首页 > 最新文献

2017 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

英文 中文
Resolving reflection methods in Android applications 解决Android应用程序中的反射方法
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004892
Zhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo
Although reflection methods in Android can facilitate developing applications, they will block control flow and data flow in static analysis, making its precision decreased. To solve this problem, we trigger applications to execute reflection methods and record its reflection targets at runtime. Reflection targets may be a method invocation, field setting or instantiating of some classes. Considering many static analysis' input is apk file, we further transform reflection methods in apk into explicit method invocation, field setting and class initiating according to the recorded reflection targets. Our experiment result shows that, based on our method, some static analysis can perform better on these transformed apk and produce more precise results.
Android中的反射方法虽然可以方便地开发应用程序,但在静态分析中会阻塞控制流和数据流,使其精度降低。为了解决这个问题,我们触发应用程序执行反射方法,并在运行时记录其反射目标。反射目标可以是方法调用、字段设置或某些类的实例化。考虑到许多静态分析的输入是apk文件,我们进一步将apk中的反射方法转换为根据记录的反射目标显式的方法调用、字段设置和类初始化。我们的实验结果表明,基于我们的方法,一些静态分析可以在这些转换后的apk上表现得更好,并产生更精确的结果。
{"title":"Resolving reflection methods in Android applications","authors":"Zhichao Cheng, Fanping Zeng, Xingqiu Zhong, Mingsong Zhou, Chengcheng Lv, Shuli Guo","doi":"10.1109/ISI.2017.8004892","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004892","url":null,"abstract":"Although reflection methods in Android can facilitate developing applications, they will block control flow and data flow in static analysis, making its precision decreased. To solve this problem, we trigger applications to execute reflection methods and record its reflection targets at runtime. Reflection targets may be a method invocation, field setting or instantiating of some classes. Considering many static analysis' input is apk file, we further transform reflection methods in apk into explicit method invocation, field setting and class initiating according to the recorded reflection targets. Our experiment result shows that, based on our method, some static analysis can perform better on these transformed apk and produce more precise results.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"310 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121011426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Linking social network accounts by modeling user spatiotemporal habits 通过建模用户时空习惯来链接社交网络帐户
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004868
Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao
Identifying the physical person behind an SNS account has become a critical issue in investigations of SNS-involved crime cases. It is a challenging task because information provided by users on an SNS platform could be false, conflicting, missing and deceptive. One way to gain an accurate profile of a user is to link up all their multiple accounts created on different social platforms, which is referred to as Account Linkage (AL). However, existing AL techniques suffer from the problem of information unreliability. Recent advances in location acquisition and wireless communication technologies give rise to new opportunities for AL. In this paper, we propose a framework that links up multiple accounts belonging to the same individual by comparing habit patterns extracted from user-generated location data. We built a topic model to capture users habit patterns in both spatial and temporal dimensions. Results of experiments carried out on a real-world dataset demonstrate the feasibility and validity of the proposed framework.
