public opinions relies on several key assumptions about the behavior of geotagged and non-geotagged users. However, these assumptions have not been fully validated. Lack of understanding the geotagging behavior prohibits people further utilizing it. In this paper, we present an empirical study of geotagging behavior on Twitter based on more than 40 billion tweets collected from 20 million users. There are three main findings that may challenge these common assumptions. Firstly, different groups of users have different geotagging preferences. For example, less than 3% of users speaking in Korean are geotagged, while more than 40% of users speaking in Indonesian use geotags. Secondly, users who report their locations in profiles are more likely to use geotags, which may affects the generability of those location prediction systems on non-geotagged users. Thirdly, strong homophily effect exists in users' geotagging behavior, that users tend to connect to friends with similar geotagging preferences.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129352745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Meta-GNN: Metagraph Neural Network for Semi-supervised learning in Attributed Heterogeneous Information Networks Meta-GNN:属性异构信息网络中半监督学习的元图神经网络
Aravind Sankar, Xinyang Zhang, K. Chang
Heterogeneous Information Networks (HINs) comprise nodes of different types inter-connected through diverse semantic relationships. In many real-world applications, nodes in information networks are often associated with additional attributes, resulting in Attributed HINs (or AHINs). In this paper, we study semi-supervised learning (SSL) on AHINs to classify nodes based on their structure, node types and attributes, given limited supervision. Recently, Graph Convolutional Networks (GCNs) have achieved impressive results in several graph-based SSL tasks. However, they operate on homogeneous networks, while being completely agnostic to the semantics of typed nodes and relationships in real-world HINs. In this paper, we seek to bridge the gap between semantic-rich HINs and the neighborhood aggregation paradigm of graph neural networks, to generalize GCNs through metagraph semantics. We propose a novel metagraph convolution operation to extract features from local metagraph-structured neighborhoods, thus capturing semantic higher-order relationships in AHINs. Our proposed neural architecture Meta-GNN extracts features of diverse semantics by utilizing multiple metagraphs, and employs a novel metagraph-attention module to learn personalized metagraph preferences for each node. Our semi-supervised node classification experiments on multiple real-world AHIN datasets indicate significant performance gains of 6% Micro-F1 on average over state-of-the-art AHIN baselines. Visualizations on metagraph attention weights yield interpretable insights into their relative task-specific importance.
异构信息网络由不同类型的节点通过不同的语义关系相互连接而成。在许多实际的应用程序中,信息网络中的节点通常与其他属性相关联,从而产生有属性的HINs(或AHINs)。本文研究了AHINs上的半监督学习(SSL),在有限监督的情况下,根据节点的结构、节点类型和属性对节点进行分类。最近,图卷积网络(GCNs)在几个基于图的SSL任务中取得了令人印象深刻的结果。然而,它们在同构网络上运行,而完全不知道实际HINs中类型化节点和关系的语义。在本文中,我们试图弥合语义丰富的HINs与图神经网络的邻域聚合范式之间的差距,通过元语义泛化GCNs。我们提出了一种新的元图卷积操作,从局部元图结构邻域中提取特征,从而捕获AHINs中的语义高阶关系。我们提出的Meta-GNN神经结构通过利用多个元图提取不同语义的特征,并采用新颖的元图关注模块来学习每个节点的个性化元图偏好。我们在多个真实世界AHIN数据集上进行的半监督节点分类实验表明,与最先进的AHIN基线相比,其性能平均提高了6% Micro-F1。对元图注意权重的可视化产生了对其相对任务特定重要性的可解释的见解。
{"title":"Meta-GNN: Metagraph Neural Network for Semi-supervised learning in Attributed Heterogeneous Information Networks","authors":"Aravind Sankar, Xinyang Zhang, K. Chang","doi":"10.1145/3341161.3342859","DOIUrl":"https://doi.org/10.1145/3341161.3342859","url":null,"abstract":"Heterogeneous Information Networks (HINs) comprise nodes of different types inter-connected through diverse semantic relationships. In many real-world applications, nodes in information networks are often associated with additional attributes, resulting in Attributed HINs (or AHINs). In this paper, we study semi-supervised learning (SSL) on AHINs to classify nodes based on their structure, node types and attributes, given limited supervision. Recently, Graph Convolutional Networks (GCNs) have achieved impressive results in several graph-based SSL tasks. However, they operate on homogeneous networks, while being completely agnostic to the semantics of typed nodes and relationships