


default search action
ISI 2019: Shenzhen, China
- 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019, Shenzhen, China, July 1-3, 2019. IEEE 2019, ISBN 978-1-7281-2504-6

Part I: Long Paper
Human Behavior and Factors in the Security Applications
- Saike He, Changliang Li, Hailiang Wang, Xiaolong Zheng, Zhu Zhang, Jiaojiao Wang, Daniel Zeng:

Attention Allocation of Twitter Users in Geopolitics. 1-6 - Jinwei Liu, Wingyan Chung, Yifan Huang, Cagri Toraman

:
CrossSimON: A Novel Probabilistic Approach to Cross-Platform Online Social Network Simulation. 7-12 - Mehul Vora, Wingyan Chung, Cagri Toraman

, Yifan Huang:
SimON-Feedback: An Iterative Algorithm for Performance Tuning in Online Social Simulation. 13-17 - Kanlun Wang

, Lina Zhou, Dongsong Zhang:
User Preferences and Situational Needs of Mobile User Authentication Methods. 18-23
Network Analytics in Security Informatics
- Brendan Kitts, Andrew Potter:

Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks. 24-29 - Agus Kurniawan, Marcel Kyas

:
Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption. 30-34 - Wenzheng Li

, Yijun Gu, An Wang, Kunming Li:
Improvement of Ego Network Detection Algorithm Based on Cluster Validity Index. 35-40 - Shuai Wang, Qingchao Kong, Yuqi Wang, Lei Wang:

Enhancing Rumor Detection in Social Media Using Dynamic Propagation Structures. 41-46 - Guorong Chen, Kun Wang, Jian Tan, Xiaoyong Li:

A Risk Assessment Method based on Software Behavior. 47-52 - Weifeng Xu, Jie Yan, Hongmei Chi:

A Forensic Evidence Acquisition Model for Data Leakage Attacks. 53-58 - Benjamin Ampel

, Mark W. Patton, Hsinchun Chen:
Performance Modeling of Hyperledger Sawtooth Blockchain. 59-61
Predictive Analytics In Security Informatics
- Shaofang Zhou, Lanfen Lin, Junkun Yuan, Feng Wang, Zhaoting Ling, Jia Cui:

CNN-based DGA Detection with High Coverage. 62-67 - Wingyan Chung, Cagri Toraman

, Yifan Huang, Mehul Vora, Jinwei Liu:
A Deep Learning Approach to Modeling Temporal Social Networks on Reddit. 68-73 - Yunji Liang, Jian Kang, Zhiwen Yu

, Bin Guo
, Xiaolong Zheng, Saike He:
Leverage Temporal Convolutional Network for the Representation Learning of URLs. 74-79
Security Analytics and Threat Intelligence
- Lior Perry, Bracha Shapira

, Rami Puzis:
NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports. 80-85 - Francisco M. Rangel Pardo, Paolo Rosso, Anis Charfi, Wajdi Zaghouani

:
Detecting Deceptive Tweets in Arabic for Cyber-Security. 86-91 - Nolan Arnold, Mohammadreza Ebrahimi, Ning Zhang, Ben Lazarine, Mark W. Patton, Hsinchun Chen, Sagar Samtani

:
Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool. 92-97 - Mariam Nouh

, Jason R. C. Nurse, Michael Goldsmith:
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. 98-103
Text Analytics in Security Informatics
- Yuejiao Wang, Zhidong Cao:

Social Cognition Construction of the Avian Flu based on Social Media Big Data. 104-109 - Po-Yi Du, Mohammadreza Ebrahimi, Ning Zhang, Hsinchun Chen, Randall A. Brown, Sagar Samtani

:
Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach. 110-115 - Saike He, Hongtao Yang, Xiaolong Zheng, Bo Wang, Yujun Zhou, Yanjun Xiong, Daniel Zeng:

Massive Meme Identification and Popularity Analysis in Geopolitics. 116-121 - Yujun Zhou, Changliang Li, Saike He, Xiaoqi Wang, Yiming Qiu:

Pre-trained Contextualized Representation for Chinese Conversation Topic Classification. 122-127 - Xinglin Xiao, Penghui Wei, Wenji Mao, Lei Wang:

Context-Aware Multi-View Attention Networks for Emotion Cause Extraction. 128-133
Part II: Short Paper
Human Behavior and Factors in the Security Applications
- Ruoran Liu, Qiudan Li, Daniel Dajun Zeng:

Inferring Users' Usage Patterns for Drug Abuse Surveillance. 134-136 - Jiaqi Liang

, Linjing Li, Weiyun Chen, Daniel Zeng:
Towards an Understanding of Cryptocurrency: A Comparative Analysis of Cryptocurrency, Foreign Exchange, and Stock. 137-139 - Jiaojiao Wang, Jinglu Chen, Quannan Zu, Zhidong Cao, Saike He, Daniel Dajun Zeng:

Healthcare-seeking behavior study on Beijing Hand-Foot-Mouth Disease Patients. 140-142 - Jie Bai, Qingchao Kong, Linjing Li, Lei Wang, Daniel Zeng:

Exploring Cognitive Dissonance on Social Media. 143-145 - Chiyu Cai, Linjing Li, Weiyun Chen, Daniel Zeng:

Capturing Deep Dynamic Information for Mapping Users across Social Networks. 146-148 - Lindsey Thomas, Moises Balders, Zach Countney, Chen Zhong

