{"title":"Towards an End-User Layer for Data Integrity","authors":"Lu'ay Abu Rayyan, Hakim Hacid, Andrew Leoncé","doi":"10.1145/3350546.3352538","DOIUrl":"https://doi.org/10.1145/3350546.3352538","url":null,"abstract":"Data Integrity (DI) is the ability to ensure that a data retrieved from a database is the same as that stored and processed. It is a major component of data security and has an important role for the quality of decision making. While most of the existing approaches rely on a reinforcement of security mechanisms, e.g., access control or cryptography techniques, to ensure a high data integrity quality, we follow an end-user perspective to this end to complement the security approach. Simple, yet powerful, the proposed approach is promising in the inclusion of the end-user into the complex problem of DI. CCS CONCEPTS • Information systems → Integrity checking; Database utilities and tools; • Security and privacy → Database activity monitoring; Information accountability and usage control.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114966390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating Objective Summaries of Sports Matches Using Social Media","authors":"Chahine Koleejan, Hiroya Takamura, M. Okumura","doi":"10.1145/3350546.3352546","DOIUrl":"https://doi.org/10.1145/3350546.3352546","url":null,"abstract":"Social media has become a platform where users post their messages about a wide range of topics, making it a useful source of information to summarize events such as sports matches. Previous summaries of sports matches generated using social media tended to be biased towards one of the teams, due to a high proportion of the posts used being from fans of the teams involved. This is problematic because in general people desire summaries that are free from bias and objective. To remedy this problem and generate higher quality summaries, we propose two approaches. The first is a function maximization method which measures the objectivity of each post based on its constituent words. The second is a neural network-based approach, where we use an encoder-decoder architecture. Then, we compare them with an existing approach and show promising results that indicate the effectiveness of our methods.CCS CONCEPTS • Information systems → Social networks; • Computing methodologies → Natural language generation; Information extraction.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116759100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A MuItilayer Perceptron Architecture for Detecting Deceptive Cryptocurrencies in Coin Market Capitalization Data","authors":"Harshita Dalal, M. Abulaish","doi":"10.1145/3350546.3352564","DOIUrl":"https://doi.org/10.1145/3350546.3352564","url":null,"abstract":"Due to increasing popularity of Bitcoin and other cryptocurrencies, proliferation of deceptive cryptocurrencies over the internet is a global concern. In this paper, we have identified a set of 24 features through analyzing Cryptocurrency Market Capitalization (CMC) data and propose a Multilayer Perceptron (MLP) architecture for detecting deceptive cryptocurrencies. The proposed MLP architecture is compared with three traditional machine learning algorithms over a real cryptocurrency dataset crawled from CMC website, and it performs significantly better. CCS CONCEPTS • Security and privacy $rightarrow$ Web application security; • Information systems $rightarrow$ Data analytics; • Computing methodologies $rightarrow$ Supervised learning.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining Visual and Contextual Information for Fraudulent Online Store CIassification","authors":"Wouter Mostard, Bastiaan Zijlema, M. Wiering","doi":"10.1145/3350546.3352504","DOIUrl":"https://doi.org/10.1145/3350546.3352504","url":null,"abstract":"Following the rise of e-commerce there has been a dramatic increase in online criminal activities targeting online shoppers. Considering that the number of online stores has risen dramatically, manually checking these stores has become intractable. An automated process is therefore required. We approached this problem by applying machine learning techniques to extract and detect instances of fraudulent online stores. Two sources of information were used to determine the legitimacy of an online store. First, contextual features extracted from the HTML and meta information were used to train various machine learning algorithms. Second, visual information, like the presence of social media logos, was added to make improvements on this baseline model. Results show a positive effect for adding visual information, increasing the Fl-score from 0.93 to 0.98 over the baseline model. Finally, this research shows that visual information can improve recall during web crawling.CCS CONCEPTS • Information systems → Web mining; • Computing methodologies → Machine learning.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128961897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayesian Deep Learning with Trust and Distrust in Recommendation Systems","authors":"Dimitrios Rafailidis","doi":"10.1145/3350546.3352496","DOIUrl":"https://doi.org/10.1145/3350546.3352496","url":null,"abstract":"Exploiting the selections of social friends and foes can efficiently face the data scarcity of user preferences and the cold-start problem. In this paper, we present a Social Deep Pairwise Learning model, namely SDPL. According to the Bayesian Pairwise Ranking criterion, we design a loss function with multiple ranking criteria based on the selections of users, and those in their friends and foes to improve the accuracy in the top-k recommendation task. We capture the nonlinearity in user preferences and the social information of trust and distrust relationships by designing a deep learning architecture. In each backpropagation step, we perform social negative sampling to meet the multiple ranking criteria of our loss function. Our experiments on a benchmark dataset from Epinions, among the largest publicly available that has been reported in the relevant literature, demonstrate the effectiveness of the proposed approach, outperforming other state-of-the art methods. In addition, we show that our deep learning strategy plays an important role in capturing the nonlinear associations between user preferences and the social information of trust and distrust relationships, and demonstrate that our social negative sampling strategy is a key factor in SDPL.CCS CONCEPTS • Information systems → Collaborative and social computing systems and tools.