首页 > 最新文献

2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)最新文献

英文 中文
Research and Application of the Test Data Visualization 测试数据可视化的研究与应用
Hui Yan, Junfeng Wang, Chensen Xia
The increasing number of test tasks lead to the rapid growth of test data. How to effectively and intuitively use the data has become the difficulty of the test data processing. Data visualization is the data is displayed by the modes of graphics and images, etc. it can effectively improve the data processing and interpretation capabilities, currently, and the data visualization has become an important means of the test data processing. Firstly, the test process, the flow of test data processing and the visualization requirements of the test data are briefly introduced. Secondly, the related technologies of the data visualization are deeply analyzed, the basic flow of data visualization, the interactive methods of data visualization and the realization tools of data visualization included. Thirdly, the types and characteristics of the test data are deeply analyzed, the basic flow the test data visualization is proposed, and the visualization of test data is presented. Lastly, for the dynamic geographical data of the test equipment, its visualization analysis and trajectory display are achieved. So, it can provide a reference for further research of the test data visualization.
测试任务的增加导致测试数据的快速增长。如何有效、直观地利用测试数据已成为测试数据处理的难点。数据可视化是将数据以图形和图像等方式显示出来,它能有效地提高数据处理和解释能力,目前,数据可视化已成为测试数据处理的重要手段。首先,简要介绍了测试过程、测试数据处理流程和测试数据的可视化要求。其次,深入分析了数据可视化的相关技术,包括数据可视化的基本流程、数据可视化的交互方法和数据可视化的实现工具;再次,深入分析了试验数据的类型和特点,提出了试验数据可视化的基本流程,并给出了试验数据可视化的实现方法。最后,对试验设备的动态地理数据进行了可视化分析和轨迹显示。从而为试验数据可视化的进一步研究提供参考。
{"title":"Research and Application of the Test Data Visualization","authors":"Hui Yan, Junfeng Wang, Chensen Xia","doi":"10.1109/DSC.2017.110","DOIUrl":"https://doi.org/10.1109/DSC.2017.110","url":null,"abstract":"The increasing number of test tasks lead to the rapid growth of test data. How to effectively and intuitively use the data has become the difficulty of the test data processing. Data visualization is the data is displayed by the modes of graphics and images, etc. it can effectively improve the data processing and interpretation capabilities, currently, and the data visualization has become an important means of the test data processing. Firstly, the test process, the flow of test data processing and the visualization requirements of the test data are briefly introduced. Secondly, the related technologies of the data visualization are deeply analyzed, the basic flow of data visualization, the interactive methods of data visualization and the realization tools of data visualization included. Thirdly, the types and characteristics of the test data are deeply analyzed, the basic flow the test data visualization is proposed, and the visualization of test data is presented. Lastly, for the dynamic geographical data of the test equipment, its visualization analysis and trajectory display are achieved. So, it can provide a reference for further research of the test data visualization.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Learning Automata Based Approach for Influence Maximization Problem on Social Networks 基于学习自动机的社交网络影响最大化问题研究
Hao Ge, Jinchao Huang, C. Di, Jianhua Li, Shenghong Li
Influence maximization problem aims at targeting a subset of entities in a network such that the influence cascade being maximized. It is proved to be a NP-hard problem, and many approximate solutions have been proposed. The state-ofart approach is known as CELF, who evaluates the marginal influence spread of each entity by Monte-Carlo simulation and picks the most influential entity in each round. However, as the cost of Monte-Carlo simulations is in proportion to the scale of network, which limits the application of CELF in real-world networks. Learning automata (LA) is a promising technique potential solution to many engineering problem. In this paper, we extend the confidence interval estimator based learning automata to S-model environment, based on this, an end-to-end approach for influence maximization is proposed, simulation on three real-world networks demonstrate that the proposed approach attains as large influence spread as CELF, and with a higher computational efficiency.
