workshop on intelligence and securityinformatics (WISI'06) will be held on April 9, 2006, in *** will be co-sponsored by Chinese University of Hong Kong, Nanyang Technological University, Universityof Arizona, an...
详细信息
workshop on intelligence and securityinformatics (WISI'06) will be held on April 9, 2006, in *** will be co-sponsored by Chinese University of Hong Kong, Nanyang Technological University, Universityof Arizona, and Chinese Academy of Sciences. intelligence and securityinformatics (ISI) can be broadlydefined as the study of the development and use of advanced information technologies and systems fornational and international security-related applications. The First and Second Symposiums on ISI were
The proceedings contain 30 papers. The special focus in this conference is on intelligence and securityinformatics. The topics include: Deep Cascade of Extra Trees;algorithms for an Efficient Tensor Biclustering;chan...
ISBN:
(纸本)9783030261412
The proceedings contain 30 papers. The special focus in this conference is on intelligence and securityinformatics. The topics include: Deep Cascade of Extra Trees;algorithms for an Efficient Tensor Biclustering;change Point Detection in Periodic Panel Data Using a Mixture-Model-Based Approach;neural Network-Based Deep Encoding for Mixed-Attribute Data Classification;protein Complexes Detection Based on Deep Neural Network;predicting Auction Price of Vehicle License Plate with Deep Residual Learning;mining Multispectral Aerial Images for Automatic Detection of Strategic Bridge Locations for Disaster Relief Missions;spike Sorting with Locally Weighted Co-association Matrix-Based Spectral Clustering;label Distribution Learning Based Age-Invariant Face Recognition;an Investigation on Multi View Based User Behavior Towards Spam Detection in Social Networks;overall Loss for Deep Neural Networks;Sentiment Analysis Based on LSTM Architecture with Emoticon Attention;aspect Level Sentiment Analysis with Aspect Attention;transfer Channel Pruning for Compressing Deep Domain Adaptation Models;a Heterogeneous Domain Adversarial Neural Network for Trans-Domain Behavioral Targeting;natural Language Business intelligence Question Answering Through SeqtoSeq Transfer Learning;Robust Faster R-CNN: Increasing Robustness to Occlusions and Multi-scale Objects;effectively Representing Short Text via the Improved Semantic Feature Space Mapping;probabilistic Graphical Model Based Highly Scalable Directed Community Detection Algorithm;hilltop Based Recommendation in Co-author Networks;a Cluster Ensemble Strategy for asian Handicap Betting;neural Variational Collaborative Filtering for Top-K Recommendation;designing an Integrated intelligence Center: New Taipei City Police Department as an Example;early Churn User Classification in Social Networking Service Using Attention-Based Long Short-Term Memory.
The proceedings contain 9 papers. The special focus in this conference is on intelligence and securityinformatics. The topics include: The cyberbullying assessment of capable guardianship in routine activity theory;t...
ISBN:
(纸本)9783319574622
The proceedings contain 9 papers. The special focus in this conference is on intelligence and securityinformatics. The topics include: The cyberbullying assessment of capable guardianship in routine activity theory;the hierarchy of cyber war definitions;differentiating the investigation response process of cyber security incident for LEAS;on the vulnerability of classifiers to exploratory attacks;a structural based community similarity algorithm and its application in scientific event detection;link prediction in temporal heterogeneous networks;credit risk evaluation for loan guarantee chain in china;VQ coding in data hiding using correlated neighboring blocks in security performance;idology and its applications in public security and network security.
The proceedings contain 9 papers. The special focus in this conference is on intelligence and securityinformatics. The topics include: Media REVEALr: a social multimedia monitoring and intelligence system for web mul...
ISBN:
(纸本)9783319184548
The proceedings contain 9 papers. The special focus in this conference is on intelligence and securityinformatics. The topics include: Media REVEALr: a social multimedia monitoring and intelligence system for web multimedia verification;geotagging social media content with a refined language modelling approach;predicting vehicle recalls with user-generated contents;a greedy-based cross-matching algorithm for identifying users across multiple online social networks;P2P lending fraud detection;drug anti-forgery and tracing system based on lightweight asymmetric identities;Chinese word pos tagging with Markov logic and in search of plagiarism behaviors.
The proceedings contain 7 papers. The topics discussed include: rational choice observation of malware authors in Taiwan;knowledge management in cybercrime investigation a case study of identifying cybercrime investig...
ISBN:
(纸本)9783319066769
The proceedings contain 7 papers. The topics discussed include: rational choice observation of malware authors in Taiwan;knowledge management in cybercrime investigation a case study of identifying cybercrime investigation knowledge in Taiwan;user management in information security engineering environment ISEE;active and personalized services in an information security engineering cloud based on ISO/IEC 15408;identify the online product comments with suspicious Chinese content;automatically explore inter-discipline technology from Chinese patent documents;and a LDA feature grouping method for subspace clustering of text data.
The proceedings contain 34 papers. The topics discussed include: analyzing and visualizing gray web forum structure;an empirical analysis of online gaming crime characteristics from 2002 to 2004;detecting cyber securi...
详细信息
ISBN:
(纸本)9783540715481
The proceedings contain 34 papers. The topics discussed include: analyzing and visualizing gray web forum structure;an empirical analysis of online gaming crime characteristics from 2002 to 2004;detecting cyber security threats in weblogs using probabilistic models;agent based framework for emergency rescue and assistance planning;object tracking with self-updating tracking window;a case-based evolutionary group decision support method for emergency response;lightweight anomaly intrusion detection in wireless sensor networks;research on hidden Markov model for system call anomaly detection;towards identifying true threat from network security data;security assessment for application network services using fault injection;a secure data transmission protocol for mobile ad hoc networks;a novel relational database watermarking algorithm;anticipatory event detection for bursty events;and the treelike assembly classifier for pedestrian detection.
The proceedings contain 17 papers. The topics discussed include: cloud-centric assured information sharing;information credibility on twitter in emergency situation;multi-layer network for influence propagation over m...
ISBN:
(纸本)9783642304279
The proceedings contain 17 papers. The topics discussed include: cloud-centric assured information sharing;information credibility on twitter in emergency situation;multi-layer network for influence propagation over microblog;process mining and security: visualization in database intrusion detection;securing advanced metering infrastructure using intrusion detection system with data stream mining;a universal toolkit for cryptographically secure privacy-preserving data mining;identifying walk cycles for human recognition*;Chinese organization name recognition based on multiple features*;a plagiarism detection system for Arabic text-based documents*;multi-committer threshold commitment scheme from lattice;conjunctive keywords searchable encryption with efficient pairing, constant ciphertext and short trapdoor;and a simultaneous members enrollment and revocation protocol for secret sharing schemes*.
The proceedings contain 11 papers. The topics discussed include: belief manipulation: a formal model of deceit in message passing systems;region of interest discovery in location-based social networking services with ...
ISBN:
(纸本)9783642396922
The proceedings contain 11 papers. The topics discussed include: belief manipulation: a formal model of deceit in message passing systems;region of interest discovery in location-based social networking services with protected locations;label micro-blog topics using the Bayesian inference method;collective intelligence for suicide surveillance in web forums;computing optimal attack strategies using unconstrained influence diagrams;identifying peer influence in online social networks using transfer entropy;modeling relationship strength for link prediction;what is the uniqueness of growth pattern in human flesh search organization?;energy saving replay attack prevention in clustered wireless sensor networks;detecting web attacks based on domain statistics;and a novel key scheme based on QR decomposition for wireless sensor networks.
暂无评论