in real-world HINs. In this paper, we seek to bridge the gap between semantic-rich HINs and the neighborhood aggregation paradigm of graph neural networks, to generalize GCNs through metagraph semantics. We propose a novel metagraph convolution operation to extract features from local metagraph-structured neighborhoods, thus capturing semantic higher-order relationships in AHINs. Our proposed neural architecture Meta-GNN extracts features of diverse semantics by utilizing multiple metagraphs, and employs a novel metagraph-attention module to learn personalized metagraph preferences for each node. Our semi-supervised node classification experiments on multiple real-world AHIN datasets indicate significant performance gains of 6% Micro-F1 on average over state-of-the-art AHIN baselines. Visualizations on metagraph attention weights yield interpretable insights into their relative task-specific importance.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129234741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
On Designing MWIR and Visible Band based DeepFace Detection Models 基于MWIR和可见光波段的深度人脸检测模型设计
Suha Reddy Mokalla, T. Bourlai
In this work, we propose an optimal solution for face detection when operating in the thermal and visible bands. Our aim is to train, fine tune, optimize and validate preexisting object detection models using thermal and visible data separately. Thus, we perform an empirical study to determine the most efficient band specific DeepFace detection model in terms of detection performance. The original object detection models that were selected for our study are the Faster R-CNN (Region based Convolutional Neural Network), SSD (Single-shot Multi-Box Detector) and R-FCN (Region-based Fully Convolutional Network). Also, the dual-band dataset used for this work is composed of two challenging MWIR and visible band face datasets, where the faces were captured under variable conditions, i.e. indoors, outdoors, different standoff distances (5 and 10 meters) and poses. Experimental results show that the proposed detection model yields the highest accuracy independent of the band and scenario used. Specifically, we show that a modified and tuned Faster R-CNN architecture with ResNet 101 is the most promising model when compared to all the other models tested. The proposed model yields accuracy of 99.2% and 98.4% when tested on thermal and visible face data respectively. Finally, while the proposed model is relatively slower than its competitors, our further experiments show that the speed of this network can be increased by reducing the number of proposals in RPN (Region Proposal Network), and thus, the computational complexity challenge is significantly minimized.
在这项工作中,我们提出了一个在热波段和可见光波段进行人脸检测的最佳解决方案。我们的目标是分别使用热数据和可见数据来训练、微调、优化和验证预先存在的目标检测模型。因此,我们进行了一项实证研究,以确定在检测性能方面最有效的波段特定DeepFace检测模型。我们研究中选择的原始目标检测模型是Faster R-CNN(基于区域的卷积神经网络)、SSD(单镜头多盒检测器)和R-FCN(基于区域的全卷积网络)。此外,用于这项工作的双频数据集由两个具有挑战性的MWIR和可见光波段人脸数据集组成,其中人脸是在不同条件下捕获的,即室内,室外,不同的距离(5米和10米)和姿势。实验结果表明,所提出的检测模型无论在何种波段和场景下都具有最高的检测精度。具体来说,我们表明,与所有其他测试模型相比,使用ResNet 101修改和调整的Faster R-CNN架构是最有前途的模型。该模型在热数据和可见人脸数据上的准确率分别为99.2%和98.4%。最后,虽然所提出的模型相对较慢,但我们进一步的实验表明,该网络的速度可以通过减少RPN (Region Proposal network)中的提案数量来提高,从而显著降低计算复杂度挑战。
{"title":"On Designing MWIR and Visible Band based DeepFace Detection Models","authors":"Suha Reddy Mokalla, T. Bourlai","doi":"10.1145/3341161.3343528","DOIUrl":"https://doi.org/10.1145/3341161.3343528","url":null,"abstract":"In this work, we propose an optimal solution for face detection when operating in the thermal and visible bands. Our aim is to train, fine tune, optimize and validate preexisting object detection models using thermal and visible data separately. Thus, we perform an empirical study to determine the most efficient band specific DeepFace detection model in terms of detection performance. The original object detection models that were selected for our study are the Faster R-CNN (Region based Convolutional Neural Network), SSD (Single-shot Multi-Box Detector) and R-FCN (Region-based Fully Convolutional Network). Also, the dual-band dataset used for this work is composed of two challenging MWIR and visible band face datasets, where the faces were captured under variable conditions, i.e. indoors, outdoors, different standoff distances (5 and 10 meters) and poses. Experimental results