Silong Zhang, Junyong Luo, Yan Liu, Dong Yao, Yu Tian
{"title":"Hotspots Detection on Microblog","authors":"Silong Zhang, Junyong Luo, Yan Liu, Dong Yao, Yu Tian","doi":"10.1109/MINES.2012.118","DOIUrl":"https://doi.org/10.1109/MINES.2012.118","url":null,"abstract":"Main microblog research is focus on the structural analysis of social networks, rather than the text and topic analysis. Traditional topic detection methods could not be applied due to the microblog short text features and structural characteristics. We taken advantage of availability of latent Dirichlet allocation (LDA) to expand the text feature space, and used frequency statistics for our topic ranking, and improved it based on the microblog nontext element data and word element. We taken into account both the text context similarity and semantic similarity in order to make it possible that the traditional clustering method can make difference in the microblog text topic analysis. Experimental studies show our method works well on microblog dataset.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127662886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SEA: Analyzing Memory Access of Executables","authors":"Wang Guo-hao, Jiang Lie-hui, Jing Jing, Li Dan","doi":"10.1109/MINES.2012.199","DOIUrl":"https://doi.org/10.1109/MINES.2012.199","url":null,"abstract":"In modern computer architecture, memory is an indispensable medium that software and systems relies upon when running on the computer. Messages about memory access could reflect attributes of programs, which should be invaluable with decompilation and security-related fields. This paper presents a novel memory access algorithm-SEA (Static Execution Analysis) for analyzing stripped executables. In order to support multi-source architectures, analysis is performed on a uniform intermediate representation, messages about memory access and register usage are recorded on an abstract memory model for further analysis. A tool integrating existing achievements is presented to show the usefulness of SEA. Experimental result has shown that SEA is of great help to solve some critical problems of decompilation and security.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Group-Tree Matching Algorithm Based on Forwarding Tag Maximum Match","authors":"Yanling Zhou, Youqin Zhu","doi":"10.1109/MINES.2012.21","DOIUrl":"https://doi.org/10.1109/MINES.2012.21","url":null,"abstract":"Aggregated multicast is the main method to solve the problem of lacking labels in MPLS network. Achieving the aggregation of multicast tree must have an effective multicast group-tree matching algorithm. Which problem of the group-tree matching algorithm solves is that the multicast group can match the multicast tree perfectly. We analyze the previous multicast group-tree matching algorithm, and summarize the strengths and the weaknesses of the previous algorithm. At the same time, we propose a new group-tree matching algorithm which is the maximum matching group-tree algorithm based on forwarding tag, here referred to as FT-GTA. It is proposed based on the analysis and the summary of the previous group-tree matching algorithm. The FT-GTA algorithm can realize the multicast trees merging in the presence of saving the network bandwidth resources. Due to the dynamic of Multicast, the FT-GTA algorithm can refresh the forwarding table quickly and consequently improves the forwarding efficiency in the network. Finally, we prove that the validity of the FT-GTA algorithm by simulation.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Feedback Platform for People's Livelihood Projects Based on SOA","authors":"Jingshu Yao, Yan Qiu, Pei Zhou, Quanyin Zhu","doi":"10.1109/MINES.2012.226","DOIUrl":"https://doi.org/10.1109/MINES.2012.226","url":null,"abstract":"In order to meet the needs of the rural livelihood construction, the C# is used to realize the information feedback platform of rural people's livelihood which is based on B/S architecture. The proposed system is designed as three layers that are the business logic layer (BLL), data processing layer (DAL) and physical layer (Model). The system realizes the basic database operations for browsing, querying and management of feedback data. The system uses the service-oriented architecture (SOA). The proposed system functions are divided into different Web Service which makes the function call converted into service call in the system. It also publishes the service of standard interfaces on the internet which realizes cross-platform on sharing of resources. The feedback platform for rural people's livelihood projects provides online message, e-mail, SMS messages and other information feedback methods which can collect the effectiveness evaluation on the prophase, middle and late of rural livelihood construction projects in time.