查明SNS账户背后的真实身份已成为调查SNS犯罪案件的关键问题。这是一项具有挑战性的任务,因为用户在社交网络平台上提供的信息可能是虚假的、相互矛盾的、缺失的、欺骗性的。获得用户准确资料的一种方法是将他们在不同社交平台上创建的所有多个帐户链接起来,这被称为帐户链接(AL)。然而,现有的人工智能技术存在信息不可靠的问题。位置获取和无线通信技术的最新进展为人工智能带来了新的机遇。在本文中,我们提出了一个框架,通过比较从用户生成的位置数据中提取的习惯模式,将属于同一个人的多个帐户联系起来。我们建立了一个主题模型,从空间和时间两个维度捕捉用户的习惯模式。在实际数据集上进行的实验结果证明了所提出框架的可行性和有效性。
{"title":"Linking social network accounts by modeling user spatiotemporal habits","authors":"Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao","doi":"10.1109/ISI.2017.8004868","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004868","url":null,"abstract":"Identifying the physical person behind an SNS account has become a critical issue in investigations of SNS-involved crime cases. It is a challenging task because information provided by users on an SNS platform could be false, conflicting, missing and deceptive. One way to gain an accurate profile of a user is to link up all their multiple accounts created on different social platforms, which is referred to as Account Linkage (AL). However, existing AL techniques suffer from the problem of information unreliability. Recent advances in location acquisition and wireless communication technologies give rise to new opportunities for AL. In this paper, we propose a framework that links up multiple accounts belonging to the same individual by comparing habit patterns extracted from user-generated location data. We built a topic model to capture users habit patterns in both spatial and temporal dimensions. Results of experiments carried out on a real-world dataset demonstrate the feasibility and validity of the proposed framework.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126351814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An identity-based one-off public key scheme for privacy preservation 基于身份的一次性公钥方案,用于隐私保护
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004912
Chai Linpeng, Zhang Bin
The one-off public key scheme gets more and more attention for its security features. However, there are two problems in the current schemes proposed, one is that the security threat of user's privacy disclosure for plaintext transmission, the other one is that attackers can infer the identities of the communication participants via signature correctness verification. For the problem mentioned above, we propose an identity-based one-off public key scheme for privacy preservation based on signcrytion algorithm. the scheme ensures that the confidentiality of the message, and only the specified verifier can verified the signature correctness. Furthermore, The scheme has lower computation and communication overhead compared with current available schemes.
一次性公钥方案因其安全特性而受到越来越多的关注。然而,目前提出的方案存在两个问题,一是明文传输存在用户隐私泄露的安全威胁,二是攻击者可以通过签名正确性验证推断通信参与者的身份。针对上述问题,提出了一种基于签名算法的基于身份的一次性隐私保护公钥方案。该方案保证了消息的机密性,只有指定的验证者才能验证签名的正确性。此外,与现有方案相比,该方案具有更低的计算和通信开销。
{"title":"An identity-based one-off public key scheme for privacy preservation","authors":"Chai Linpeng, Zhang Bin","doi":"10.1109/ISI.2017.8004912","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004912","url":null,"abstract":"The one-off public key scheme gets more and more attention for its security features. However, there are two problems in the current schemes proposed, one is that the security threat of user's privacy disclosure for plaintext transmission, the other one is that attackers can infer the identities of the communication participants via signature correctness verification. For the problem mentioned above, we propose an identity-based one-off public key scheme for privacy preservation based on signcrytion algorithm. the scheme ensures that the confidentiality of the message, and only the specified verifier can verified the signature correctness. Furthermore, The scheme has lower computation and communication overhead compared with current available schemes.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127049545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhance the robustness of cyber-physical systems by adding interdependency 通过增加相互依赖性来增强网络物理系统的健壮性
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004916
Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia
In this paper, we propose two dependence link addition strategies to enhance the robustness of interdependent Cyber-Physical Systems. One is based on intra-degree and receiving capability difference and the other is based on intra-degree and receiving capability ratio. Numerical simulations demonstrate that the two strategies are better than adding dependence links randomly.
本文提出了两种依赖链路相加策略来增强相互依赖的信息物理系统的鲁棒性。一种是基于学位内与接收能力差,另一种是基于学位内与接收能力比。数值仿真结果表明,这两种策略都比随机添加依赖链路要好。
{"title":"Enhance the robustness of cyber-physical systems by adding interdependency","authors":"Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia","doi":"10.1109/ISI.2017.8004916","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004916","url":null,"abstract":"In this paper, we propose two dependence link addition strategies to enhance the robustness of interdependent Cyber-Physical Systems. One is based on intra-degree and receiving capability difference and the other is based on intra-degree and receiving capability ratio. Numerical simulations demonstrate that the two strategies are better than adding dependence links randomly.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133612238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Extended abstract: Anti-DDoS technique using self-learning bloom filter 扩展摘要:基于自学习布隆滤波器的ddos防御技术
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004917
C. Y. Tseung, Kam-pui Chow, X. Zhang
DDoS attack is still one of the major threats from Internet. We propose a new technique to mitigate different types of DDoS, combining and taking advantages of both machine learning algorithms and Bloom filter. We use machine learning to extract features of attacks, then use a customized Bloom filter to defend attacks based on selected features. We implemented and tested the performance of the proposed technique in a lab environment.
