default search action
ISI 2019: Shenzhen, China
- 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019, Shenzhen, China, July 1-3, 2019. IEEE 2019, ISBN 978-1-7281-2504-6
Part I: Long Paper
Human Behavior and Factors in the Security Applications
- Saike He, Changliang Li, Hailiang Wang, Xiaolong Zheng, Zhu Zhang, Jiaojiao Wang, Daniel Zeng:
Attention Allocation of Twitter Users in Geopolitics. 1-6 - Jinwei Liu, Wingyan Chung, Yifan Huang, Cagri Toraman:
CrossSimON: A Novel Probabilistic Approach to Cross-Platform Online Social Network Simulation. 7-12 - Mehul Vora, Wingyan Chung, Cagri Toraman, Yifan Huang:
SimON-Feedback: An Iterative Algorithm for Performance Tuning in Online Social Simulation. 13-17 - Kanlun Wang, Lina Zhou, Dongsong Zhang:
User Preferences and Situational Needs of Mobile User Authentication Methods. 18-23
Network Analytics in Security Informatics
- Brendan Kitts, Andrew Potter:
Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks. 24-29 - Agus Kurniawan, Marcel Kyas:
Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption. 30-34 - Wenzheng Li, Yijun Gu, An Wang, Kunming Li:
Improvement of Ego Network Detection Algorithm Based on Cluster Validity Index. 35-40 - Shuai Wang, Qingchao Kong, Yuqi Wang, Lei Wang:
Enhancing Rumor Detection in Social Media Using Dynamic Propagation Structures. 41-46 - Guorong Chen, Kun Wang, Jian Tan, Xiaoyong Li:
A Risk Assessment Method based on Software Behavior. 47-52 - Weifeng Xu, Jie Yan, Hongmei Chi:
A Forensic Evidence Acquisition Model for Data Leakage Attacks. 53-58 - Benjamin Ampel, Mark W. Patton, Hsinchun Chen:
Performance Modeling of Hyperledger Sawtooth Blockchain. 59-61
Predictive Analytics In Security Informatics
- Shaofang Zhou, Lanfen Lin, Junkun Yuan, Feng Wang, Zhaoting Ling, Jia Cui:
CNN-based DGA Detection with High Coverage. 62-67 - Wingyan Chung, Cagri Toraman, Yifan Huang, Mehul Vora, Jinwei Liu:
A Deep Learning Approach to Modeling Temporal Social Networks on Reddit. 68-73 - Yunji Liang, Jian Kang, Zhiwen Yu, Bin Guo, Xiaolong Zheng, Saike He:
Leverage Temporal Convolutional Network for the Representation Learning of URLs. 74-79
Security Analytics and Threat Intelligence
- Lior Perry, Bracha Shapira, Rami Puzis:
NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports. 80-85 - Francisco M. Rangel Pardo, Paolo Rosso, Anis Charfi, Wajdi Zaghouani:
Detecting Deceptive Tweets in Arabic for Cyber-Security. 86-91 - Nolan Arnold, Mohammadreza Ebrahimi, Ning Zhang, Ben Lazarine, Mark W. Patton, Hsinchun Chen, Sagar Samtani:
Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool. 92-97 - Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith:
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. 98-103
Text Analytics in Security Informatics
- Yuejiao Wang, Zhidong Cao:
Social Cognition Construction of the Avian Flu based on Social Media Big Data. 104-109 - Po-Yi Du, Mohammadreza Ebrahimi, Ning Zhang, Hsinchun Chen, Randall A. Brown, Sagar Samtani:
Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach. 110-115 - Saike He, Hongtao Yang, Xiaolong Zheng, Bo Wang, Yujun Zhou, Yanjun Xiong, Daniel Zeng:
Massive Meme Identification and Popularity Analysis in Geopolitics. 116-121 - Yujun Zhou, Changliang Li, Saike He, Xiaoqi Wang, Yiming Qiu:
Pre-trained Contextualized Representation for Chinese Conversation Topic Classification. 122-127 - Xinglin Xiao, Penghui Wei, Wenji Mao, Lei Wang:
Context-Aware Multi-View Attention Networks for Emotion Cause Extraction. 128-133
Part II: Short Paper
Human Behavior and Factors in the Security Applications
- Ruoran Liu, Qiudan Li, Daniel Dajun Zeng:
Inferring Users' Usage Patterns for Drug Abuse Surveillance. 134-136 - Jiaqi Liang, Linjing Li, Weiyun Chen, Daniel Zeng:
Towards an Understanding of Cryptocurrency: A Comparative Analysis of Cryptocurrency, Foreign Exchange, and Stock. 137-139 - Jiaojiao Wang, Jinglu Chen, Quannan Zu, Zhidong Cao, Saike He, Daniel Dajun Zeng:
Healthcare-seeking behavior study on Beijing Hand-Foot-Mouth Disease Patients. 140-142 - Jie Bai, Qingchao Kong, Linjing Li, Lei Wang, Daniel Zeng:
Exploring Cognitive Dissonance on Social Media. 143-145 - Chiyu Cai, Linjing Li, Weiyun Chen, Daniel Zeng:
Capturing Deep Dynamic Information for Mapping Users across Social Networks. 146-148 - Lindsey Thomas, Moises Balders, Zach Countney, Chen Zhong, Jun Yao, Chunxia Xu:
Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions. 149-151
Network Analytics in Security Informatics
- Jiale Liu, Yongzhong He:
Membership Detection for Real-world Groups Hidden in Social Network. 152-154 - Li Yang, Wenjie Guo, Yonggang Lu, Yi Yang, Lian Li, Zongli Liu:
Text Watermarking for OOXML Format Documents Based on Color Transformation. 155-157 - Jiaqi Liang, Linjing Li, Weiyun Chen, Daniel Zeng:
Targeted Addresses Identification for Bitcoin with Network Representation Learning. 158-160 - Jizhi Wang, Jingshan Pan, Xueli Wu:
The entropy source of pseudo random number generators: from low entropy to high entropy. 161-163 - Yingtao Niu, Cheng Li, Yan Liu, Yusheng Li:
Study on rigidity, flexibility, resilience and tenacity of anti-interference ability of wireless communication system. 164-166 - Yan Wu, Anthony Luo, Dianxiang Xu:
Forensic Analysis of Bitcoin Transactions. 167-169
Predictive Analytics in Security Informatics
- Dongyu Chen, Jennifer Jie Xu:
Does Appearance Matter? Exploring the Role of Facial Features for Judging Borrowers' Credibility in Online P2P Lending Markets. 170-172 - Jiange Zhang, Yue Chen, Kuiwu Yang, Jian Zhao, Xincheng Yan:
Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search. 173-175 - Yuru Xu, Mingming Zhang, Shaowu Wu, Junfeng Hu:
Lawsuit category prediction based on machine learning. 176-178 - Zhenyu Wu, Guangda Chen, Jingjing Yao:
The Corporation Lawsuit Prediction based on Guiding Learning and Collaborative Filtering Recommendation. 179-181 - Jiaqi Lang, Linjing Li, Weiyun Chen, Daniel Zeng:
Privacy Protection in Transformer-based Neural Network. 182-184 - Donglei Zhang, Jie Bai, Lei Wang, Min He, Yin Luo:
Identifying Risks of the Internet Finance Platforms Using Multi-Source Text Data. 185-187 - Wenjie Guo, Li Yang, Yonggang Lu, Yi Yang, Lian Li, Zongli Liu:
Information Hiding in OOXML Format Data based on the Splitting of Text Elements. 188-190 - Xin Ma, Xunjia Li, Yanjie Song, Xiaolong Zheng, Zhongshan Zhang, Renjie He:
A BP Neural Network for Identifying Corporate Financial Fraud. 191-193
Security Analytics and Threat Intelligence
- Tian Xia, Yijun Gu:
Building Terrorist Knowledge Graph from Global Terrorism Database and Wikipedia. 194-196 - Tianyi Wang, Kam-Pui Chow:
Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction. 197-199 - Masashi Kadoguchi, Shota Hayashi, Masaki Hashimoto, Akira Otsuka:
Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning. 200-202 - Jaewan Lim, Zhihui Liu, Lina Zhou:
Detection of Fraudulent Tweets: An Empirical Investigation Using Network Analysis and Deep Learning Technique. 203-205
Text Analytics in Security Informatics
- Changliang Li, Yujun Zhou, Saike He, Hailiang Wang:
Sentiment Analysis Based on Background Knowledge Attention. 206-208 - Yin Luo, Fangfang Wang, Feifei Zhao, Jianbin Guo, Lei Wang, Yanni Hao, Daniel Dajun Zeng:
A Framework for Policy Information Popularity Prediction in New Media. 209-211 - Hejing Liu, Qiudan Li, Riheng Yao, Daniel Dajun Zeng:
Analyzing Topics of JUUL Discussions on Social Media Using a Semantics-assisted NMF model. 212-214 - Riheng Yao, Qiudan Li, Wei-Hsuan Lo-Ciganic, Daniel Dajun Zeng:
A Prior Knowledge Based Neural Attention Model for Opioid Topic Identification. 215-217 - Peng Yan, Linjing Li, Weiyun Chen, Daniel Zeng:
Quantum-Inspired Density Matrix Encoder for Sexual Harassment Personal Stories Classification. 218-220
Part III: Poster
Human Behavior and Factors in the Security Applications
- Tianyi Luo, Zhidong Cao, Daniel Zeng:
Research on Information Dissemination of Public Health Events Based on WeChat: A Case Study of Avian Influenza. 221 - Yi Li, Kaiqi Xiong, Xiangyang Li:
Understanding User Behaviors When Phishing Attacks Occur. 222
Network Analytics In Security Informatics
- Zhaokang Ke, Cai Fu, Liqing Cao, Mingjun Yin, Xiwu Chen, Yang Li:
Community Partition immunization strategy based on Search Engine. 223 - Tan Hu State, Jianfei Chen, Wenting Wang, Hao Zhang:
Role-based Static Desensitization Protection Method. 224 - Xiao Liang, Heyao Chen:
A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address. 225 - Pinjie Sun, Liye Zhang:
Public Opinion Guidance Under the Background of Big Data Technology. 226 - Dominick Rizk, Rodrigue Rizk, Sonya H. Y. Hsu:
Applied Layered-Security Model to IoMT. 227 - Ayokomi Lasisi, Sonya H. Y. Hsu:
Consensus Mechanism in Enterprise Blockchain. 228
Predictive Analytics In Security Informatics
- Qianyu Wang, Saike He, Xiaolong Zheng, Daniel Zeng:
Marketing Pattern Risks Detection Based on Semi-Supervised Learning. 229
Security Analytics and Threat Intelligence
- Yanfei Liu, Zhenhua Wang, Guangyu Zhang:
Application of Multi-domain Stereo Prevention and Control Technology in Counter-terrorism. 230
Part IV: Invited Paper
- Bhavani Thuraisingham:
Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board. 231-236
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.