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Co-learning Multiple Browsing Tendencies of a User by Matrix Factorization-based Multitask Learning","authors":"Guo-Jhen Bai, Cheng-You Lien, Hung-Hsuan Chen","doi":"10.1145/3350546.3352526","DOIUrl":"https://doi.org/10.1145/3350546.3352526","url":null,"abstract":"Predicting an online user’s future behavior is beneficial for many applications. For example, online retailers may utilize such information to customize the marketing strategy and maximize profit. This paper aims to predict the types of webpages a user is going to click on. We observe that instead of building independent models to predict each individual type of web page, it is more effective to use a unified model to predict a user’s future clicks on different types of web pages simultaneously. The proposed model makes predictions based on the latent variables that represent possible interactions among the multiple targets and among the features. The experimental results show that this method outperforms the carefully tuned single-target training models most of the time. If the size of the training data is limited, the model shows a significant improvement over the baseline models, likely because the hidden relationship among different targets can be discovered by our model.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130659951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fair Team Recommendations for Multidisciplinary Projects","authors":"Lucas Machado, K. Stefanidis","doi":"10.1145/3350546.3352533","DOIUrl":"https://doi.org/10.1145/3350546.3352533","url":null,"abstract":"The focus of this work is on the problem of team recommendations, in which teams have multidisciplinary requirements and team members’ selection is based on the match of their skills and the requirements. When assembling multiple teams there is also a challenge of allocating the best members in a fair way between the teams. We formally define the problem and propose a brute force and a faster heuristic method as solutions to create team recommendations to multidisciplinary projects. Furthermore, to increase the fairness between the recommended teams, the K-rounds and Pairs-rounds methods are proposed as variations of the heuristic approach. Several different test scenarios are executed to analyze and compare the effectiveness of these methods.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125785336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Agent System for Energy Management in a Dynamic and Open Environment: Architecture and Optimisation","authors":"O. Kem, Feirouz Ksontini","doi":"10.1145/3350546.3352545","DOIUrl":"https://doi.org/10.1145/3350546.3352545","url":null,"abstract":"The increasing presence of smart and dynamic environments with IoT devices creates new challenges in energy optimisation such as handling environments’ dynamics and privacy concerns. In this paper, we aim at optimising energy consumption in such environments, exploiting building flexibility to reduce energy bills, while respecting user preferences as well as device constraints and addressing the complexity of the environment. We propose a multi-agent optimisation system based on Alternating Direction Method of Multipliers to solve the optimisation problem. Various evaluations of the proposal show significant energy cost savings, while addressing dynamics and preserving privacy.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122262654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evolutionary Approach to Class Disjointness Axiom Discovery","authors":"T. Nguyen, A. Tettamanzi","doi":"10.1145/3350546.3352502","DOIUrl":"https://doi.org/10.1145/3350546.3352502","url":null,"abstract":"Axiom learning is an essential task in enhancing the quality of an ontology, a task that sometimes goes under the name of ontology enrichment. To overcome some limitations of recent work and to contribute to the growing library of ontology learning algorithms, we propose an evolutionary approach to automatically discover axioms from the abundant RDF data resource of the Semantic Web. We describe a method applying an instance of an Evolutionary Algorithm, namely Grammatical Evolution, to the acquisition of OWL class disjointness axioms, one important type of OWL axioms which makes it possible to detect logical inconsistencies and infer implicit information from a knowledge base. The proposed method uses an axiom scoring function based on possibility theory and is evaluated against a Gold Standard, manually constructed by knowledge engineers. Experimental results show that the given method possesses high accuracy and good coverage. CCS CONCEPTS • Computing methodologies → Ontology engineering; Machine learning algorithms; Instance-based learning; Evolutionary algorithms;","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131841488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Suzuki, Ryoko Nakamura, Aozora Inagaki, Isamu Watanabe, T. Takagi
{"title":"Early Detection of Problem Gambling based on Behavioral Changes using Shapelets","authors":"H. Suzuki, Ryoko Nakamura, Aozora Inagaki, Isamu Watanabe, T. Takagi","doi":"10.1145/3350546.3352549","DOIUrl":"https://doi.org/10.1145/3350546.3352549","url":null,"abstract":"Recent years have seen strides achieved in the field of behavior analysis by using online gambling data. However, studies on time-series behavioral changes remain inadequate. In this study, we propose a classifier that quantifies changes in the player’s time series of online gambling behavioral data by using distance measurement with shapelet for the early detection of behaviors in players that could lead to problem gambling. We investigated the prediction capabilities of shapelets that represent behavioral change patterns, and the results showed that shapelet features can improve predictive accuracy. Furthermore, based on this result, we found characteristic behavioral changes leading to problem gambling, such as loss chasing. Subsequently, we demonstrated a possibility for improvements in accuracy using these behavioral change patterns based on expert knowledge. CCS CONCEPTS• Information systems → Data mining; • Applied computing → Computer games.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124229191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}