{"title":"Content Characteristics and Transmission Strategies of Social Media Rumors in China: Big Data Analysis of WeChat Rumors","authors":"Lingnan He, Jing Gu, Dan Li, Kaisheng Lai","doi":"10.1109/BESC48373.2019.8963026","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8963026","url":null,"abstract":"Understanding the characteristics and patterns of rumors on social media has become one of the key issues of rumor governance. However, there is some empirical evidence about the characteristics of rumors on WeChat, the most popular social media platform in China with more than 800 million users. To investigate the content characteristics and transmission strategies of rumors on WeChat, we collected 2175 rumor articles from WeChat from April 2015 to March 2016. It was found that political and societal rumors accounted for the highest proportion of rumors on WeChat. The proportion of positive emotional words found in the most popular rumors was significantly higher than that in the least popular rumors. Further analysis of rumor transmission strategies indicated that nearly one-third of the rumors have the interactive characteristics of induced sharing. Rumor articles on WeChat were mostly published around people's leisure time and holidays. Most articles were published in the front positions at each instance of time. However, the headline rumor articles did not receive the highest number of views and likes. Our findings can be beneficial for the scientific allocation of rumor regulatory resources and rumor intervention.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114272448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The hypergraph matching based on CCRP","authors":"Jun Zhou, Tao Wang, Yi Jin","doi":"10.1109/BESC48373.2019.8963517","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8963517","url":null,"abstract":"Hypergraph matching plays an important role in the development of computer vision and has gained more and more attention. Although many algorithms have been generated, it is always difficult to solve the mathematical model of the hypergraph matching. Most algorithms use approximately local optimal solution to replace the global optimal solution of objective function. This will cause the hypergraph matching is unable to obtain the optimal solution in limited time. In order to solve this problem, we propose a new hypergraph matching algorithm based on CCRP to overcome the relaxation problem. We compare the proposed method with several excellent matching algorithms in three common benchmarks including Synthetic, CMU House and Willow. Our experimental results demonstrate the superiority of our new algorithm in matching accuracy and robustness against noise and deformation.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114302017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiajie Tian, Zhu Teng, Yan Li, Rui Li, Yi Wu, Jianping Fan
{"title":"Domain-Camera Adaptation for Unsupervised Person Re-Identification","authors":"Jiajie Tian, Zhu Teng, Yan Li, Rui Li, Yi Wu, Jianping Fan","doi":"10.1109/BESC48373.2019.8963072","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8963072","url":null,"abstract":"Although supervised person re-identification (Re-ID) performance has been significantly improved in recent years, it is still a challenge for unsupervised person Re-Iddue to its absence of labels across disjoint camera views. On the other hand, Re-Idmodels trained on source domain usually offer poor performance when they are tested on target domain due to inter-domain bias e.g. different classes and intra-domain difference e.g camera variance. To overcome this problem, given a labeled source training domain and an unlabeled target training domain, we propose an unsupervised transfer method, Domain-Camera Adaptation model, to generate a pseudo target domain by bridging inter-domain bias and intra-domain difference. The idea is to fill the absence of labels in target domain by transferring labeled images of source domain to target domain across cameras. Then we propose a cross-domain classification loss to extract discriminative representation across domains. The intuition is to think of unsupervised learning as semi-supervised learning in target domain. We evaluate our deep model on Market-1501 and DukeMTMC-reID and the results show our model outperforms the state-of-art unsupervised Re-ID methods by large margins.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128692067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Privacy in Digital Era on Cloud Architecture for Banking and Financial Services Industry","authors":"Abhishek Mahalle, J. Yong, Xiaohui Tao","doi":"10.1109/BESC48373.2019.8963459","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8963459","url":null,"abstract":"With an intention to provide easy to use and convenience to customers, Banking and Financial Services Corporations have enabled key services over handheld and wearable digital devices. With use of these devices on everyday basis for several other purpose along with financial transaction, customers are leaving digital foot prints. This digital data can be collected, stored, analysed and used to learn consumer behaviour, location, taste & preferences and monetary spending habits. Based on historical information collected from several areas (social media, transaction analytics, cloud services utilized) and developing suggestions for customer for better choices available in everyday life is where Banking and Financial Services Corporations are competing and willing to provide personalized experience. The use of data to make prediction is through consent from customer, however, not all customer would like their data being collected or used or both. The user or customer consent form over digital application comes with a “take it or leave it” approach. This is where the customer needs and their privacy related aspects are concerned and compromised. In this paper, we have identified the way digitization is breaching customer privacy, changes required over digital platform and data collection frequency to preserve customer's (an individual's) right of being let alone. This paper covers the methods to collect private data, methods to use private data for marketing of goods & services, harm to an individual due these unauthorized promotional activities and solution to protect an individual's privacy.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"51 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UHF RFID Information Security Transmission Technology and Application Based on Domestic Cryptographic Algorithm","authors":"Mengfan Tian, Junpeng Qi, Rui Ma","doi":"10.1109/BESC48373.2019.8963038","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8963038","url":null,"abstract":"With the continuous development of the Internet of Things, intelligent manufacturing has gradually entered the application stage, which urgently needs to solve the problem of information transmission security. In order to realize data security with transmission encryption, the UHF RFID tag based on domestic cryptographic algorithm SM7 is proposed. By writing the anti-counterfeiting authentication identification code when the tag leaves the factory, verifying the identification code when the tag is issued, and using the authentication code of the tag to participate in the sectoral key dispersion, the purpose of data security protection is achieved. Through this scheme, the security of tag information and transmission is guaranteed, and a new idea is provided for the follow-up large-scale extension of intelligent manufacturing.