Brett Jefferson, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin
{"title":"The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique","authors":"Brett Jefferson, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin","doi":"10.1109/ISI53945.2021.9624683","DOIUrl":"https://doi.org/10.1109/ISI53945.2021.9624683","url":null,"abstract":"This paper presents an interface and analysis technique for quickly conducting expert elicitation with the goal of determining entity importance. Our interface deploys a two-alternative choice experiment that is capable of representing knowledge graphs in an easy to interpret fashion for users with limited experience with knowledge graphs. Our analysis methodology takes advantage of conjoint analysis techniques and provides entity weights for many SMEs simultaneously. The results largely align with individual participant fits.","PeriodicalId":347770,"journal":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133612693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations","authors":"Xingwei Zhang, Xiaolong Zheng, W. Mao","doi":"10.1109/ISI53945.2021.9624750","DOIUrl":"https://doi.org/10.1109/ISI53945.2021.9624750","url":null,"abstract":"The rapid development of Internet and online data explosions elicit strong aspirations for users to search for semantic relevant information based on available samples. While the data online are always released with different modalities like images, videos or texts, effective retrieval models should discover latent semantic information with different structures. Recently, the state-of-the-art deep cross modal retrieval frameworks have effectively enhanced the performance on commonly-used platforms using the deep neural networks (DNNs). Yet DNNs have been verified to be easily misguided by small perturbations, and there are already several attack generation methods proposed on DNN-based models for real-world tasks, but they are all focused on supervised tasks like classification or object recognition. To effectively evaluate the robustness of deep cross-modal retrieval frameworks, in this paper, we propose a retrieval-based adversarial perturbation generation method, and demonstrate that our perturbation could effectively attack the state-of-the-art deep cross-modal and single image retrieval hashing models.","PeriodicalId":347770,"journal":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Othmane Cherqi, Hicham Hammouchi, M. Ghogho, H. Benbrahim
{"title":"Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study","authors":"Othmane Cherqi, Hicham Hammouchi, M. Ghogho, H. Benbrahim","doi":"10.1109/ISI53945.2021.9624677","DOIUrl":"https://doi.org/10.1109/ISI53945.2021.9624677","url":null,"abstract":"Understanding the properties exhibited by Spatial-temporal evolution of cyber attacks improve cyber threat intelligence. In addition, better understanding on threats patterns is a key feature for cyber threats prevention, detection, and management and for enhancing defenses. In this work, we study different aspects of emerging threats in the wild shared by 160,000 global participants form all industries. First, we perform an exploratory data analysis of the collected cyber threats. We investigate the most targeted countries, most common malwares and the distribution of attacks frequency by localisation. Second, we extract attacks’ spreading patterns at country level. We model these behaviors using transition graphs decorated with probabilities of switching from a country to another. Finally, we analyse the extent to which cyber threats have been affected by the COVID-19 outbreak and sanitary measures imposed by governments to prevent the virus from spreading.","PeriodicalId":347770,"journal":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, A. Joshi
{"title":"Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase","authors":"Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, A. Joshi","doi":"10.13016/M2XUYO-LZ8V","DOIUrl":"https://doi.org/10.13016/M2XUYO-LZ8V","url":null,"abstract":"Rapid advancements in Cyber-Physical System (CPS) capabilities have motivated farmers to deploy this ecosystem on their farms. However, there is a growing concern among users regarding the security risks associated with CPS. Especially with rising number of cyber-attacks on CPS, such as modifying sensor readings, interrupting operations, etc. Therefore, this paper describes a security surveillance framework to detect deviations in the ecosystem by incorporating a digital twin supported anomaly detection model. The reason for incorporating digital twins is that they add value by enabling real-time monitoring of connected smart farms. We pre-process the collected data from sensors deployed on the smart farm setup. The pre-processed data is fused with our smart farm ontology to populate a knowledge graph. The generated graph is further queried to extract the necessary sensor data. We utilize the extracted normal data to train the anomaly detection model. Further, we tested our model if it identifies abnormal values from sensors by simulating anomalous use case scenarios specific to our ecosystem.","PeriodicalId":347770,"journal":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116486649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}