show that the proposed detection model yields the highest accuracy independent of the band and scenario used. Specifically, we show that a modified and tuned Faster R-CNN architecture with ResNet 101 is the most promising model when compared to all the other models tested. The proposed model yields accuracy of 99.2% and 98.4% when tested on thermal and visible face data respectively. Finally, while the proposed model is relatively slower than its competitors, our further experiments show that the speed of this network can be increased by reducing the number of proposals in RPN (Region Proposal Network), and thus, the computational complexity challenge is significantly minimized.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131119328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Risk Assessment of Pharmacies & Electronic Prescriptions 药店风险评估与电子处方
Michelle Bowman, Subrata Acharya
Software for electronic prescriptions offers healthcare providers numerous benefits including increased patient safety, prescribing effectiveness, workflow efficiencies, and financial savings. Particularly due to recent legislation, an increasing number of organizations are adopting this software. Yet, there are many concerns and risks associated with e-prescription technologies. Despite increased prescribing effectiveness, there is still the potential for human error. Many software concerns including integration and the implementation of specific transactions like CancelRx still need to be addressed. Additionally, some patients have negative perceptions of e-Rx that must be overcome. To this effect, this research conducts risk assessment of two real world cases (the CVS Pharmacy (retail setting) and the Ascension Seton (inpatient setting)) using the NIST risk model. The study concludes that the top three challenges in the pharmacy domain are comprised of a lack in the implementation of essential software functionalities, the loss and theft of portable devices, and errors due to email phishing attacks.
电子处方软件为医疗保健提供商提供了许多好处,包括提高患者安全性、处方有效性、工作流程效率和节省资金。特别是由于最近的立法,越来越多的组织正在采用该软件。然而,与电子处方技术相关的问题和风险很多。尽管提高了处方的有效性,但仍然存在人为错误的可能性。许多软件问题,包括集成和实现特定的事务,如CancelRx,仍然需要解决。此外,一些患者对e-Rx有负面看法,必须克服。为此,本研究使用NIST风险模型对两个真实案例(CVS Pharmacy(零售环境)和Ascension Seton(住院环境))进行了风险评估。该研究得出结论,药房领域面临的三大挑战包括缺乏基本软件功能的实现、便携式设备的丢失和被盗,以及电子邮件网络钓鱼攻击造成的错误。
{"title":"Risk Assessment of Pharmacies & Electronic Prescriptions","authors":"Michelle Bowman, Subrata Acharya","doi":"10.1145/3341161.3343697","DOIUrl":"https://doi.org/10.1145/3341161.3343697","url":null,"abstract":"Software for electronic prescriptions offers healthcare providers numerous benefits including increased patient safety, prescribing effectiveness, workflow efficiencies, and financial savings. Particularly due to recent legislation, an increasing number of organizations are adopting this software. Yet, there are many concerns and risks associated with e-prescription technologies. Despite increased prescribing effectiveness, there is still the potential for human error. Many software concerns including integration and the implementation of specific transactions like CancelRx still need to be addressed. Additionally, some patients have negative perceptions of e-Rx that must be overcome. To this effect, this research conducts risk assessment of two real world cases (the CVS Pharmacy (retail setting) and the Ascension Seton (inpatient setting)) using the NIST risk model. The study concludes that the top three challenges in the pharmacy domain are comprised of a lack in the implementation of essential software functionalities, the loss and theft of portable devices, and errors due to email phishing attacks.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122398636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAB-NC: The Correspondence Analysis Based Network Clustering Method CAB-NC:基于对应分析的网络聚类方法
M. Kimura
Finding clusters in a network has been practically important in many applications and was studied by many researchers. Most commonly used methods are spectral clustering and Newman's modularity maximization. However, there has been no unified view of them. In this study, we introduced a new guiding principle based on correspondence analysis to obtain nodes' coordinates and discussed its equivalence to spectral clustering and its relationship to Newman's modularity.
