首页 > 最新文献

2017 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

英文 中文
Ranking events based on user relevant query 基于用户相关查询对事件进行排行
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004889
Xiangfei Kong, W. Mao
Given a collection of event-related documents, event ranking generates a list of ranked events based on the input query. Ranking news events, which takes event related news documents for the generation of ranked events, is both an essential research issue and important component for many security oriented applications, such as public event monitoring, retrieval, detection and mining. Previous related work solely relies on queries of event relevant aspects, and user relevant aspects of queries that are critical for security applications are totally ignored. In this paper, we deal with the problem of news ranking by incorporating user relevant information into the input query, from the cluster of relevant new documents and comments. Given an input query, which contains event related objective aspects(e.g. actors, locations, date) and user related subjective aspects(e.g. public attention and opinion polarity), we develop a Learning-to-Rank framework to integrate aspect-level correlation between query and event. Experiments on a crawled large news corpus show the effectiveness of our proposed approach compared to several baseline models.
给定一组与事件相关的文档,事件排序会根据输入查询生成一个排序事件列表。新闻事件排序是利用与事件相关的新闻文档生成排序事件,是公共事件监控、检索、检测和挖掘等面向安全的应用中必不可少的研究问题和重要组成部分。以前的相关工作仅仅依赖于事件相关方面的查询,而对安全应用程序至关重要的查询的用户相关方面完全被忽略了。在本文中,我们通过将用户相关信息从相关的新文档和评论聚类中纳入到输入查询中来处理新闻排名问题。给定一个输入查询,其中包含与事件相关的客观方面(例如:演员、地点、日期)和用户相关的主观方面(例如:公众关注和意见极性),我们开发了一个学习排序框架来整合查询和事件之间的方面级相关性。在爬行的大型新闻语料库上的实验表明,与几种基线模型相比,我们提出的方法是有效的。
{"title":"Ranking events based on user relevant query","authors":"Xiangfei Kong, W. Mao","doi":"10.1109/ISI.2017.8004889","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004889","url":null,"abstract":"Given a collection of event-related documents, event ranking generates a list of ranked events based on the input query. Ranking news events, which takes event related news documents for the generation of ranked events, is both an essential research issue and important component for many security oriented applications, such as public event monitoring, retrieval, detection and mining. Previous related work solely relies on queries of event relevant aspects, and user relevant aspects of queries that are critical for security applications are totally ignored. In this paper, we deal with the problem of news ranking by incorporating user relevant information into the input query, from the cluster of relevant new documents and comments. Given an input query, which contains event related objective aspects(e.g. actors, locations, date) and user related subjective aspects(e.g. public attention and opinion polarity), we develop a Learning-to-Rank framework to integrate aspect-level correlation between query and event. Experiments on a crawled large news corpus show the effectiveness of our proposed approach compared to several baseline models.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An end-to-end model for Android malware detection Android恶意软件检测的端到端模型
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004891
Hongliang Liang, Yan Song, Da Xiao
Malware detection has been a difficult problem for a very long time. Since the wide use of smart devices in recent years, the number of malwares is increasing rapidly. Most existing methods for malware detection rely too much on manual interventions (e.g. pre-defined features and patterns), which can be easily deceived. In this paper, we propose a novel end-to-end deep learning model to detect Android malwares. Our model takes the raw system call sequence, which is generated during the application's runtime, as input and decides whether the sequence is malicious without any manual intervention. We evaluate the model on 14231 Android applications and obtain a detection accuracy of 93.16%, which is 2.81% higher than the contrast experiment in which we implement the method proposed by other researchers.
