2019 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

筛选
英文 中文
A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address 基于sdn的IPv6地址分级认证机制
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823463
X. Liang, Heyao Chen
{"title":"A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address","authors":"X. Liang, Heyao Chen","doi":"10.1109/ISI.2019.8823463","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823463","url":null,"abstract":"The emergence of IPv6 protocol extends the address pool, but it also exposes all the Internet-connected devices to danger. Currently, there are some traditional schemes on security management of network addresses, such as prevention, traceability and encryption authentication, but few studies work on IPv6 protocol. In this paper, we propose a hierarchical authentication mechanism for the IPv6 source address with the technology of software defined network (SDN). This mechanism combines the authentication of three parts, namely the access network, the intra-domain and the inter-domain. And it can provide a fine-grained security protection for the devices using IPv6 addresses.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117279474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Deceptive Tweets in Arabic for Cyber-Security 为网络安全检测阿拉伯语欺骗性推文
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823378
F. M. R. Pardo, Paolo Rosso, A. Charfi, W. Zaghouani
{"title":"Detecting Deceptive Tweets in Arabic for Cyber-Security","authors":"F. M. R. Pardo, Paolo Rosso, A. Charfi, W. Zaghouani","doi":"10.1109/ISI.2019.8823378","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823378","url":null,"abstract":"In the framework of the QNRF project on Arabic Author Profiling for Cyber-Security, we addressed deception detection in Arabic in order to discard those messages that do not really represent potential threats. We have applied the Low Dimensionality Statistical Embedding (LDSE) method to several corpora for Arabic including the Arabic credibility corpus and two new corpora that we created: the Qatar Twitter corpus and the Qatar News corpus. We achieved a performance of 0.797 Macro F-measure on the Arabic Credibility corpus. The obtained results with two well-known distributed representations, namely Continuous Bag of Words and Skip Grams, showed the competitiveness of our approach. The LDSE approach gave similar results on the two corpora that we created. We evaluated our work in a cross-genre scenario, showing the robustness of LDSE when there are enough data about similar topics.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Leverage Temporal Convolutional Network for the Representation Learning of URLs 利用时间卷积网络进行url的表示学习
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823362
Yunji Liang, Jian Kang, Zhiwen Yu, Bin Guo, Xiaolong Zheng, Saike He
{"title":"Leverage Temporal Convolutional Network for the Representation Learning of URLs","authors":"Yunji Liang, Jian Kang, Zhiwen Yu, Bin Guo, Xiaolong Zheng, Saike He","doi":"10.1109/ISI.2019.8823362","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823362","url":null,"abstract":"Cyber crimes including computer virus/malwares, spam, illegal sales, and phishing websites are proliferated aggressively via the disguised Uniform Resource Locators (URL). Although numerous studies were conducted for the URL classification task, the traditional URL classification solutions retreated due to the hand-crafted feature engineering and the boom of newly generated URLs. In this paper, we study the representation learning of URLs, and explore the URL classification using deep learning. Specifically, we propose URL2vec to extract both the structural and lexical features of URLs, and apply temporal convolutional network (TCN) for the URL classification task. The experimental results show that URL2vec outperforms both word2vec and character-level embedding for URL representation, and TCN achieves the best performance than baselines with the precision up to 95.97%.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Role-based Static Desensitization Protection Method 基于角色的静态脱敏保护方法
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823514
Tan Hu State, Jianfei Chen, Wenting Wang, Hao Zhang
{"title":"Role-based Static Desensitization Protection Method","authors":"Tan Hu State, Jianfei Chen, Wenting Wang, Hao Zhang","doi":"10.1109/ISI.2019.8823514","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823514","url":null,"abstract":"This paper studies the role-based static desensitization method of sensitive data. The method can set different fields and different desensitization methods for different roles to meets different protection requirements. Since the database stores the desensitized data, and multiple desensitization functions and desensitization parameters are used in the desensitization process, the malicious destroyer cannot obtain the raw data even if he can access the database.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114237707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Healthcare-seeking behavior study on Beijing Hand-Foot-Mouth Disease Patients 北京市手足口病患者就医行为研究
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823283
Jiaojiao Wang, Jinglu Chen, Quannan Zu, Zhidong Cao, Saike He, D. Zeng
{"title":"Healthcare-seeking behavior study on Beijing Hand-Foot-Mouth Disease Patients","authors":"Jiaojiao Wang, Jinglu Chen, Quannan Zu, Zhidong Cao, Saike He, D. Zeng","doi":"10.1109/ISI.2019.8823283","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823283","url":null,"abstract":"Healthcare-seeking behavior (HSB) is the motivation of formulating, developing and changing healthcare policy and medical insurance system, also the important reference of reforming and improving healthcare systems. This paper mainly focused on exploring ‘Patterns-Drivers’ of HSB using a case study on Beijing Hand-Foot-Mouth Disease (HFMD) in China. We extracted the index for HSB and constructed the networks using the heterogeneous information from patients’ records, clarified the spatial-temporal distribution of HSB and examined spatial association between HSB and socioeconomic factors using Geographically Weighted Regression. It was found that HFMD morbidity, the spatial distribution of kindergarten, the scale of the public infrastructures such as the park and the toilet was the important local drivers of HSB. The outcome based on the application of complex networks, geographic information system and spatial statistical techniques would provide valuable information supporting the optimal allocation of health resources and decision-making in disease control and prevention.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114815592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applied Layered-Security Model to IoMT 分层安全模型在IoMT中的应用
