{"title":"Study on rigidity, flexibility, resilience and tenacity of anti-interference ability of wireless communication system","authors":"Yingtao Niu, Cheng Li, Yan Liu, Yusheng Li","doi":"10.1109/ISI.2019.8823305","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823305","url":null,"abstract":"In view of all kinds of man-made interference faced by wireless communication system, this paper discusses the anti-interference ability from the angle of rigidity, flexibility, resilience and tenacity (referred to as \"four characteristics\"). Firstly, the concept of four characteristics in materials science and application of engineering or system is analyzed. Then the concept of four characteristics of anti-interference ability of wireless communication system is given, and the key technologies of realizing \"four characteristics\" of anti-interference ability under the complex electromagnetic environment are analyzed at last.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum-Inspired Density Matrix Encoder for Sexual Harassment Personal Stories Classification","authors":"Peng Yan, Linjing Li, Weiyun Chen, D. Zeng","doi":"10.1109/ISI.2019.8823281","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823281","url":null,"abstract":"Nowadays, more and more sexual harassment personal stories have been shared on social media. To better monitor and analyze the extent of sexual harassment based on these social media data, we need to automatically categorize different forms of sexual harassment personal stories. Existing methods apply convolutional neural network (CNN) with different convolution window sizes to this text classification task. However, the previous CNN models do not provide an effective way to synthesize window size-related local representations, but simply concatenate all local representations together. To address this problem, we propose a new density matrix encoder, inspired by quantum mechanics, to encode local representations as particles in quantum state and generate a global representation as quantum mixed system for each story. Experiment on SafeCity dataset shows that our model outperforms CNN baseline and achieves better performance than the state-of-the-art model when considering both accuracy and speed, demonstrating the effectiveness of the proposed density matrix encoder.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123367277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Information Dissemination of Public Health Events Based on WeChat: A Case Study of Avian Influenza","authors":"Tianyi Luo, Zhidong Cao, D. Zeng","doi":"10.1109/ISI.2019.8823173","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823173","url":null,"abstract":"This paper studied the public opinion dissemination mechanism of public health events such as avian influenza on WeChat. We collected 25,572 posts related to “avian influenza” and “H7N9” from WeChat accounts and proposed the NRT model to simulate the spread of avian influenza public opinion in WeChat. Fitting results show that it can well explain the information dissemination process and mechanism within the WeChat public account. Then the influence of model parameters on the propagation of network public opinion is further studied. Our research can provide a theoretical basis for network public opinion prediction and prevention, and has great significance for the stability of the network environment.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124451125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Prior Knowledge Based Neural Attention Model for Opioid Topic Identification","authors":"Riheng Yao, Qiudan Li, W. Lo‐Ciganic, D. Zeng","doi":"10.1109/ISI.2019.8823280","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823280","url":null,"abstract":"The opioid epidemic has become a serious public health crisis in the United States. Social media sources such as Reddit containing user-generated content may be a valuable safety surveillance platform to evaluate discussions discerning opioid use. This paper proposes a prior knowledge based neural attention model for opioid topics identification, which considers prior knowledge with attention mechanism. Experimental results on a real-world dataset show that our model can extract coherent topics, the identified less discussed but important topics provide more comprehensive information for opioid safety surveillance.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126795221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Po-Yi Du, Mohammadreza Ebrahimi, Ning Zhang, Hsinchun Chen, Randall A. Brown, S. Samtani
{"title":"Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach","authors":"Po-Yi Du, Mohammadreza Ebrahimi, Ning Zhang, Hsinchun Chen, Randall A. Brown, S. Samtani","doi":"10.1109/ISI.2019.8823196","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823196","url":null,"abstract":"As the Internet based applications become more and more ubiquitous, drug retailing on Dark Net Marketplaces (DNMs) has raised public health and law enforcement concerns due to its highly accessible and anonymous nature. To combat illegal drug transaction among DNMs, authorities often require agents to impersonate DNM customers in order to identify key actors within the community. This process can be costly in time and resource. Research in DNMs have been conducted to provide better understanding of DNM characteristics and drug sellers’ behavior. Built upon the existing work, researchers can further leverage predictive analytics techniques to take proactive measures and reduce the associated costs. To this end, we propose a systematic analytical approach to identify key opioid sellers in DNMs. Utilizing machine learning and text analysis, this research provides prediction of high-impact opioid products in two major DNMs. Through linking the high-impact products and their sellers, we then identify the key opioid sellers among the communities. This work intends to help law enforcement authorities to formulate strategies by providing specific targets within the DNMs and reduce the time and resources required for prosecuting and eliminating the criminals from the market.