影响最大化问题的目标是网络中实体的一个子集,使影响级联最大化。它被证明是一个np困难问题,并提出了许多近似解。最先进的方法被称为CELF,它通过蒙特卡罗模拟来评估每个实体的边际影响传播,并在每一轮中选择最具影响力的实体。然而,由于蒙特卡罗模拟的成本与网络的规模成正比,这限制了CELF在现实网络中的应用。学习自动机是解决许多工程问题的一种很有前途的技术。本文将基于置信区间估计的学习自动机扩展到s模型环境,在此基础上提出了一种端到端的影响力最大化方法,在三个真实网络上的仿真表明,该方法获得了与CELF一样大的影响力传播,并且具有更高的计算效率。
{"title":"Learning Automata Based Approach for Influence Maximization Problem on Social Networks","authors":"Hao Ge, Jinchao Huang, C. Di, Jianhua Li, Shenghong Li","doi":"10.1109/DSC.2017.54","DOIUrl":"https://doi.org/10.1109/DSC.2017.54","url":null,"abstract":"Influence maximization problem aims at targeting a subset of entities in a network such that the influence cascade being maximized. It is proved to be a NP-hard problem, and many approximate solutions have been proposed. The state-ofart approach is known as CELF, who evaluates the marginal influence spread of each entity by Monte-Carlo simulation and picks the most influential entity in each round. However, as the cost of Monte-Carlo simulations is in proportion to the scale of network, which limits the application of CELF in real-world networks. Learning automata (LA) is a promising technique potential solution to many engineering problem. In this paper, we extend the confidence interval estimator based learning automata to S-model environment, based on this, an end-to-end approach for influence maximization is proposed, simulation on three real-world networks demonstrate that the proposed approach attains as large influence spread as CELF, and with a higher computational efficiency.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122522042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Extracting Topics Based on Word2Vec and Improved Jaccard Similarity Coefficient 基于Word2Vec和改进Jaccard相似系数的主题提取
Chunzi Wu, Bai Wang
To extract key topics from news articles, this paper researches into a new method to discover an efficient way to construct text vectors and improve the efficiency and accuracy of document clustering based on Word2Vec model. This paper proposes a novel algorithm, which combines Jaccard similarity coefficient and inverse dimension frequency to calculate the importance degree between each dimension in text vector and the corresponding document. Text vectors is constructed based on the importance degree and improve the accuracy of text cluster and key topics extraction. The algorithm is also implemented on MapReduce and the efficiency is improved.
为了从新闻文章中提取关键主题,本文研究了一种基于Word2Vec模型的新方法,发现了一种有效的文本向量构造方法,提高了文档聚类的效率和准确性。本文提出了一种结合Jaccard相似系数和逆维数频率来计算文本向量中各维与对应文档之间重要程度的新算法。基于重要度构造文本向量,提高了文本聚类和关键主题提取的准确性。该算法也在MapReduce上实现,提高了效率。
{"title":"Extracting Topics Based on Word2Vec and Improved Jaccard Similarity Coefficient","authors":"Chunzi Wu, Bai Wang","doi":"10.1109/DSC.2017.70","DOIUrl":"https://doi.org/10.1109/DSC.2017.70","url":null,"abstract":"To extract key topics from news articles, this paper researches into a new method to discover an efficient way to construct text vectors and improve the efficiency and accuracy of document clustering based on Word2Vec model. This paper proposes a novel algorithm, which combines Jaccard similarity coefficient and inverse dimension frequency to calculate the importance degree between each dimension in text vector and the corresponding document. Text vectors is constructed based on the importance degree and improve the accuracy of text cluster and key topics extraction. The algorithm is also implemented on MapReduce and the efficiency is improved.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127629957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Open Relation Extraction Based on Core Dependency Phrase Clustering 基于核心依赖短语聚类的开放关系提取
Chengsen Ru, Shasha Li, Jintao Tang, Yi Gao, Ting Wang
Relation extraction is very useful for many applications and has attracted much attention. The dominant prior methods for relation extraction were supervised methods which are relation-specific and limited by the availability of annotated training data. In this paper, we propose a method using hierarchical clustering to extract unbounded relations without relying on training data. The relation among entities in a sentence depends on the terms associated with the entities. Terms on the expandPath capture the relations between the entities. Given a relation, though an expandPath may have more than one dependency phrase, only the core dependency phrase describes the specific relation between the subject and the object. Our method uses heuristic rules to select the core dependency phrases and clusters entity pairs according to the similarity of the core dependency phrases in order to avoid irrelevant information and capture the semantics of the relation between entities more precisely. At last, our method automatically labels the relation clusters on basis of the semantics of core dependency phrases. The experimental results show that our method can cluster entity pairs which have the same relations more accurately and generate appropriate labels for the relations.