在网络中寻找聚类在许多应用中具有重要的实际意义,并被许多研究者所研究。最常用的方法是谱聚类和纽曼模块化最大化。然而,对它们并没有统一的看法。本文提出了一种新的基于对应分析的节点坐标获取指导原则,并讨论了其与谱聚类的等价性及其与纽曼模块化的关系。
{"title":"CAB-NC: The Correspondence Analysis Based Network Clustering Method","authors":"M. Kimura","doi":"10.1145/3341161.3342944","DOIUrl":"https://doi.org/10.1145/3341161.3342944","url":null,"abstract":"Finding clusters in a network has been practically important in many applications and was studied by many researchers. Most commonly used methods are spectral clustering and Newman's modularity maximization. However, there has been no unified view of them. In this study, we introduced a new guiding principle based on correspondence analysis to obtain nodes' coordinates and discussed its equivalence to spectral clustering and its relationship to Newman's modularity.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121166020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multivariate Motif Detection in Local Weather Big Data 局部天气大数据中的多元基序检测
Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj
In recent years, there are very frequent reports of disasters attributed to the climate change and there are several reports that these extreme phenomena will further affect people not only as weather disasters but also indirectly with the shortage of natural resources such as water or food due to the climate change. Towards this direction, there is an on-going research that studies weather phenomena by collecting data not only in the surface of the globe but also at the different levels of the atmosphere. Having such a large volume of data, traditional numerical weather prediction models may not be able to assimilate those data and extract knowledge useful for the prediction of extreme phenomena. Thus, analysis of weather data has been transformed into a big data analytics problem which may enable weather scientists to better understand the interrelations of the weather variables and use the knowledge discovered to improve their prediction models. In this context, the current paper proposes a big data analytics methodology that is able to detect all common patterns between different weather variables in neighboring or distant points in a specific time window revealing useful associations between weather variables which is not possible to detect otherwise with the traditional numerical methods. The proposed methodology is based on a data structure that is able to store the magnitude of the weather data in different dimensions and a pattern detection algorithm which is able to detect all common patterns. The experimental results using weather data from the National Oceanic and Atmospheric Administration (NOAA) revealed interesting otherwise unknown patterns in two weather variables for two specific locations that were studied.
