Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)最新文献

筛选
英文 中文
Extracting control-flow from text 从文本中提取控制流
Pol Schumacher, Mirjam Minor
{"title":"Extracting control-flow from text","authors":"Pol Schumacher, Mirjam Minor","doi":"10.1109/IRI.2014.7051891","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051891","url":null,"abstract":"This paper is on control-flow extraction which is a part of workflow-extraction. Workflow extraction is the transformation of a textual process description into a formal workflow model. A textual process description is a form of representation for procedural knowledge. Procedural knowledge is \"know how to do it\"-knowledge. Workflow extraction opens the use of existing workflow retrieval methods for procedural knowledge which is expressed in natural language. In this paper we extended our existing workflow-extraction-framework with components for control-flow extraction. We present and evaluate two different approaches for control-flow extraction. For the evaluation of the control-flow we developed special evaluation functions which are based on the trace index of workflows. We show that our approaches for control-flow extraction are beneficiai compared with a sequential control-flow.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130311199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A study of clickjacking worm propagation in online social networks 在线社交网络中点击劫持蠕虫传播的研究
M. R. Faghani, U. T. Nguyen
{"title":"A study of clickjacking worm propagation in online social networks","authors":"M. R. Faghani, U. T. Nguyen","doi":"10.1109/IRI.2014.7051873","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051873","url":null,"abstract":"Clickjacking worms exploit online social network features such as Like and Share to propagate themselves in these networks. They trick a user into clicking on something different from what the user intends to click on. We discuss an implementation of such clickjacking malware and the way it propagates in a social network. We present simulation results that characterize the propagation of clickjacking malware in social networks. In particular, user habits of following posted links and the highly clustered structure of online social networks have significant impacts on the propagation speed of clickjacking malware.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Who wrote this paper? Learning for authorship de-identification using stylometric featuress 这篇论文是谁写的?使用文体学特征学习作者身份去识别
Jose L. Hurtado, Napat Taweewitchakreeya, Xingquan Zhu
{"title":"Who wrote this paper? Learning for authorship de-identification using stylometric featuress","authors":"Jose L. Hurtado, Napat Taweewitchakreeya, Xingquan Zhu","doi":"10.1109/IRI.2014.7051981","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051981","url":null,"abstract":"In this paper, we propose to combine stylometric features and neural networks for authorship de-identification. Our research mainly focuses on scientific publications, because scholarly journals are publicly available with plenty of labeled data to learn an author's style or traits. The main challenge of authorship de-identification is to identify features which can properly capture an author's writing style. In the proposed design, we choose a combination of stylometric features, including lexical, syntactic, structural and content-specific features, to represent each author's style and use them to build classification models. We manually collect publications from computer science and biomedicine domains and validate our designs by using a number of classification methods. Our experiments show that among four well-known classifiers, Multilayer Perceptron (MLP) classifiers achieve the best performance for authorship de-identification.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Text classification for automatic detection of alcohol use-related tweets: A feasibility study 酒精使用相关推文自动检测的文本分类:可行性研究
Y. Aphinyanaphongs, Bisakha Ray, A. Statnikov, P. Krebs
{"title":"Text classification for automatic detection of alcohol use-related tweets: A feasibility study","authors":"Y. Aphinyanaphongs, Bisakha Ray, A. Statnikov, P. Krebs","doi":"10.1109/IRI.2014.7051877","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051877","url":null,"abstract":"We present a feasibility study using text classification to classify tweets about alcohol use. Alcohol use is the most widely used substance in the US and is the leading risk factor for premature morbidity and mortality globally. Understanding use patterns and locations is an important step toward prevention, moderation, and control of alcohol outlets. Social media may provide an alternate way to measure alcohol use in real time. This feasibility study explores text classification methodologies for identifying alcohol use tweets. We labeled 34,563 geo-located New York City tweets collected in a 24 hour period over New Year's Day 2012. We preprocessed the tweets into stem/ not stemmed and unigram/ bigram representations. We then applied multinomial naïve Bayes, a linear SVM, Bayesian logistic regression, and random forests to the classification task. Using 10 fold cross-validation, the algorithms performed with area under the receiver operating curve of 0.66, 0.91, 0.93, and 0.94 respectively. We also compare to a human constructed Boolean search for the same tweets and the text classification method is competitive with this hand crafted search. In conclusion, we show that the task of automatically identifying alcohol related tweets is highly feasible and paves the way for future research to improve these classifiers.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
UFOM: Unified fuzzy ontology matching 统一模糊本体匹配
Yinuo Zhang, A. Panangadan, V. Prasanna
{"title":"UFOM: Unified fuzzy ontology matching","authors":"Yinuo Zhang, A. Panangadan, V. Prasanna","doi":"10.1109/IRI.2014.7051969","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051969","url":null,"abstract":"Unified Fuzzy Ontology Matching (UFOM) is an ontology matching system designed to discover semantic links between large real-world ontologies populated with entities from heterogeneous sources. In such ontologies, several entities in different ontologies are expected to be related to each other but not necessarily with one of the typical well-defined correspondence relationships (equivalent-to, subsumed-by). In particular, we define a new kind of correspondence relation called Relevance that reflects the relation between entities when they share a certain amount of mutual information. UFOM uses fuzzy set theory as a general framework for fuzzy ontology alignment. The framework enables representation of multiple types of correspondence relations and characterization of the uncertainty in the correspondence discovery process. UFOM computes multiple measures of similarity among ontology entities - syntactic, semantic, and structural. These measures are composed in a principled manner for ontology alignment. The system is evaluated using publicly available ontologies provided by Ontology Alignment Evaluation Initiative (OAEI). The performance of the proposed system is comparable to the top performing ontology matchers in OAEI. We also evaluate the UFOM system on a dataset from an enterprise application domain.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A cluster-based key management framework for resource constraint networks 基于集群的资源约束网络密钥管理框架
Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, D. Perkins, M. Bayoumi
{"title":"A cluster-based key management framework for resource constraint networks","authors":"Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, D. Perkins, M. Bayoumi","doi":"10.1109/IRI.2014.7051919","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051919","url":null,"abstract":"In this work, we propose a Cluster-based framework to be used for a resource constraint network. The proposed framework includes any pre-distribution key establishment schemes. It allows mobility and provides efficiency and security. We provide two instantiations to support our claim that the proposed framework improves security and scalability of the used keying establishment schemes. We develop analytical models and conduct extensive simulations to evaluate the security and performance of the proposed framework under different scenarios.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting unintentional information leakage in social media news comments 检测社交媒体新闻评论中的无意信息泄露
I. Yahav, D. Schwartz, Gahl Silverman
{"title":"Detecting unintentional information leakage in social media news comments","authors":"I. Yahav, D. Schwartz, Gahl Silverman","doi":"10.1109/IRI.2014.7051874","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051874","url":null,"abstract":"This paper is concerned with unintentional information leakage (UIL) through social networks, and in particular, Facebook Organizations often use forms of self censorship in order to maintain security. Non-identification of individuals, products, or places is seen as a sufficient means of information protection. A prime example is the replacement of a name with a supposedly non-identifying initial. This has traditionally been effective in obfuscating the identity of military personnel, protected witnesses, minors, victims or suspects who need to be granted a level of protection through anonymity. We challenge the effectiveness of this form of censorship in light of current uses and ongoing developments in Social Networks showing that name-obfits cation mandated by court or military order can be systematically compromised through the unintentional actions of public social network commenters. We propose a qualitative method for recognition and characterization of UIL followed by a quantitative study that automatically detects UIL comments.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131902919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A CEGAR approach for the reachability analysis of PLC-controlled chemical plants plc控制化工厂可达性分析的CEGAR方法
J. Nellen, E. Ábrahám
{"title":"A CEGAR approach for the reachability analysis of PLC-controlled chemical plants","authors":"J. Nellen, E. Ábrahám","doi":"10.1109/IRI.2014.7051930","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051930","url":null,"abstract":"In this paper we address the safety analysis of chemical plants controlled by programmable logic controllers (PLCs). We consider sequential function charts (SFCs)for the programming of the PLCs, extended with the specification of the dynamic plant behavior. The resulting hybrid SFC models can be transformed to hybrid automata, opening the way to the application of advanced techniques for their reachability analysis. However, the hybrid automata models are often too large to be analyzed. To keep the size of the models moderate, we propose a counterexample-guided abstraction refinement (CEGAR) approach, which starts with the purely discrete SFC model of the controller and extends it with those parts of the dynamic behavior, which are relevant for proving or disproving safety.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133216747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Correlation-based re-ranking for semantic concept detection 基于关联的语义概念重排序检测
Hsin-Yu Ha, Fausto Fleites, Shu‐Ching Chen, Min Chen
{"title":"Correlation-based re-ranking for semantic concept detection","authors":"Hsin-Yu Ha, Fausto Fleites, Shu‐Ching Chen, Min Chen","doi":"10.1109/IRI.2014.7051966","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051966","url":null,"abstract":"Semantic concept detection is among the most important and challenging topics in multimedia research. Its objective is to effectively identify high-level semantic concepts from low-level features for multimedia data analysis and management. In this paper, a novel re-ranking method is proposed based on correlation among concepts to automatically refine detection results and improve detection accuracy. Specifically, multiple correspondence analysis (MCA) is utilized to capture the relationship between a targeted concept and all other semantic concepts. Such relationship is then used as a transaction weight to refine detection ranking scores. To demonstrate its effectiveness in refining semantic concept detection, the proposed re-ranking method is applied to the detection scores of TRECVID 2011 benchmark data set, and its performance is compared with other state-of-the-art re-ranking approaches.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131346284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring DiCoTraM:一种分布式和协调的DDoS洪水攻击,为流量监控量身定制
S. Zargar, J. Joshi, D. Tipper
{"title":"DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring","authors":"S. Zargar, J. Joshi, D. Tipper","doi":"10.1109/IRI.2014.7051881","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051881","url":null,"abstract":"The success in detecting Distributed Denial of Service (DDoS) flooding attacks is highly dependent on the quality and quantity of the covered flows by the traffic monitoring mechanism that is employed in any DDoS defense mechanism. In this paper, we propose DiCoTraM, a DDoS flooding attack tailored distributed and coordinated traffic monitoring mechanism that centrally and periodically coordinates the monitoring responsibilities and distributes them among all the monitoring devices within each autonomous system (AS) while satisfying the monitoring devices' memory constraints. DiCoTraM monitors traffic flows in such a way that the flows intended for the same destination (possible network/transport level DDoS flooding attack flows) are analyzed together in the same monitoring device if there is enough memory to cover those flows on the monitoring device; hence, this can enable distributed detection mechanisms in place to analyze the monitored flows. The enabled distributed detection leads to reduced communication overhead that is a problem in centralized detection mechanisms as they need to collect centrally all the flows for analysis. Moreover, the centralized coordination structure of DiCoTraM eliminates the redundant flow monitoring among the routers. We simulate and compare DiCoTraM with other traffic monitoring mechanisms in terms of: the overall flow coverage, and the DDoS flooding attack flow coverage. The experimental results show that DiCoTraM, compared to other monitoring mechanisms, covers more DDoS flooding attack flows and it has reasonable overall flow coverage.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116596170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信