DDoS攻击仍然是来自互联网的主要威胁之一。我们提出了一种新的技术来缓解不同类型的DDoS,结合并利用机器学习算法和布隆过滤器的优势。我们使用机器学习来提取攻击的特征,然后根据选择的特征使用自定义的Bloom过滤器来防御攻击。我们在实验室环境中实现并测试了所提出技术的性能。
{"title":"Extended abstract: Anti-DDoS technique using self-learning bloom filter","authors":"C. Y. Tseung, Kam-pui Chow, X. Zhang","doi":"10.1109/ISI.2017.8004917","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004917","url":null,"abstract":"DDoS attack is still one of the major threats from Internet. We propose a new technique to mitigate different types of DDoS, combining and taking advantages of both machine learning algorithms and Bloom filter. We use machine learning to extract features of attacks, then use a customized Bloom filter to defend attacks based on selected features. We implemented and tested the performance of the proposed technique in a lab environment.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125322609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analyzing multimodal public sentiment based on hierarchical semantic attentional network 基于分层语义注意网络的多模态舆情分析
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004895
Nan Xu
Public sentiment is regarded as an important measure for event detection, information security, policy making etc. Analyzing public sentiments relies more and more on large amount of multimodal contents, in contrast to the traditional text-based and image-based sentiment analysis. However, most previous works directly extract feature from image as the additional information for text modality and then merge these features for multimodal sentiment analysis. More detailed semantic information in image, like image caption which contains useful semantic components for sentiment analysis, has been ignored. In this paper, we propose a Hierarchical Semantic Attentional Network based on image caption, HSAN, for multimodal sentiment analysis. It has a hierarchical structure that reflects the hierarchical structure of tweet and uses image caption to extract visual semantic feature as the additional information for text in multimodal sentiment analysis task. We also introduce the attention with context mechanism, which learns to consider the context information for encoding. The experiments on two public available datasets show the effectiveness of our model.
公众情绪被视为事件检测、信息安全、政策制定等的重要指标。与传统的基于文本和图像的情感分析相比,舆情分析越来越依赖于大量的多模态内容。然而,以往的工作大多是直接从图像中提取特征作为文本情态的附加信息,然后将这些特征合并进行多模态情感分析。图像中更详细的语义信息,如图像标题,包含对情感分析有用的语义成分,被忽略了。本文提出了一种基于图像标题的分层语义注意网络HSAN,用于多模态情感分析。它具有层次结构,反映了tweet的层次结构,并在多模态情感分析任务中使用图像标题提取视觉语义特征作为文本的附加信息。我们还引入了上下文注意机制,该机制学习考虑上下文信息进行编码。在两个公共数据集上的实验表明了该模型的有效性。
{"title":"Analyzing multimodal public sentiment based on hierarchical semantic attentional network","authors":"Nan Xu","doi":"10.1109/ISI.2017.8004895","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004895","url":null,"abstract":"Public sentiment is regarded as an important measure for event detection, information security, policy making etc. Analyzing public sentiments relies more and more on large amount of multimodal contents, in contrast to the traditional text-based and image-based sentiment analysis. However, most previous works directly extract feature from image as the additional information for text modality and then merge these features for multimodal sentiment analysis. More detailed semantic information in image, like image caption which contains useful semantic components for sentiment analysis, has been ignored. In this paper, we propose a Hierarchical Semantic Attentional Network based on image caption, HSAN, for multimodal sentiment analysis. It has a hierarchical structure that reflects the hierarchical structure of tweet and uses image caption to extract visual semantic feature as the additional information for text in multimodal sentiment analysis task. We also introduce the attention with context mechanism, which learns to consider the context information for encoding. The experiments on two public available datasets show the effectiveness of our model.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128021319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendation 移动媒体APP用户不同感知支持维度对客户承诺和客户推荐的影响
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004893
Li Qian, Wang Xiu-cun
Because of the characteristics of the availability and practicability, mobile media technology had got a rapid development in the whole world. So, people now often use mobile devices through a mobile application (APP). Based on this, this study established a mobile application customer engagement model to carry on the investigation and research about mobile application of customers' recommendation. The results showed that mobile customer perceived support and commitment affected the continuous customer engagement, and customer commitment was the intermediary variable of customer perceived support and customer recommendation.