关系抽取在很多应用中都很有用,引起了人们的广泛关注。关系提取的主要方法是监督方法,这种方法是特定于关系的,并且受带注释的训练数据的可用性的限制。在本文中,我们提出了一种不依赖于训练数据的分层聚类方法来提取无界关系。句子中实体之间的关系取决于与实体相关联的术语。expandPath上的术语捕获实体之间的关系。对于一个关系,尽管expandPath可以有多个依赖项短语,但是只有核心依赖项短语描述了主题和对象之间的特定关系。该方法采用启发式规则,根据核心依赖短语的相似度选择核心依赖短语和聚类实体对,以避免不相关信息,更准确地捕捉实体之间关系的语义。最后,该方法根据核心依赖短语的语义对关系簇进行自动标注。实验结果表明,该方法可以更准确地聚类具有相同关系的实体对,并为这些关系生成合适的标签。
{"title":"Open Relation Extraction Based on Core Dependency Phrase Clustering","authors":"Chengsen Ru, Shasha Li, Jintao Tang, Yi Gao, Ting Wang","doi":"10.1109/DSC.2017.91","DOIUrl":"https://doi.org/10.1109/DSC.2017.91","url":null,"abstract":"Relation extraction is very useful for many applications and has attracted much attention. The dominant prior methods for relation extraction were supervised methods which are relation-specific and limited by the availability of annotated training data. In this paper, we propose a method using hierarchical clustering to extract unbounded relations without relying on training data. The relation among entities in a sentence depends on the terms associated with the entities. Terms on the expandPath capture the relations between the entities. Given a relation, though an expandPath may have more than one dependency phrase, only the core dependency phrase describes the specific relation between the subject and the object. Our method uses heuristic rules to select the core dependency phrases and clusters entity pairs according to the similarity of the core dependency phrases in order to avoid irrelevant information and capture the semantics of the relation between entities more precisely. At last, our method automatically labels the relation clusters on basis of the semantics of core dependency phrases. The experimental results show that our method can cluster entity pairs which have the same relations more accurately and generate appropriate labels for the relations.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127719590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predicting the Popularity of News Based on Competitive Matrix 基于竞争矩阵的新闻流行度预测
Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu
With the rapid development of network, more and more people share and comment on the web to express their mends. How to predict the popularity of topic happening recently is a hot topic and lots of people are trying to find out the law of information diffusion hidden in it. However, many models assume that information spreads with no external interference in social networks. The research on competitive diffusion is still at the primary stage. The main contribution is to solve the problem that there are few or no work for popularity prediction based on multi-information, and propose a predicting model based on competitive matrix. The goal of this paper is to accurately estimate the popularity for a given viral topic at final based on the observation of historical popularity of the topic. And this model is mainly based on the competitive matrix and gradient descent method. Also, the capability of this method provides a better performance in the popularity prediction according to an empirical study on Tencent News.
随着网络的快速发展,越来越多的人在网上分享和评论来表达他们的想法。如何预测近期热点话题的流行程度是一个热门话题,很多人都在试图从中发现隐藏在其中的信息扩散规律。然而,许多模型假设信息在社交网络中传播时没有外部干扰。竞争扩散的研究还处于初级阶段。主要贡献是解决了基于多信息的流行度预测工作很少或没有的问题,提出了一种基于竞争矩阵的预测模型。本文的目标是在观察一个给定的病毒话题的历史流行度的基础上,准确地估计该话题的流行度。该模型主要基于竞争矩阵和梯度下降法。通过对腾讯新闻的实证研究表明,该方法在人气预测方面具有较好的性能。
{"title":"Predicting the Popularity of News Based on Competitive Matrix","authors":"Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu","doi":"10.1109/DSC.2017.88","DOIUrl":"https://doi.org/10.1109/DSC.2017.88","url":null,"abstract":"With the rapid development of network, more and more people share and comment on the web to express their mends. How to predict the popularity of topic happening recently is a hot topic and lots of people are trying to find out the law of information diffusion hidden in it. However, many models assume that information spreads with no external interference in social networks. The research on competitive diffusion is still at the primary stage. The main contribution is to solve the problem that there are few or no work for popularity prediction based on multi-information, and propose a predicting model based on competitive matrix. The goal of this paper is to accurately estimate the popularity for a given viral topic at final based on the observation of historical popularity of the topic. And this model is mainly based on the competitive matrix and gradient descent method. Also, the capability of this method provides a better performance in the popularity prediction according to an empirical study on Tencent News.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DPLK-Means: A Novel Differential Privacy K-Means Mechanism DPLK-Means:一种新的差分隐私K-Means机制
Jun Ren, Jinbo Xiong, Zhiqiang Yao, Rong Ma, Mingwei Lin
K-means algorithm is an important type of clustering algorithm and the foundation of some data mining methods. But it has the risk of privacy disclosure in the process of clustering. In order to solve this problem, Blum et al. proposed a differential privacy K-means algorithm, which can prevent privacy disclosure effectively. However, the availability of clustering results is reduced due to the added noise. In this paper, we propose a novel DPLK-means algorithm based on differential privacy, which improves the selection of the initial center points through performing the differential privacy K-means algorithm to each subset divided by the original dataset. Performance evaluation shows that our algorithm improves the availability of clustering results compared to the existing differential privacy K-means algorithm at the same privacy level.