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823430
Dominick Rizk, Rodrigue Rizk, Sonya H. Y. Hsu
{"title":"Applied Layered-Security Model to IoMT","authors":"Dominick Rizk, Rodrigue Rizk, Sonya H. Y. Hsu","doi":"10.1109/ISI.2019.8823430","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823430","url":null,"abstract":"Nowadays, IoT has crossed all borders and become ubiquitous in everyday life. This emerging technology has a huge success in closing the gap between the digital and the real world. However, security and privacy become huge concerns especially in the medical field which prevent the healthcare industry from adopting it despite its benefits and potentials. This paper focuses on identifying potential security threats to the IoMT and presents the security mechanisms to remove any possible impediment from immune information security of IoMT. A summarized framework of the layered-security model is proposed followed by a specific assessment review of each layer.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124267338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Inferring Users’ Usage Patterns for Drug Abuse Surveillance 推断吸毒者的使用模式以进行药物滥用监察
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823475
Ruoran Liu, Qiudan Li, D. Zeng
{"title":"Inferring Users’ Usage Patterns for Drug Abuse Surveillance","authors":"Ruoran Liu, Qiudan Li, D. Zeng","doi":"10.1109/ISI.2019.8823475","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823475","url":null,"abstract":"Inferring drug usage patterns includes age of drug abuse and intention of rehabilitation, which is of much importance for drug abuse surveillance. The challenges are how to mine patterns from posts and interaction relationships between users. In this paper, we propose a novel drug usage pattern inference method, which improves the inference accuracy by integrating the semantic features and interaction relationships effectively. Experimental results on a real-world dataset demonstrate the efficacy of the proposed method.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122068881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does Appearance Matter? Exploring the Role of Facial Features for Judging Borrowers’ Credibility in Online P2P Lending Markets 外表很重要吗?网络P2P借贷市场中面部特征对借款人可信度判断的作用探讨
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823417
Dongyu Chen, J. Xu
{"title":"Does Appearance Matter? Exploring the Role of Facial Features for Judging Borrowers’ Credibility in Online P2P Lending Markets","authors":"Dongyu Chen, J. Xu","doi":"10.1109/ISI.2019.8823417","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823417","url":null,"abstract":"Prior research has found the beauty premium effect in peer-to-peer (P2P) lending markets. However, it remains unknown whether and how lenders rely on borrowers’ facial characteristics to infer their financial credibility. In this research, we propose a set of facial features that can be automatically extracted from images using face recognition techniques. Our analysis of a large sample collected from a Chinese P2P lending platform reveals that borrowers with lower socioeconomic status are more likely to include face images in their account profiles. However, these images do not necessarily help attract more investors. The in-depth analysis of the facial features shows that when presented with face images of borrowers, lenders tend to associate the appearance of borrowers with their financial credibility and generally prefer “good-looking” borrowers, who have a round face, a longer philtrum, and a higher nose. However, these facial features cannot be used to predict loan repayment performance.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132253495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Public Opinion Guidance Under the Background of Big Data Technology 大数据技术背景下的舆论引导
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823466
Pinjie Sun, Liye Zhang
{"title":"Public Opinion Guidance Under the Background of Big Data Technology","authors":"Pinjie Sun, Liye Zhang","doi":"10.1109/ISI.2019.8823466","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823466","url":null,"abstract":"The rising and increasing maturity of big data technology has fundamentally changed the way of information dissemination and challenged the guidance of public opinion. This paper discusses the new propagation characteristics of information under the background of big data technology, and puts forward the countermeasures of constructing two new models to predict, supervise and guide public opinion for various organizations.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing Topics of JUUL Discussions on Social Media Using a Semantics-assisted NMF model 基于语义辅助NMF模型的社交媒体JUUL讨论主题分析
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823541
Hejing Liu, Qiudan Li, Riheng Yao, D. Zeng
{"title":"Analyzing Topics of JUUL Discussions on Social Media Using a Semantics-assisted NMF model","authors":"Hejing Liu, Qiudan Li, Riheng Yao, D. Zeng","doi":"10.1109/ISI.2019.8823541","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823541","url":null,"abstract":"JUUL has become a widely used brand of e-cigarettes which takes more than 70% of the market. Social media provides a popular platform for users to discuss the preference and perceptions of JUUL. The discussions are valuable for real-time monitoring of JUUL use. Current research on topic analysis of JUUL discussions mainly relies on human work, which takes much time and effort. This paper adopts a Semantics-assisted NMF topic analysis model to automatically discover topics from JUUL-related short posts on Reddit. By successfully merging the semantic relationships into traditional NMF, this model outperforms in discovering topics with keywords that are important but have a lower word frequency among the posts. Experimental results show the potential of this model in JUUL surveillance and control practice.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123704174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信