长期以来,恶意软件检测一直是一个难题。近年来,随着智能设备的广泛使用,恶意软件的数量也在迅速增加。大多数现有的恶意软件检测方法过于依赖于人工干预(例如预定义的特征和模式),这很容易被欺骗。在本文中,我们提出了一种新的端到端深度学习模型来检测Android恶意软件。我们的模型将在应用程序运行期间生成的原始系统调用序列作为输入,并在没有任何人工干预的情况下决定该序列是否为恶意调用。我们在14231个Android应用上对该模型进行了评估,获得了93.16%的检测准确率,比其他研究人员提出的方法的对比实验提高了2.81%。
{"title":"An end-to-end model for Android malware detection","authors":"Hongliang Liang, Yan Song, Da Xiao","doi":"10.1109/ISI.2017.8004891","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004891","url":null,"abstract":"Malware detection has been a difficult problem for a very long time. Since the wide use of smart devices in recent years, the number of malwares is increasing rapidly. Most existing methods for malware detection rely too much on manual interventions (e.g. pre-defined features and patterns), which can be easily deceived. In this paper, we propose a novel end-to-end deep learning model to detect Android malwares. Our model takes the raw system call sequence, which is generated during the application's runtime, as input and decides whether the sequence is malicious without any manual intervention. We evaluate the model on 14231 Android applications and obtain a detection accuracy of 93.16%, which is 2.81% higher than the contrast experiment in which we implement the method proposed by other researchers.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing 小波变换和无监督机器学习检测云文件共享中的内部威胁
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004896
Wangyan Feng, W. Yan, Shuning Wu, Ningwei Liu
As increasingly more enterprises are deploying cloud file-sharing services, this adds a new channel for potential insider threats to company data and IPs. In this paper, we introduce a two-stage machine learning system to detect anomalies. In the first stage, we project the access logs of cloud file-sharing services onto relationship graphs and use three complementary graph-based unsupervised learning methods: OddBall, PageRank and Local Outlier Factor (LOF) to generate outlier indicators. In the second stage, we ensemble the outlier indicators and introduce the discrete wavelet transform (DWT) method, and propose a procedure to use wavelet coefficients with the Haar wavelet function to identify outliers for insider threat. The proposed system has been deployed in a real business environment, and demonstrated effectiveness by selected case studies.
随着越来越多的企业部署云文件共享服务,这为公司数据和ip的潜在内部威胁增加了一个新的渠道。在本文中,我们介绍了一个两阶段的机器学习系统来检测异常。在第一阶段,我们将云文件共享服务的访问日志投影到关系图上,并使用三种互补的基于图的无监督学习方法:OddBall、PageRank和Local Outlier Factor (LOF)来生成离群指标。第二阶段,引入离散小波变换(DWT)方法对异常值指标进行集成,提出了一种基于Haar小波函数的小波系数识别内部威胁异常值的方法。建议的系统已在实际商业环境中部署,并通过选定的案例研究证明了其有效性。
{"title":"Wavelet transform and unsupervised machine learning to detect insider threat on cloud file-sharing","authors":"Wangyan Feng, W. Yan, Shuning Wu, Ningwei Liu","doi":"10.1109/ISI.2017.8004896","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004896","url":null,"abstract":"As increasingly more enterprises are deploying cloud file-sharing services, this adds a new channel for potential insider threats to company data and IPs. In this paper, we introduce a two-stage machine learning system to detect anomalies. In the first stage, we project the access logs of cloud file-sharing services onto relationship graphs and use three complementary graph-based unsupervised learning methods: OddBall, PageRank and Local Outlier Factor (LOF) to generate outlier indicators. In the second stage, we ensemble the outlier indicators and introduce the discrete wavelet transform (DWT) method, and propose a procedure to use wavelet coefficients with the Haar wavelet function to identify outliers for insider threat. The proposed system has been deployed in a real business environment, and demonstrated effectiveness by selected case studies.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120810081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Research on high-resolution imaging technology to extract the halftone-dot-information by iPhone iPhone提取半色调点信息的高分辨率成像技术研究
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004915
Lu Luo, Peng Cao, Dazhong Mu
The data hiding technique based on halftone dot features (spatial position or shape) has a special anti-copy function. However, this function has a very strict demand for image acquisition and authenticity identification. We provide a high-resolution imaging control technology of the macro mode for iPhones based on Xcode tool and ZXing Jar. At the same time, an image resolution estimation algorithm is proposed based on the method of least squares.
基于半色调网点特征(空间位置或形状)的数据隐藏技术具有特殊的防复制功能。但是,该功能对图像采集和真伪鉴定有非常严格的要求。我们提供了一种基于Xcode工具和ZXing Jar的iphone宏模式高分辨率成像控制技术。同时,提出了一种基于最小二乘法的图像分辨率估计算法。
{"title":"Research on high-resolution imaging technology to extract the halftone-dot-information by iPhone","authors":"Lu Luo, Peng Cao, Dazhong Mu","doi":"10.1109/ISI.2017.8004915","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004915","url":null,"abstract":"The data hiding technique based on halftone dot features (spatial position or shape) has a special anti-copy function. However, this function has a very strict demand for image acquisition and authenticity identification. We provide a high-resolution imaging control technology of the macro mode for iPhones based on Xcode tool and ZXing Jar. At the same time, an image resolution estimation algorithm is proposed based on the method of least squares.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134116308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android app protection using same identifier attack defensor Android应用保护使用相同标识攻击防御
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004914
Jin-Seong Kim, I. Jung
Android app is often used at multiple devices of one user. Sometimes, an app recognizes another device to be the same device which it has known, and bypasses its authentication process. As a result, an attacker can get the same privilege as the original device owner has for the app. In this paper, we show how to get the privilege of the device owner in Android app and how to defend against the attack by Same Identifier Attack Defensor.