K-means算法是一种重要的聚类算法,是一些数据挖掘方法的基础。但在聚类过程中存在隐私泄露的风险。为了解决这一问题,Blum等人提出了一种差分隐私K-means算法,可以有效地防止隐私泄露。然而,由于噪声的增加,聚类结果的可用性降低。本文提出了一种新的基于差分隐私的DPLK-means算法,该算法通过对原始数据集划分的每个子集执行差分隐私K-means算法,改进了初始中心点的选择。性能评估表明,在相同隐私级别下,与现有的差分隐私K-means算法相比,我们的算法提高了聚类结果的可用性。
{"title":"DPLK-Means: A Novel Differential Privacy K-Means Mechanism","authors":"Jun Ren, Jinbo Xiong, Zhiqiang Yao, Rong Ma, Mingwei Lin","doi":"10.1109/DSC.2017.64","DOIUrl":"https://doi.org/10.1109/DSC.2017.64","url":null,"abstract":"K-means algorithm is an important type of clustering algorithm and the foundation of some data mining methods. But it has the risk of privacy disclosure in the process of clustering. In order to solve this problem, Blum et al. proposed a differential privacy K-means algorithm, which can prevent privacy disclosure effectively. However, the availability of clustering results is reduced due to the added noise. In this paper, we propose a novel DPLK-means algorithm based on differential privacy, which improves the selection of the initial center points through performing the differential privacy K-means algorithm to each subset divided by the original dataset. Performance evaluation shows that our algorithm improves the availability of clustering results compared to the existing differential privacy K-means algorithm at the same privacy level.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
CPS Information Security Risk Evaluation System Based on Petri Net 基于Petri网的CPS信息安全风险评估体系
Yonggui Fu, Jian-ming Zhu, Sheng Gao
Cyber Physical Systems(CPS) have achieved attention, research and applications from the governments, academic circles, industry circles of domestic and foreign, so, CPS have become an important content of China's two modernizations' deeply integration in future. Using Petri net model to describe CPS information security risk evaluation process. Colligating Petri net model analysis results and CPS information security risk evaluation related big data analysis results, to confirm CPS information security risk evaluation element index system and index weight value, and further by using RBF neural network model construct evaluation model to realize CPS information security risk's quantitative evaluation. The Petri net model constructed in the paper can realize the correlation relation analysis among CPS information security risk evaluation elements, and the description for system risk has the characteristics of temporality, integrity, diversification etc. The constructed index system and its weights have the characteristic of dynamic adaptability with the diversification of CPS information security risk evaluation related big data, that are according with the complexity and dynamic structure of CPS. The paper research has guide function to CPS information security risk evaluation, and has important practical significance and application value.