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130685043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Support Vector Machines Classification for High-Dimentional Dataset","authors":"Sipeng Wang","doi":"10.1109/MINES.2012.214","DOIUrl":"https://doi.org/10.1109/MINES.2012.214","url":null,"abstract":"For improve classification accuracy, this paper discusses the problem of feature selection for high-dimensional data and SVM parameter optimization. An SVM classification system based on simulated annealing (SA) is proposed to improve the performance of the SVM classifier. The experiments are conducted on the basis of benchmark dataset. The obtained results confirm the superiority of the SA-SVM approach compared to default parameters SVM classifier, grid search SVM parameter approach and suggest that further substantial improvements in terms of classification accuracy can be achieved by the proposed SA-SVM classification technique.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guangjie Liu, Weiwei Liu, Yue-wei Dai, Shiguo Lian
{"title":"Adaptive Steganography Based on Syndrome-Trellis Codes and Local Complexity","authors":"Guangjie Liu, Weiwei Liu, Yue-wei Dai, Shiguo Lian","doi":"10.1109/MINES.2012.55","DOIUrl":"https://doi.org/10.1109/MINES.2012.55","url":null,"abstract":"Syndrome-trellis codes provide a flexible framework for adaptive steganography, but how to construct the proper distortion weight function is still a disturbing question. In this paper, we propose to use an exponential function based on the local complexity to define the risk caused by the data embedding. And the steganography based on the payload-adaptive embedding risk and syndrome-trellis codes is presented. Finally, an experiment is performed to verify its validity.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116645586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Billing Strategy of Cloud Storage","authors":"Haitao Li, Yuliang Yang, Bin Zheng","doi":"10.1109/MINES.2012.172","DOIUrl":"https://doi.org/10.1109/MINES.2012.172","url":null,"abstract":"Cloud storage has become a active field of research with the development of Internet services. However, the corresponding billing system always cost users more money because of that the billing system is not suitable for the users' realistic application. To solve this problem, the author studied the existing billing system, analyzed the features of users and cloud storage providers, and proposed a billing strategy for cloud storage platform by the way of quantifying to ensure users only pay for the resources they truly use and meet users' wish to pay the least money. The author proved the correctness of the billing strategy through game theory.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116658064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ID-based Designated-Verifier Proxy Multi-signature Scheme","authors":"W. Zuo, Yunfang Liu, Sanfu Wang","doi":"10.1109/MINES.2012.64","DOIUrl":"https://doi.org/10.1109/MINES.2012.64","url":null,"abstract":"Designated verifier signature is a new cryptographic primitive, in a designated verifier signature scheme, only the designated verifier specified by the signer can verify the validity of the signature. In this paper, we propose an ID-based designated verifier proxy multi-signature scheme by combining the proxy multi-signature and the designated verifier signature. In our scheme, the designated verifier can verify the proxy-multi signature generated by the proxy signer on behalf of the group of original signers. Analysis shows that our scheme is secure and it is suitable for the practice in electronic world.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116813790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware Detection in Smartphone Using Hidden Markov Model","authors":"Kejun Xin, Gang Li, Zhongyuan Qin, Qunfang Zhang","doi":"10.1109/MINES.2012.134","DOIUrl":"https://doi.org/10.1109/MINES.2012.134","url":null,"abstract":"In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection scheme based on Hidden Markov Model (HMM) which is different from the traditional signature scanning methods. Firstly, we monitor the key press and system function call sequence, and take the key press as hidden state. After decoding HMM model, abnormal process can be detected using the matching rate of HMM output to the actual key press sequence. The experimental results demonstrate that the proposed method can effectively detect mobile malwares.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133068735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Angle Spectrum Sensing Based on Sliding Window MUSIC Algorithm","authors":"Du Liping, Liu Feifei, Chen Yueyun","doi":"10.1109/MINES.2012.238","DOIUrl":"https://doi.org/10.1109/MINES.2012.238","url":null,"abstract":"Spectrum sensing is one of the key issues in cognitive radio. To explore all dimensions of the spectrum space, a sliding window MUSIC based spectrum sensing method is proposed to offer the spectrum holes in time-angle dimension. Simulation results show that the proposed method has better detection performance than conventional energy detection as well as high estimation accuracy.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133289307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}