移动媒体技术以其可获得性和实用性的特点,在全球范围内得到了迅速的发展。因此,人们现在经常通过移动应用程序(APP)使用移动设备。基于此,本研究建立了移动应用客户参与模型,对移动应用客户推荐进行调查研究。结果表明,移动客户感知支持和承诺影响客户持续参与,客户承诺是客户感知支持和客户推荐的中介变量。
{"title":"The impact of different perceived support dimensions of mobile media APP users on customer commitment and customer recommendation","authors":"Li Qian, Wang Xiu-cun","doi":"10.1109/ISI.2017.8004893","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004893","url":null,"abstract":"Because of the characteristics of the availability and practicability, mobile media technology had got a rapid development in the whole world. So, people now often use mobile devices through a mobile application (APP). Based on this, this study established a mobile application customer engagement model to carry on the investigation and research about mobile application of customers' recommendation. The results showed that mobile customer perceived support and commitment affected the continuous customer engagement, and customer commitment was the intermediary variable of customer perceived support and customer recommendation.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128978647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of human mobility on police allocation 人口流动对警察分配的影响
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004886
Carlos Caminha, Vasco Furtado
Motivated by recent findings that human mobility influences crime behavior in big cities and that there is a superlinear relationship between the population movement and crime, this article aims to evaluate the impact of how these findings influence police allocation. More precisely, we shed light on the differences between an allocation strategy, in which the resources are distributed by clusters of floating population, and conventional allocation strategies, in which the police resources are distributed by an Administrative Area (typically based on resident population). We observed a substantial difference in the distributions of police resources allocated following these strategies, which demonstrates the imprecision of conventional police allocation methods.
由于最近发现人口流动影响大城市的犯罪行为,并且人口流动与犯罪之间存在超线性关系,本文旨在评估这些发现如何影响警察分配的影响。更准确地说,我们揭示了资源分配策略(按流动人口集群分配资源)与传统分配策略(按行政区域(通常以常住人口为基础)分配资源)之间的差异。我们观察到,按照这些策略分配的警察资源分布存在实质性差异,这表明了传统警察分配方法的不精确性。
{"title":"Impact of human mobility on police allocation","authors":"Carlos Caminha, Vasco Furtado","doi":"10.1109/ISI.2017.8004886","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004886","url":null,"abstract":"Motivated by recent findings that human mobility influences crime behavior in big cities and that there is a superlinear relationship between the population movement and crime, this article aims to evaluate the impact of how these findings influence police allocation. More precisely, we shed light on the differences between an allocation strategy, in which the resources are distributed by clusters of floating population, and conventional allocation strategies, in which the police resources are distributed by an Administrative Area (typically based on resident population). We observed a substantial difference in the distributions of police resources allocated following these strategies, which demonstrates the imprecision of conventional police allocation methods.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Topic evolution modeling in social media short texts based on recurrent semantic dependent CRP 基于循环语义依赖CRP的社交媒体短文本主题演化建模
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004885
Yuhao Zhang, W. Mao, D. Zeng
Social media has become an important platform for people to express opinions, share information and communicate with others. Detecting and tracking topics from social media can help people grasp essential information and facilitate many security-related applications. As social media texts are usually short, traditional topic evolution models built based on LDA or HDP often suffer from the data sparsity problem. Recently proposed topic evolution models are more suitable for short texts, but they need to manually specify topic number which is fixed during different time period. To address these issues, in this paper, we propose a nonparametric topic evolution model for social media short texts. We first propose the recurrent semantic dependent Chinese restaurant process (rsdCRP), which is a nonparametric process incorporating word embeddings to capture semantic similarity information. Then we combine rsdCRP with word co-occurrence modeling and build our short-text oriented topic evolution model sdTEM. We carry out experimental studies on Twitter dataset. The results demonstrate the effectiveness of our method to monitor social media topic evolution compared to the baseline methods.
