2012 Fourth International Conference on Multimedia Information Networking and Security最新文献

筛选
英文 中文
Hotspots Detection on Microblog 微博热点检测
Silong Zhang, Junyong Luo, Yan Liu, Dong Yao, Yu Tian
{"title":"Hotspots Detection on Microblog","authors":"Silong Zhang, Junyong Luo, Yan Liu, Dong Yao, Yu Tian","doi":"10.1109/MINES.2012.118","DOIUrl":"https://doi.org/10.1109/MINES.2012.118","url":null,"abstract":"Main microblog research is focus on the structural analysis of social networks, rather than the text and topic analysis. Traditional topic detection methods could not be applied due to the microblog short text features and structural characteristics. We taken advantage of availability of latent Dirichlet allocation (LDA) to expand the text feature space, and used frequency statistics for our topic ranking, and improved it based on the microblog nontext element data and word element. We taken into account both the text context similarity and semantic similarity in order to make it possible that the traditional clustering method can make difference in the microblog text topic analysis. Experimental studies show our method works well on microblog dataset.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127662886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SEA: Analyzing Memory Access of Executables SEA:分析可执行文件的内存访问
Wang Guo-hao, Jiang Lie-hui, Jing Jing, Li Dan
{"title":"SEA: Analyzing Memory Access of Executables","authors":"Wang Guo-hao, Jiang Lie-hui, Jing Jing, Li Dan","doi":"10.1109/MINES.2012.199","DOIUrl":"https://doi.org/10.1109/MINES.2012.199","url":null,"abstract":"In modern computer architecture, memory is an indispensable medium that software and systems relies upon when running on the computer. Messages about memory access could reflect attributes of programs, which should be invaluable with decompilation and security-related fields. This paper presents a novel memory access algorithm-SEA (Static Execution Analysis) for analyzing stripped executables. In order to support multi-source architectures, analysis is performed on a uniform intermediate representation, messages about memory access and register usage are recorded on an abstract memory model for further analysis. A tool integrating existing achievements is presented to show the usefulness of SEA. Experimental result has shown that SEA is of great help to solve some critical problems of decompilation and security.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Group-Tree Matching Algorithm Based on Forwarding Tag Maximum Match 基于转发标签最大匹配的组树匹配算法
Yanling Zhou, Youqin Zhu
{"title":"A Group-Tree Matching Algorithm Based on Forwarding Tag Maximum Match","authors":"Yanling Zhou, Youqin Zhu","doi":"10.1109/MINES.2012.21","DOIUrl":"https://doi.org/10.1109/MINES.2012.21","url":null,"abstract":"Aggregated multicast is the main method to solve the problem of lacking labels in MPLS network. Achieving the aggregation of multicast tree must have an effective multicast group-tree matching algorithm. Which problem of the group-tree matching algorithm solves is that the multicast group can match the multicast tree perfectly. We analyze the previous multicast group-tree matching algorithm, and summarize the strengths and the weaknesses of the previous algorithm. At the same time, we propose a new group-tree matching algorithm which is the maximum matching group-tree algorithm based on forwarding tag, here referred to as FT-GTA. It is proposed based on the analysis and the summary of the previous group-tree matching algorithm. The FT-GTA algorithm can realize the multicast trees merging in the presence of saving the network bandwidth resources. Due to the dynamic of Multicast, the FT-GTA algorithm can refresh the forwarding table quickly and consequently improves the forwarding efficiency in the network. Finally, we prove that the validity of the FT-GTA algorithm by simulation.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Feedback Platform for People's Livelihood Projects Based on SOA 基于SOA的民生工程反馈平台
Jingshu Yao, Yan Qiu, Pei Zhou, Quanyin Zhu
{"title":"The Feedback Platform for People's Livelihood Projects Based on SOA","authors":"Jingshu Yao, Yan Qiu, Pei Zhou, Quanyin Zhu","doi":"10.1109/MINES.2012.226","DOIUrl":"https://doi.org/10.1109/MINES.2012.226","url":null,"abstract":"In order to meet the needs of the rural livelihood construction, the C# is used to realize the information feedback platform of rural people's livelihood which is based on B/S architecture. The proposed system is designed as three layers that are the business logic layer (BLL), data processing layer (DAL) and physical layer (Model). The system realizes the basic database operations for browsing, querying and management of feedback data. The system uses the service-oriented architecture (SOA). The proposed system functions are divided into different Web Service which makes the function call converted into service call in the system. It also publishes the service of standard interfaces on the internet which realizes cross-platform on sharing of resources. The feedback platform for rural people's livelihood projects provides online message, e-mail, SMS messages and other information feedback methods which can collect the effectiveness evaluation on the prophase, middle and late of rural livelihood construction projects in time.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130685043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Support Vector Machines Classification for High-Dimentional Dataset 高维数据集的支持向量机分类
Sipeng Wang