Android应用程序通常在一个用户的多个设备上使用。有时,一个应用程序将另一个设备识别为它所知道的同一设备,并绕过其身份验证过程。因此,攻击者可以获得与应用程序的原始设备所有者相同的权限。在本文中,我们展示了如何在Android应用程序中获得设备所有者的权限以及如何防御相同标识符攻击防御器的攻击。
{"title":"Android app protection using same identifier attack defensor","authors":"Jin-Seong Kim, I. Jung","doi":"10.1109/ISI.2017.8004914","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004914","url":null,"abstract":"Android app is often used at multiple devices of one user. Sometimes, an app recognizes another device to be the same device which it has known, and bypasses its authentication process. As a result, an attacker can get the same privilege as the original device owner has for the app. In this paper, we show how to get the privilege of the device owner in Android app and how to defend against the attack by Same Identifier Attack Defensor.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on the relationship between informatization level and global competitiveness 信息化水平与全球竞争力关系研究
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004911
Tian Beibei, Zheng Feifei, Cao Yuqi
This paper analyzed the relationship between Networked Readiness Index and Global Competitiveness Index published by the World Economic Forum through regression model. It is verified that the global competitiveness of a country is closely related to its degree of informatization. So in the context of China's “new normal”, keeping rapid development in information technology may help China to keep the rapid development in global competitiveness.
本文通过回归模型分析了世界经济论坛发布的网络准备指数与全球竞争力指数之间的关系。事实证明,一个国家的全球竞争力与其信息化程度密切相关。因此,在中国“新常态”的背景下,保持信息技术的快速发展可能有助于中国在全球竞争力中保持快速发展。
{"title":"Research on the relationship between informatization level and global competitiveness","authors":"Tian Beibei, Zheng Feifei, Cao Yuqi","doi":"10.1109/ISI.2017.8004911","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004911","url":null,"abstract":"This paper analyzed the relationship between Networked Readiness Index and Global Competitiveness Index published by the World Economic Forum through regression model. It is verified that the global competitiveness of a country is closely related to its degree of informatization. So in the context of China's “new normal”, keeping rapid development in information technology may help China to keep the rapid development in global competitiveness.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128188030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time prediction of meme burst 模因爆发的实时预测
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004900
Jie Bai, Linjing Li, Lan Lu, Yanwu Yang, D. Zeng
Predicting meme burst is of great relevance to develop security-related detecting and early warning capabilities. In this paper, we propose a feature-based method for real-time meme burst predictions, namely “Semantic, Network, and Time” (SNAT). By considering the potential characteristics of bursty memes, such as the semantics and spatio-temporal characteristics during their propagation, SNAT is capable of capturing meme burst at the very beginning and in real time. Experimental results prove the effectiveness of SNAT in terms of both fixed-time and real-time meme burst prediction tasks.
预测模因爆发对于发展安全相关的检测和预警能力具有重要意义。在本文中,我们提出了一种基于特征的实时模因爆发预测方法,即“语义、网络和时间”(SNAT)。SNAT通过考虑突发模因在传播过程中的语义特征和时空特征等潜在特征,能够在最开始和实时地捕捉到突发模因。实验结果证明了SNAT在固定时间和实时模因爆发预测任务中的有效性。
{"title":"Real-time prediction of meme burst","authors":"Jie Bai, Linjing Li, Lan Lu, Yanwu Yang, D. Zeng","doi":"10.1109/ISI.2017.8004900","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004900","url":null,"abstract":"Predicting meme burst is of great relevance to develop security-related detecting and early warning capabilities. In this paper, we propose a feature-based method for real-time meme burst predictions, namely “Semantic, Network, and Time” (SNAT). By considering the potential characteristics of bursty memes, such as the semantics and spatio-temporal characteristics during their propagation, SNAT is capable of capturing meme burst at the very beginning and in real time. Experimental results prove the effectiveness of SNAT in terms of both fixed-time and real-time meme burst prediction tasks.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129180893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A new approach to security informatics: Actionable behavioral rules mining (ABRM) 一种新的安全信息学方法:可操作行为规则挖掘(ABRM)
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004910
Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li
Among the most important and distinctive actionable knowledge are actionable behavioral rules (ABRs). To make ABRM a promising technique for security informatics, we develop new methodologies for it. We also conduct an experiment to validate our approach. The experimental results strongly suggest the validity of our approach.