近年来,气候变化导致的灾害报道非常频繁,有几篇报道称,这些极端现象不仅会以天气灾害的形式进一步影响人类,还会间接导致气候变化导致水或食物等自然资源的短缺。朝着这个方向,有一项正在进行的研究,不仅收集地球表面的数据,还收集不同大气层的数据来研究天气现象。面对如此庞大的数据量,传统的数值天气预报模式可能无法吸收这些数据并提取对极端现象预测有用的知识。因此,对天气数据的分析已经转变为一个大数据分析问题,这可以使天气科学家更好地了解天气变量之间的相互关系,并利用发现的知识来改进他们的预测模型。在此背景下,本文提出了一种大数据分析方法,该方法能够在特定时间窗口内检测邻近或遥远点的不同天气变量之间的所有共同模式,揭示天气变量之间的有用关联,而传统的数值方法则无法检测到这些关联。建议的方法是基于一种能够以不同的维度存储天气数据的数据结构和一种能够检测所有常见模式的模式检测算法。实验结果使用了美国国家海洋和大气管理局(NOAA)的天气数据,揭示了研究中两个特定地点的两个天气变量中有趣的未知模式。
{"title":"Multivariate Motif Detection in Local Weather Big Data","authors":"Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj","doi":"10.1145/3341161.3343518","DOIUrl":"https://doi.org/10.1145/3341161.3343518","url":null,"abstract":"In recent years, there are very frequent reports of disasters attributed to the climate change and there are several reports that these extreme phenomena will further affect people not only as weather disasters but also indirectly with the shortage of natural resources such as water or food due to the climate change. Towards this direction, there is an on-going research that studies weather phenomena by collecting data not only in the surface of the globe but also at the different levels of the atmosphere. Having such a large volume of data, traditional numerical weather prediction models may not be able to assimilate those data and extract knowledge useful for the prediction of extreme phenomena. Thus, analysis of weather data has been transformed into a big data analytics problem which may enable weather scientists to better understand the interrelations of the weather variables and use the knowledge discovered to improve their prediction models. In this context, the current paper proposes a big data analytics methodology that is able to detect all common patterns between different weather variables in neighboring or distant points in a specific time window revealing useful associations between weather variables which is not possible to detect otherwise with the traditional numerical methods. The proposed methodology is based on a data structure that is able to store the magnitude of the weather data in different dimensions and a pattern detection algorithm which is able to detect all common patterns. The experimental results using weather data from the National Oceanic and Atmospheric Administration (NOAA) revealed interesting otherwise unknown patterns in two weather variables for two specific locations that were studied.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling the Dynamics of Resource Exchange Networks 资源交换网络的动态建模
Haripriya Chakraborty, Liang Zhao
Understanding the evolution of large-scale cooperation is important for the social welfare and stability of economic and social networks. Therefore, there is a need to model real-world scenarios that involve a trade-off between self-interest and social welfare with minimal artificial assumptions or constraints in a versatile framework. In this paper, we build an agent-based model to simulate the dynamics of a multi-agent, bilateral, resource-exchange network. We analyze how various strategies employed by communities can improve or hurt community payoffs as well as the overall social welfare of the network. We also analyze the role of common knowledge in inducing cooperation in the network. Our experimental evidence from simulations confirms that carefully-designed trading mechanisms can indeed encourage cooperation among communities with various motivations.
了解大规模合作的演变对社会福利以及经济和社会网络的稳定至关重要。因此,有必要在一个通用框架中以最小的人为假设或约束来模拟涉及自身利益与社会福利之间权衡的现实世界场景。在本文中,我们建立了一个基于智能体的模型来模拟一个多智能体双边资源交换网络的动态。我们分析了社区采用的各种策略如何改善或损害社区收益以及网络的整体社会福利。我们还分析了共同知识在诱导网络合作中的作用。我们从模拟中获得的实验证据证实,精心设计的交易机制确实可以鼓励具有各种动机的社区之间的合作。
{"title":"Modeling the Dynamics of Resource Exchange Networks","authors":"Haripriya Chakraborty, Liang Zhao","doi":"10.1145/3341161.3342904","DOIUrl":"https://doi.org/10.1145/3341161.3342904","url":null,"abstract":"Understanding the evolution of large-scale cooperation is important for the social welfare and stability of economic and social networks. Therefore, there is a need to model real-world scenarios that involve a trade-off between self-interest and social welfare with minimal artificial assumptions or constraints in a versatile framework. In this paper, we build an agent-based model to simulate the dynamics of a multi-agent, bilateral, resource-exchange network. We analyze how various strategies employed by communities can improve or hurt community payoffs as well as the overall social welfare of the network. We also analyze the role of common knowledge in inducing cooperation in the network. Our experimental evidence from simulations confirms that carefully-designed trading mechanisms can indeed encourage cooperation among communities with various motivations.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1