{"title":"Support Vector Machines Classification for High-Dimentional Dataset","authors":"Sipeng Wang","doi":"10.1109/MINES.2012.214","DOIUrl":"https://doi.org/10.1109/MINES.2012.214","url":null,"abstract":"For improve classification accuracy, this paper discusses the problem of feature selection for high-dimensional data and SVM parameter optimization. An SVM classification system based on simulated annealing (SA) is proposed to improve the performance of the SVM classifier. The experiments are conducted on the basis of benchmark dataset. The obtained results confirm the superiority of the SA-SVM approach compared to default parameters SVM classifier, grid search SVM parameter approach and suggest that further substantial improvements in terms of classification accuracy can be achieved by the proposed SA-SVM classification technique.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Steganography Based on Syndrome-Trellis Codes and Local Complexity 基于证格码和局部复杂度的自适应隐写
Guangjie Liu, Weiwei Liu, Yue-wei Dai, Shiguo Lian
{"title":"Adaptive Steganography Based on Syndrome-Trellis Codes and Local Complexity","authors":"Guangjie Liu, Weiwei Liu, Yue-wei Dai, Shiguo Lian","doi":"10.1109/MINES.2012.55","DOIUrl":"https://doi.org/10.1109/MINES.2012.55","url":null,"abstract":"Syndrome-trellis codes provide a flexible framework for adaptive steganography, but how to construct the proper distortion weight function is still a disturbing question. In this paper, we propose to use an exponential function based on the local complexity to define the risk caused by the data embedding. And the steganography based on the payload-adaptive embedding risk and syndrome-trellis codes is presented. Finally, an experiment is performed to verify its validity.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116645586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on Billing Strategy of Cloud Storage 云存储计费策略研究
Haitao Li, Yuliang Yang, Bin Zheng
{"title":"Research on Billing Strategy of Cloud Storage","authors":"Haitao Li, Yuliang Yang, Bin Zheng","doi":"10.1109/MINES.2012.172","DOIUrl":"https://doi.org/10.1109/MINES.2012.172","url":null,"abstract":"Cloud storage has become a active field of research with the development of Internet services. However, the corresponding billing system always cost users more money because of that the billing system is not suitable for the users' realistic application. To solve this problem, the author studied the existing billing system, analyzed the features of users and cloud storage providers, and proposed a billing strategy for cloud storage platform by the way of quantifying to ensure users only pay for the resources they truly use and meet users' wish to pay the least money. The author proved the correctness of the billing strategy through game theory.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116658064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An ID-based Designated-Verifier Proxy Multi-signature Scheme 基于身份的指定验证者代理多重签名方案
W. Zuo, Yunfang Liu, Sanfu Wang
{"title":"An ID-based Designated-Verifier Proxy Multi-signature Scheme","authors":"W. Zuo, Yunfang Liu, Sanfu Wang","doi":"10.1109/MINES.2012.64","DOIUrl":"https://doi.org/10.1109/MINES.2012.64","url":null,"abstract":"Designated verifier signature is a new cryptographic primitive, in a designated verifier signature scheme, only the designated verifier specified by the signer can verify the validity of the signature. In this paper, we propose an ID-based designated verifier proxy multi-signature scheme by combining the proxy multi-signature and the designated verifier signature. In our scheme, the designated verifier can verify the proxy-multi signature generated by the proxy signer on behalf of the group of original signers. Analysis shows that our scheme is secure and it is suitable for the practice in electronic world.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116813790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Malware Detection in Smartphone Using Hidden Markov Model 基于隐马尔可夫模型的智能手机恶意软件检测
Kejun Xin, Gang Li, Zhongyuan Qin, Qunfang Zhang
{"title":"Malware Detection in Smartphone Using Hidden Markov Model","authors":"Kejun Xin, Gang Li, Zhongyuan Qin, Qunfang Zhang","doi":"10.1109/MINES.2012.134","DOIUrl":"https://doi.org/10.1109/MINES.2012.134","url":null,"abstract":"In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection scheme based on Hidden Markov Model (HMM) which is different from the traditional signature scanning methods. Firstly, we monitor the key press and system function call sequence, and take the key press as hidden state. After decoding HMM model, abnormal process can be detected using the matching rate of HMM output to the actual key press sequence. The experimental results demonstrate that the proposed method can effectively detect mobile malwares.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133068735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Time-Angle Spectrum Sensing Based on Sliding Window MUSIC Algorithm 基于滑动窗口MUSIC算法的时角频谱感知
Du Liping, Liu Feifei, Chen Yueyun
{"title":"Time-Angle Spectrum Sensing Based on Sliding Window MUSIC Algorithm","authors":"Du Liping, Liu Feifei, Chen Yueyun","doi":"10.1109/MINES.2012.238","DOIUrl":"https://doi.org/10.1109/MINES.2012.238","url":null,"abstract":"Spectrum sensing is one of the key issues in cognitive radio. To explore all dimensions of the spectrum space, a sliding window MUSIC based spectrum sensing method is proposed to offer the spectrum holes in time-angle dimension. Simulation results show that the proposed method has better detection performance than conventional energy detection as well as high estimation accuracy.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133289307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信