网络物理系统(Cyber Physical Systems, CPS)得到了国内外政府、学术界、产业界的重视、研究和应用,已成为未来中国两个现代化深度融合的重要内容。利用Petri网模型描述CPS信息安全风险评估过程。综合Petri网模型分析结果和CPS信息安全风险评价相关大数据分析结果,确定CPS信息安全风险评价要素指标体系和指标权重值,并进一步利用RBF神经网络模型构建评价模型,实现CPS信息安全风险的定量评价。本文构建的Petri网模型能够实现CPS信息安全风险评价要素之间的相关关系分析,对系统风险的描述具有时段性、完整性、多样化等特点。所构建的指标体系及其权重与CPS信息安全风险评估相关大数据的多样性相适应,符合CPS的复杂性和动态性结构。本文的研究对CPS信息安全风险评估具有指导作用,具有重要的现实意义和应用价值。
{"title":"CPS Information Security Risk Evaluation System Based on Petri Net","authors":"Yonggui Fu, Jian-ming Zhu, Sheng Gao","doi":"10.1109/DSC.2017.65","DOIUrl":"https://doi.org/10.1109/DSC.2017.65","url":null,"abstract":"Cyber Physical Systems(CPS) have achieved attention, research and applications from the governments, academic circles, industry circles of domestic and foreign, so, CPS have become an important content of China's two modernizations' deeply integration in future. Using Petri net model to describe CPS information security risk evaluation process. Colligating Petri net model analysis results and CPS information security risk evaluation related big data analysis results, to confirm CPS information security risk evaluation element index system and index weight value, and further by using RBF neural network model construct evaluation model to realize CPS information security risk's quantitative evaluation. The Petri net model constructed in the paper can realize the correlation relation analysis among CPS information security risk evaluation elements, and the description for system risk has the characteristics of temporality, integrity, diversification etc. The constructed index system and its weights have the characteristic of dynamic adaptability with the diversification of CPS information security risk evaluation related big data, that are according with the complexity and dynamic structure of CPS. The paper research has guide function to CPS information security risk evaluation, and has important practical significance and application value.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
File-Based Encryption with SM4 基于文件的加密与SM4
Chan Gao, Chung-Huang Yang
Mobile phones have been developed from the general communication equipment to smart phones. People also use the phone from simply keeping in touch to storing more communication details and privacy. Nowadays, Android has became the most widely used operating system. Google proposed FDE (full disk encryption) in Android 5.0, 2014, and FBE (file-based encryption) in Android 7.0, 2016, to protect the user data from being stolen. This study introduces the the domestic encryption algorithm SM4, and through the AOSP (Android Open Source Project) to make it in Android kernel to achieve a rapid and complete "optional" file encryption to reflect the more humane way of operation.
手机已经从一般的通讯设备发展到智能手机。人们使用手机也不再仅仅是保持联系,而是存储更多的通信细节和隐私。如今,Android已经成为使用最广泛的操作系统。谷歌在2014年的Android 5.0中提出了FDE(全磁盘加密),在2016年的Android 7.0中提出了FBE(基于文件的加密),以保护用户数据不被窃取。本研究介绍了国内的加密算法SM4,并通过AOSP (Android Open Source Project)使其在Android内核中实现快速完整的“可选”文件加密,体现出更人性化的操作方式。
{"title":"File-Based Encryption with SM4","authors":"Chan Gao, Chung-Huang Yang","doi":"10.1109/DSC.2017.92","DOIUrl":"https://doi.org/10.1109/DSC.2017.92","url":null,"abstract":"Mobile phones have been developed from the general communication equipment to smart phones. People also use the phone from simply keeping in touch to storing more communication details and privacy. Nowadays, Android has became the most widely used operating system. Google proposed FDE (full disk encryption) in Android 5.0, 2014, and FBE (file-based encryption) in Android 7.0, 2016, to protect the user data from being stolen. This study introduces the the domestic encryption algorithm SM4, and through the AOSP (Android Open Source Project) to make it in Android kernel to achieve a rapid and complete \"optional\" file encryption to reflect the more humane way of operation.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130713622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EMMBTT: A Novel Event Evolution Model Based on TFxIEF and TDC in Tracking News Streams EMMBTT:一种基于txief和TDC的新闻流跟踪事件演化模型
Pengpeng Zhou, Bin Wu, Zhen Cao
With the popularity of the Internet, online news media are pouring numerous of news reports into the Internet every day. People get lost in the information explosion. Although the existing methods are able to extract news reports according to key words, and aggregate news reports into stories or events, they just list the related reports or events in order. Moreover, they are unable to provide the evolution relationships between events within a topic, thus people hardly capture the events development vein. In order to mine the underlying evolution relationships between events within the topic, we propose a novel event evolution Model in this paper. This model utilizes TFIEF and Temporal Distance Cost factor (TDC) to model the event evolution relationships. we construct event evolution relationships map to show the events development vein. The experimental evaluation on real dataset show that our technique precedes the baseline technique.
