2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)最新文献

筛选
英文 中文
Least Cost Precision Marketing Based on User Profiles in Social Networks 基于社交网络用户档案的最小成本精准营销
Mengyi Chen, Li Pan
{"title":"Least Cost Precision Marketing Based on User Profiles in Social Networks","authors":"Mengyi Chen, Li Pan","doi":"10.1109/SSIC.2018.8556743","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556743","url":null,"abstract":"With the booming development of online marketing in social networks, it is increasingly valuable to adopt precision marketing based on user profiles by analyzing users’ behaviors and attributes. In this paper, the Least Cost Precision Marketing problem based on User Profiles in social networks (LCPM-UP problem) is proposed. Its objective is to minimize the cost to choose initial users while at least J target users described by certain user profile are influenced. Considering that users have different propagation capabilities in social networks, a novel propagation model named Limited Diffusion Independent Cascade model (LD-IC model) is presented. It is proved that the LCPM-UP problem in LD-IC model is NP-hard and the influence propagation function is submodular and monotonically increasing. Therefore, a greedy algorithm is developed for the problem. However, the greedy algorithm is too time consuming to be scalable to large networks, so the Target User Local Influence Heuristic algorithm (TU-LIH) is proposed by utilizing local influences of each node to approximate the influence propagation in LD-IC model. Extensive experiments on datasets from four real social networks demonstrate the effectiveness and efficiency of proposed algorithms.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133705932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Total Eclipse: How To Completely Isolate a Bitcoin Peer 《日全食:如何完全隔离比特币同行
Adja Elloh Yves-Christian, Badis Hammi, A. Serhrouchni, H. Labiod
{"title":"Total Eclipse: How To Completely Isolate a Bitcoin Peer","authors":"Adja Elloh Yves-Christian, Badis Hammi, A. Serhrouchni, H. Labiod","doi":"10.1109/SSIC.2018.8556790","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556790","url":null,"abstract":"In the cryptocurrency world, Bitcoin holds the first place in terms of market cap and currency price, which makes it the first target and victim of attack attempts. Indeed, there are various attacks against cryptocurrencies in general and Bitcoin in particular, e.g., block withholding, transaction malleability and the Eclipse attack. The latter, allows an attacker to completely isolate a peer and to monopolize all permanent connections from/to the victim. However, in this attack, the non permanent connections, remains non monopolized by the attacker, which can disturb the attack success. In this paper, we propose (1) a characterization of the misbehavior mechanism applied by Bitcoin and its weaknesses; and (2) a new method to realize the Eclipse attack which monopolizes all the peer’s connections, even the non permanent ones, with a minimal number of IP addresses. Our characterization and attack realization, were performed on the main Bitcoin network and on a real client.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Research on Civil Airborne Task Scheduling Test Platform Supporting Provable Data Possession 支持可证明数据占有的民用机载任务调度测试平台研究
Gaobo Sun, Shuyu Li, Zhanchun Kang
{"title":"Research on Civil Airborne Task Scheduling Test Platform Supporting Provable Data Possession","authors":"Gaobo Sun, Shuyu Li, Zhanchun Kang","doi":"10.1109/SSIC.2018.8556815","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556815","url":null,"abstract":"Civil airborne test platform for task scheduling generates and stores large amounts of data during the testing phase, but these data may be corrupted due to incorrect operation or malicious behavior. Trying to solve this problem, a civil airborne test platform for task scheduling supporting data integrity verification is proposed in the paper. Firstly the modular architecture of the test platform is presented. Then an algorithm for data integrity verification based on Provable Data Possession (PDP) is described in detail and is integrated into the test platform. Finally, the experimental result shows that the test platform can improve the testing efficiency of the civil airborne software while guaranteeing the integrity of the data.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"65 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信