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133668404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Targeted Addresses Identification for Bitcoin with Network Representation Learning","authors":"Jiaqi Liang, Linjing Li, Weiyun Chen, D. Zeng","doi":"10.1109/ISI.2019.8823249","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823249","url":null,"abstract":"The anonymity and decentralization of Bitcoin make it widely accepted in illegal transactions, such as money laundering, drug and weapon trafficking, gambling, to name a few, which has already caused significant security risk all around the world. The obvious de-anonymity approach that matches transaction addresses and users is not possible in practice due to limited annotated data set. In this paper, we divide addresses into four types, exchange, gambling, service, and general, and propose targeted addresses identification algorithms with high fault tolerance which may be employed in a wide range of applications. We use network representation learning to extract features and train imbalanced multi-classifiers. Experimental results validated the effectiveness of the proposed method.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attention Allocation of Twitter Users in Geopolitics","authors":"Saike He, Changliang Li, Hailiang Wang, Xiaolong Zheng, Zhu Zhang, Jiaojiao Wang, D. Zeng","doi":"10.1109/ISI.2019.8823342","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823342","url":null,"abstract":"How people divide their attention across their friends can help to understand key issues in the realm of geopolitics. Such attention exploration allows us to compare people who focus a large portion of their attention on a small set of close friends with those disperse their attention more widely. Using 2.5 million twitter data written by 130 thousands users, we find the balance of attention is a relatively stable property of people across different modalities of interaction. It displays subtle variation across people with different characteristics and different modalities of interaction. Specifically, people’s attention is more focused in mention interactions, while those active in socialization tend to allocate higher portion of total attention to their close friends. Besides external interactions, people’s inner interests also affect their attention allocation. People spreading multiple memes tend to be focused, and those with more even distribution of memes are focused on their intimate friends. Finally, people’s relationships also plays an important role in their attention allocation. People are more likely to focus their attention on those most like them, and this similarity sequentially enhances the intimate relationship between them.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Multi-domain Stereo Prevention and Control Technology in Counter-terrorism","authors":"Yanfei Liu, Zhenhua Wang, Guangyu Zhang","doi":"10.1109/ISI.2019.8823392","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823392","url":null,"abstract":"This paper analyses the activity of scientific and technological activities and the incidence of terrorist attacks in recent years, and studies the relationship between them, and puts forward corresponding countermeasures from three aspects: network domain prevention and control, airspace prevention and control, and regional prevention and control.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"618 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports","authors":"Lior Perry, Bracha Shapira, Rami Puzis","doi":"10.1109/ISI.2019.8823152","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823152","url":null,"abstract":"The task of attack attribution, i.e., identifying the entity responsible for an attack, is complicated and usually requires the involvement of an experienced security expert. Prior attempts to automate attack attribution apply various machine learning techniques on features extracted from the malware’s code and behavior in order to identify other similar malware whose authors are known. However, the same malware can be reused by multiple actors, and the actor who performed an attack using a malware might differ from the malware’s author. Moreover, information collected during an incident may contain many clues about the identity of the attacker in addition to the malware used. In this paper, we propose a method of attack attribution based on textual analysis of threat intelligence reports, using state of the art algorithms and models from the fields of machine learning and natural language processing (NLP). We have developed a new text representation algorithm which captures the context of the words and requires minimal feature engineering. Our approach relies on vector space representation of incident reports derived from a small collection of labeled reports and a large corpus of general security literature. Both datasets have been made available to the research community. Experimental results show that the proposed representation can attribute attacks more accurately than the baselines’ representations. In addition, we show how the proposed approach can be used to identify novel previously unseen threat actors and identify similarities between known threat actors.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114864985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Cognition Construction of the Avian Flu based on Social Media Big Data","authors":"Yuejiao Wang, Zhidong Cao","doi":"10.1109/ISI.2019.8823150","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823150","url":null,"abstract":"During the high incidence of avian flu, the mainstream media and social media report a lot on the epidemic, mobilizing the people to prevent and control avian flu. This paper collects reports on avian flu from News, Forums, Apps, WeChat and Microblog and forms five data sets. We extract agenda-settings from the News dataset and build agenda-setting networks of the five datasets. Then we use the QAP test to verify the relevance of these agenda-setting networks. We also project the agenda-setting dissimilarity matrices into a two-dimensional space using the MDS method to form cognitive maps, analyzing the cognitive drift of media platforms relative to News. Results show that the agenda-setting networks of Apps and News have the highest correlation coefficient of 0.9193, while Microblog and News have the lowest correlation coefficient of 0.5611. The cognitive maps of Apps, Forum and WeChat have a slight translation and rotation relative to the cognitive map of News. But their relative positional relationship among agenda-settings are similar with News, expect Microblog.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}