其中最重要和最独特的可操作知识是可操作行为规则(abr)。为了使ABRM成为一种有前景的安全信息学技术,我们开发了新的方法。我们还进行了一个实验来验证我们的方法。实验结果有力地证明了该方法的有效性。
{"title":"A new approach to security informatics: Actionable behavioral rules mining (ABRM)","authors":"Peng Su, Yuqin Zhao, Jian Yang, Zhenpeng Li","doi":"10.1109/ISI.2017.8004910","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004910","url":null,"abstract":"Among the most important and distinctive actionable knowledge are actionable behavioral rules (ABRs). To make ABRM a promising technique for security informatics, we develop new methodologies for it. We also conduct an experiment to validate our approach. The experimental results strongly suggest the validity of our approach.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering and monitoring edge behaviour in enterprise network traffic
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004870
Christopher Schon, N. Adams, M. Evangelou
This paper takes an unsupervised learning approach for monitoring edge activity within an enterprise computer network. Using NetFlow records, features are gathered across the active connections (edges) in 15-minute time windows. Then, edges are grouped into clusters using the k-means algorithm. This process is repeated over contiguous windows. A series of informative indicators are derived by examining the relationship of edges with the observed cluster structure. This leads to an intuitive method for monitoring network behaviour and a temporal description of edge behaviour at global and local levels.
本文采用一种无监督学习方法来监测企业计算机网络中的边缘活动。使用NetFlow记录,可以在15分钟的时间窗口内收集活动连接(边缘)的特征。然后,使用k-means算法将边缘分组成簇。这个过程在连续的窗口上重复。通过检查边缘与观察到的簇结构的关系,推导出一系列信息指标。这导致了一个直观的方法来监测网络行为和边缘行为的时间描述在全球和局部水平。
{"title":"Clustering and monitoring edge behaviour in enterprise network traffic","authors":"Christopher Schon, N. Adams, M. Evangelou","doi":"10.1109/ISI.2017.8004870","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004870","url":null,"abstract":"This paper takes an unsupervised learning approach for monitoring edge activity within an enterprise computer network. Using NetFlow records, features are gathered across the active connections (edges) in 15-minute time windows. Then, edges are grouped into clusters using the k-means algorithm. This process is repeated over contiguous windows. A series of informative indicators are derived by examining the relationship of edges with the observed cluster structure. This leads to an intuitive method for monitoring network behaviour and a temporal description of edge behaviour at global and local levels.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132923360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An attention-based neural popularity prediction model for social media events 基于注意力的社交媒体事件人气神经预测模型
Pub Date : 2017-07-01 DOI: 10.1109/ISI.2017.8004898
Guandan Chen, Qingchao Kong, W. Mao
Online interaction behavior between web users often makes some events go viral. Popularity prediction of events is a key task in many security related applications. It forecasts how widely events would spread based on the information of evolution at an early stage. Existing methods either rely on careful feature engineering, or solely consider time series, ignoring rich information of user and text content. In this paper, we attempt to extract and fuse the rich information of text content, user and time series in a data-driven fashion. To this end, we design a popularity prediction model based on deep neural networks, which uses three encoders to extract high-level representation of text content, users and time series respectively. In addition, we incorporate attention mechanism to make our model focus on important features. Experiments on real world dataset show the effectiveness of our proposed model.
网络用户之间的在线互动行为往往会使一些事件像病毒一样传播开来。在许多与安全相关的应用程序中,事件流行度预测是一项关键任务。它根据早期进化的信息来预测事件的传播范围。现有的方法要么依赖于细致的特征工程,要么只考虑时间序列,忽略了用户和文本内容的丰富信息。在本文中,我们试图以数据驱动的方式提取和融合文本内容、用户和时间序列的丰富信息。为此,我们设计了一个基于深度神经网络的流行度预测模型,该模型使用三种编码器分别提取文本内容、用户和时间序列的高级表示。此外,我们加入了注意机制,使我们的模型专注于重要的特征。在实际数据集上的实验表明了该模型的有效性。
{"title":"An attention-based neural popularity prediction model for social media events","authors":"Guandan Chen, Qingchao Kong, W. Mao","doi":"10.1109/ISI.2017.8004898","DOIUrl":"https://doi.org/10.1109/ISI.2017.8004898","url":null,"abstract":"Online interaction behavior between web users often makes some events go viral. Popularity prediction of events is a key task in many security related applications. It forecasts how widely events would spread based on the information of evolution at an early stage. Existing methods either rely on careful feature engineering, or solely consider time series, ignoring rich information of user and text content. In this paper, we attempt to extract and fuse the rich information of text content, user and time series in a data-driven fashion. To this end, we design a popularity prediction model based on deep neural networks, which uses three encoders to extract high-level representation of text content, users and time series respectively. In addition, we incorporate attention mechanism to make our model focus on important features. Experiments on real world dataset show the effectiveness of our proposed model.","PeriodicalId":423696,"journal":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134018650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2017 IEEE International Conference on Intelligence and Security Informatics (ISI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1