{"title":"Least Cost Precision Marketing Based on User Profiles in Social Networks","authors":"Mengyi Chen, Li Pan","doi":"10.1109/SSIC.2018.8556743","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556743","url":null,"abstract":"With the booming development of online marketing in social networks, it is increasingly valuable to adopt precision marketing based on user profiles by analyzing users’ behaviors and attributes. In this paper, the Least Cost Precision Marketing problem based on User Profiles in social networks (LCPM-UP problem) is proposed. Its objective is to minimize the cost to choose initial users while at least J target users described by certain user profile are influenced. Considering that users have different propagation capabilities in social networks, a novel propagation model named Limited Diffusion Independent Cascade model (LD-IC model) is presented. It is proved that the LCPM-UP problem in LD-IC model is NP-hard and the influence propagation function is submodular and monotonically increasing. Therefore, a greedy algorithm is developed for the problem. However, the greedy algorithm is too time consuming to be scalable to large networks, so the Target User Local Influence Heuristic algorithm (TU-LIH) is proposed by utilizing local influences of each node to approximate the influence propagation in LD-IC model. Extensive experiments on datasets from four real social networks demonstrate the effectiveness and efficiency of proposed algorithms.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133705932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adja Elloh Yves-Christian, Badis Hammi, A. Serhrouchni, H. Labiod
{"title":"Total Eclipse: How To Completely Isolate a Bitcoin Peer","authors":"Adja Elloh Yves-Christian, Badis Hammi, A. Serhrouchni, H. Labiod","doi":"10.1109/SSIC.2018.8556790","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556790","url":null,"abstract":"In the cryptocurrency world, Bitcoin holds the first place in terms of market cap and currency price, which makes it the first target and victim of attack attempts. Indeed, there are various attacks against cryptocurrencies in general and Bitcoin in particular, e.g., block withholding, transaction malleability and the Eclipse attack. The latter, allows an attacker to completely isolate a peer and to monopolize all permanent connections from/to the victim. However, in this attack, the non permanent connections, remains non monopolized by the attacker, which can disturb the attack success. In this paper, we propose (1) a characterization of the misbehavior mechanism applied by Bitcoin and its weaknesses; and (2) a new method to realize the Eclipse attack which monopolizes all the peer’s connections, even the non permanent ones, with a minimal number of IP addresses. Our characterization and attack realization, were performed on the main Bitcoin network and on a real client.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115519252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Civil Airborne Task Scheduling Test Platform Supporting Provable Data Possession","authors":"Gaobo Sun, Shuyu Li, Zhanchun Kang","doi":"10.1109/SSIC.2018.8556815","DOIUrl":"https://doi.org/10.1109/SSIC.2018.8556815","url":null,"abstract":"Civil airborne test platform for task scheduling generates and stores large amounts of data during the testing phase, but these data may be corrupted due to incorrect operation or malicious behavior. Trying to solve this problem, a civil airborne test platform for task scheduling supporting data integrity verification is proposed in the paper. Firstly the modular architecture of the test platform is presented. Then an algorithm for data integrity verification based on Provable Data Possession (PDP) is described in detail and is integrated into the test platform. Finally, the experimental result shows that the test platform can improve the testing efficiency of the civil airborne software while guaranteeing the integrity of the data.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"65 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}