随着互联网的普及,网络新闻媒体每天都在向互联网上倾泻大量的新闻报道。人们在信息爆炸中迷失。虽然现有的方法能够根据关键词提取新闻报道,将新闻报道聚合成故事或事件,但它们只是将相关的报道或事件按顺序列出来。此外,它们无法提供主题内事件之间的演化关系,因此人们很难捕捉到事件的发展脉络。为了挖掘主题中事件之间的潜在演化关系,本文提出了一种新的事件演化模型。该模型利用TFIEF和时间距离成本因子(TDC)对事件演化关系进行建模。通过构建事件演化关系图来显示事件的发展脉络。在实际数据集上的实验评估表明,我们的技术优于基线技术。
{"title":"EMMBTT: A Novel Event Evolution Model Based on TFxIEF and TDC in Tracking News Streams","authors":"Pengpeng Zhou, Bin Wu, Zhen Cao","doi":"10.1109/DSC.2017.53","DOIUrl":"https://doi.org/10.1109/DSC.2017.53","url":null,"abstract":"With the popularity of the Internet, online news media are pouring numerous of news reports into the Internet every day. People get lost in the information explosion. Although the existing methods are able to extract news reports according to key words, and aggregate news reports into stories or events, they just list the related reports or events in order. Moreover, they are unable to provide the evolution relationships between events within a topic, thus people hardly capture the events development vein. In order to mine the underlying evolution relationships between events within the topic, we propose a novel event evolution Model in this paper. This model utilizes TFIEF and Temporal Distance Cost factor (TDC) to model the event evolution relationships. we construct event evolution relationships map to show the events development vein. The experimental evaluation on real dataset show that our technique precedes the baseline technique.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115861660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cyberspace-Oriented Access Control: Model and Policies 面向网络空间的访问控制:模型和策略
Fenghua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo
With the rapid development of information technologies, our daily life has become deeply dependent on cyberspace. The new technologies provide more facilities and enhancements to the existing Internet services as it allows users more flexibility in terms of exploring webpages, sending messages or publishing tweets via cell phones or laptops. However, there are many security issues such as security policy definition and security policy enforcement of current cyberspace. In this paper, we study information access problems in cyberspace where users leverage devices via the Internet to access sensitive objects with temporal and spatial limitations. We propose a Cyberspace-oriented Access Control model (CoAC) to ensure the security of the mentioned accesses in cyberspace. The proposed model consists of seven atomic operations, such as Read, Write, Store, Execute, Publish, Forward and Select, which can denote all operations by the combination of several atomic operations in cyberspace. For each atomic operation, we assemble a suite of security policies and demonstrate its flexibility. By that, a series of security policies are denfined for CoAC.
随着信息技术的飞速发展,我们的日常生活已经深深地依赖于网络空间。新技术为现有的互联网服务提供了更多的设施和增强功能,因为它允许用户更灵活地通过手机或笔记本电脑浏览网页、发送信息或发布推文。然而,当前网络空间存在许多安全问题,如安全策略的定义和安全策略的实施。在本文中,我们研究了网络空间中的信息访问问题,其中用户通过互联网利用设备访问具有时间和空间限制的敏感对象。我们提出了一种面向网络空间的访问控制模型(CoAC),以确保上述网络空间访问的安全性。该模型由读、写、存储、执行、发布、转发和选择等7个原子操作组成,可以通过网络空间中几个原子操作的组合来表示所有操作。对于每个原子操作,我们组装一套安全策略并演示其灵活性。这样,就为CoAC定义了一系列安全策略。
{"title":"Cyberspace-Oriented Access Control: Model and Policies","authors":"Fenghua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo","doi":"10.1109/DSC.2017.100","DOIUrl":"https://doi.org/10.1109/DSC.2017.100","url":null,"abstract":"With the rapid development of information technologies, our daily life has become deeply dependent on cyberspace. The new technologies provide more facilities and enhancements to the existing Internet services as it allows users more flexibility in terms of exploring webpages, sending messages or publishing tweets via cell phones or laptops. However, there are many security issues such as security policy definition and security policy enforcement of current cyberspace. In this paper, we study information access problems in cyberspace where users leverage devices via the Internet to access sensitive objects with temporal and spatial limitations. We propose a Cyberspace-oriented Access Control model (CoAC) to ensure the security of the mentioned accesses in cyberspace. The proposed model consists of seven atomic operations, such as Read, Write, Store, Execute, Publish, Forward and Select, which can denote all operations by the combination of several atomic operations in cyberspace. For each atomic operation, we assemble a suite of security policies and demonstrate its flexibility. By that, a series of security policies are denfined for CoAC.","PeriodicalId":427998,"journal":{"name":"2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127471535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1