社交媒体已经成为人们表达意见、分享信息和与他人交流的重要平台。从社交媒体中检测和跟踪话题可以帮助人们掌握重要信息,并促进许多与安全相关的应用。由于社交媒体文本通常较短,基于LDA或HDP构建的传统主题演化模型往往存在数据稀疏性问题。目前提出的主题演化模型更适合短文本,但需要人工指定不同时间段固定的主题数。为了解决这些问题,本文提出了一个社交媒体短文本的非参数主题演化模型。我们首先提出了递归语义依赖中餐馆过程(rsdCRP),这是一个结合词嵌入的非参数过程,以捕获语义相似信息。然后将rsdCRP与词共现建模相结合,构建了面向短文本的主题演化模型系统。我们对Twitter数据集进行了实验研究。结果表明,与基线方法相比,我们的方法监测社交媒体话题演变的有效性。
{"title":"Topic evolution modeling in social media short texts based on recurrent semantic dependent CRP","authors":"Yuhao Zhang, W. Mao, D. Zeng","doi":"10.1109/ISI.2017.8004885","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004885","url":null,"abstract":"Social media has become an important platform for people to express opinions, share information and communicate with others. Detecting and tracking topics from social media can help people grasp essential information and facilitate many security-related applications. As social media texts are usually short, traditional topic evolution models built based on LDA or HDP often suffer from the data sparsity problem. Recently proposed topic evolution models are more suitable for short texts, but they need to manually specify topic number which is fixed during different time period. To address these issues, in this paper, we propose a nonparametric topic evolution model for social media short texts. We first propose the recurrent semantic dependent Chinese restaurant process (rsdCRP), which is a nonparametric process incorporating word embeddings to capture semantic similarity information. Then we combine rsdCRP with word co-occurrence modeling and build our short-text oriented topic evolution model sdTEM. We carry out experimental studies on Twitter dataset. The results demonstrate the effectiveness of our method to monitor social media topic evolution compared to the baseline methods.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux 云中的人(MITC)攻击:Linux分析案例
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004901
Aaron Zimba, Zhaoshun Wang
Device synchronization is a new technology integrated into the cloud which has seen widespread implementation from major cloud vendors but has not been spared of attacks by MITC attacks directed towards cloud synchronization achieved via a myriad of attack vectors. These target the synchronization token which lacks authenticity validation of the token bearer. We explore MITC in Linux systems by partitioning the cloud into abstract layers and employing a conceptual finite state machine for system security modeling and attack trees for analysis. We further deduce MITC attack properties and contrast them against conventional attacks and thus recommend mitigation techniques.
设备同步是一项集成到云中的新技术,它已经被主要的云供应商广泛实施,但也未能幸免于MITC攻击,这些攻击通过无数的攻击媒介来实现云同步。这些目标是缺乏令牌持有者的真实性验证的同步令牌。我们通过将云划分为抽象层并使用概念有限状态机进行系统安全建模和攻击树进行分析来探索Linux系统中的MITC。我们进一步推断MITC攻击属性,并将其与常规攻击进行对比,从而推荐缓解技术。
{"title":"On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux","authors":"Aaron Zimba, Zhaoshun Wang","doi":"10.1109/ISI.2017.8004901","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004901","url":null,"abstract":"Device synchronization is a new technology integrated into the cloud which has seen widespread implementation from major cloud vendors but has not been spared of attacks by MITC attacks directed towards cloud synchronization achieved via a myriad of attack vectors. These target the synchronization token which lacks authenticity validation of the token bearer. We explore MITC in Linux systems by partitioning the cloud into abstract layers and employing a conceptual finite state machine for system security modeling and attack trees for analysis. We further deduce MITC attack properties and contrast them against conventional attacks and thus recommend mitigation techniques.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 IEEE International Conference on Intelligence and Security Informatics (ISI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1