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131576824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Multi-product Newsvendor Problem: Review and Extensions","authors":"Mengting Mu, Junlin Chen, Yu Yang, Jian Guo","doi":"10.1109/BESC48373.2019.8962977","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8962977","url":null,"abstract":"There are a large number of literature considering multi-product newsvendor problems in recent years. We review the selected studies in aspects of the multi-product newsvendor problem with single constraint, models with multiple constraints, and models with substitutes and complementary products. The problems that should be paid attention to in the research and the direction of future research are also put forward.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114617765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How do the personality traits affect observational behaviors when judging whether smiles are genuine or not?","authors":"Kuangzhe Xu, Hiyori Tagami, Toshihiko Matsuka","doi":"10.1109/BESC48373.2019.8963457","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8963457","url":null,"abstract":"Humans' ability to discriminate a Duchenne (genuine) smile from non-Duchenne (“presented”) smile attracted scientific interests among various types of smiles. To better understand humans' capability and its mechanisms to discriminate Duchenne and non-Duchenne smiles, we examined people's observational behaviors during Duchenne/non-Duchenne discrimination tasks using an eye-tracker. In so doing, we also collected data on participants' personality traits as some previous studies showed that observational behaviors are strongly influenced by the personality traits of observers. With two Experiment, we found differences in observational behaviors between correct and incorrect discrimination, and that different personality traits were associated with different observational behaviors. However, we did not found any significant relationship between observers' personality traits and judgment accuracies. Thus, although we found differential observational behaviors for correct and incorrect respondents, it seems that these differences were nothing to do with participants' personality traits.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125191839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WeaGAN:Generative Adversarial Network for Weather Translation of Image among Multi-domain","authors":"Yating Lin, Yidong Li, Haidong Cui, Z. Feng","doi":"10.1109/BESC48373.2019.8963257","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8963257","url":null,"abstract":"Weather translation of image refers to the task of changing the weather of an input image to desired weather while preserving the structure of the image's content, which belongs to a task of image-to-image translation. Recent works have made great process in image-to-image translation between two domains and some works have even achieved multi-domain translation within a single model. However, existing works have limited robustness in handling weather translation among multi-domain, since bad weather produces a loud noise and it is challenging to process scene images without fixed pattern in a unified model. In this paper, we propose WeaGAN based on encoder-decoder architecture and generative adversarial training process to translate the weather of image among multi-domain. In particular, We employ SE block in generator and combine adversarial loss, classification loss and content loss for visually detailed and realistic result. Experience in qualitative and quantitative aspect on synthetic dataset and real dataset show the effectiveness and competitiveness of our method compared with state-of-the-art works.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Analysis of User Behavior Fingerprint on Security Situational Awareness Based on DNS Log","authors":"Zhuosheng Jia, Zhen Han","doi":"10.1109/BESC48373.2019.8963120","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8963120","url":null,"abstract":"Before accessing Internet websites or applications, network users first ask the Domain Name System (DNS) for the corresponding IP address, and then the user's browser or application accesses the required resources through the IP address. The server log of DNS keeps records of all users' requesting queries. This paper analyzes the user network accessing behavior by analyzing network DNS log in campus, constructing a behavior fingerprint model for each user. Different users and even same user's fingerprints in different periods can be used to determine whether the user's access is abnormal or safe, whether it is infected with malicious code. After detecting the behavior of abnormal user accessing, preventing the spread of viruses, Trojans, bots and attacks is made possible, which further assists the protection of users' network access security through corresponding techniques. Finally, analysis of user behavior fingerprints of campus network access is conducted.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134026749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Dynamic Factors of Guangdong's Economic Growth from the Perspective of Supply-side Reform","authors":"Ziyu Xu, Jin Wu","doi":"10.1109/BESC48373.2019.8963393","DOIUrl":"https://doi.org/10.1109/BESC48373.2019.8963393","url":null,"abstract":"Re-examining the overall economic situation and the industrial structure of Guangdong Province, the current sub-districts in Guangdong have insufficient development in supply and demand management, effectiveness review, factor-driven and elimination of uncertain factors, and urgently need to scientifically and rationally define regional management dilemmas. Through the introduction of the Cobb-Dauglas production function model, the total factor productivity of 21 districts in Guangdong Province are calculated. Concerned about the supply-side management elements and constant indicators of benefit in specific regions, efforts are made to promote Guangdong Province. The transformation of the economic and dynamic mechanism and the adjustment of its contribution rate are expected to effectively analyze the innovative path of economic development in Guangdong Province.","PeriodicalId":190867,"journal":{"name":"2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127086863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}