, Jun Yao, Chunxia Xu:
Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions. 149-151
Network Analytics in Security Informatics
- Jiale Liu, Yongzhong He:

Membership Detection for Real-world Groups Hidden in Social Network. 152-154 - Li Yang, Wenjie Guo, Yonggang Lu, Yi Yang, Lian Li, Zongli Liu

:
Text Watermarking for OOXML Format Documents Based on Color Transformation. 155-157 - Jiaqi Liang

, Linjing Li, Weiyun Chen, Daniel Zeng:
Targeted Addresses Identification for Bitcoin with Network Representation Learning. 158-160 - Jizhi Wang, Jingshan Pan, Xueli Wu:

The entropy source of pseudo random number generators: from low entropy to high entropy. 161-163 - Yingtao Niu, Cheng Li, Yan Liu, Yusheng Li:

Study on rigidity, flexibility, resilience and tenacity of anti-interference ability of wireless communication system. 164-166 - Yan Wu, Anthony Luo

, Dianxiang Xu:
Forensic Analysis of Bitcoin Transactions. 167-169
Predictive Analytics in Security Informatics
- Dongyu Chen, Jennifer Jie Xu:

Does Appearance Matter? Exploring the Role of Facial Features for Judging Borrowers' Credibility in Online P2P Lending Markets. 170-172 - Jiange Zhang, Yue Chen, Kuiwu Yang, Jian Zhao, Xincheng Yan:

Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search. 173-175 - Yuru Xu, Mingming Zhang, Shaowu Wu, Junfeng Hu:

Lawsuit category prediction based on machine learning. 176-178 - Zhenyu Wu, Guangda Chen, Jingjing Yao:

The Corporation Lawsuit Prediction based on Guiding Learning and Collaborative Filtering Recommendation. 179-181 - Jiaqi Lang, Linjing Li, Weiyun Chen, Daniel Zeng:

Privacy Protection in Transformer-based Neural Network. 182-184 - Donglei Zhang, Jie Bai, Lei Wang, Min He, Yin Luo:

Identifying Risks of the Internet Finance Platforms Using Multi-Source Text Data. 185-187 - Wenjie Guo, Li Yang, Yonggang Lu, Yi Yang, Lian Li, Zongli Liu

:
Information Hiding in OOXML Format Data based on the Splitting of Text Elements. 188-190 - Xin Ma, Xunjia Li, Yanjie Song, Xiaolong Zheng, Zhongshan Zhang, Renjie He:

A BP Neural Network for Identifying Corporate Financial Fraud. 191-193
Security Analytics and Threat Intelligence
- Tian Xia, Yijun Gu:

Building Terrorist Knowledge Graph from Global Terrorism Database and Wikipedia. 194-196 - Tianyi Wang

, Kam-Pui Chow:
Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction. 197-199 - Masashi Kadoguchi, Shota Hayashi, Masaki Hashimoto

, Akira Otsuka:
Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning. 200-202 - Jaewan Lim

, Zhihui Liu, Lina Zhou:
Detection of Fraudulent Tweets: An Empirical Investigation Using Network Analysis and Deep Learning Technique. 203-205
Text Analytics in Security Informatics
- Changliang Li, Yujun Zhou, Saike He, Hailiang Wang:

Sentiment Analysis Based on Background Knowledge Attention. 206-208 - Yin Luo, Fangfang Wang, Feifei Zhao, Jianbin Guo, Lei Wang, Yanni Hao, Daniel Dajun Zeng:

A Framework for Policy Information Popularity Prediction in New Media. 209-211 - Hejing Liu, Qiudan Li, Riheng Yao, Daniel Dajun Zeng:

Analyzing Topics of JUUL Discussions on Social Media Using a Semantics-assisted NMF model. 212-214 - Riheng Yao, Qiudan Li, Wei-Hsuan Lo-Ciganic, Daniel Dajun Zeng:

A Prior Knowledge Based Neural Attention Model for Opioid Topic Identification. 215-217 - Peng Yan, Linjing Li, Weiyun Chen, Daniel Zeng:

Quantum-Inspired Density Matrix Encoder for Sexual Harassment Personal Stories Classification. 218-220
Part III: Poster
Human Behavior and Factors in the Security Applications
- Tianyi Luo, Zhidong Cao, Daniel Zeng:

Research on Information Dissemination of Public Health Events Based on WeChat: A Case Study of Avian Influenza. 221 - Yi Li, Kaiqi Xiong, Xiangyang Li:

Understanding User Behaviors When Phishing Attacks Occur. 222
Network Analytics In Security Informatics
- Zhaokang Ke, Cai Fu, Liqing Cao, Mingjun Yin, Xiwu Chen, Yang Li:

Community Partition immunization strategy based on Search Engine. 223 - Tan Hu State, Jianfei Chen, Wenting Wang, Hao Zhang:

Role-based Static Desensitization Protection Method. 224 - Xiao Liang

, Heyao Chen:
A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address. 225 - Pinjie Sun, Liye Zhang:

Public Opinion Guidance Under the Background of Big Data Technology. 226 - Dominick Rizk

, Rodrigue Rizk
, Sonya H. Y. Hsu:
Applied Layered-Security Model to IoMT. 227 - Ayokomi Lasisi, Sonya H. Y. Hsu:

Consensus Mechanism in Enterprise Blockchain. 228
Predictive Analytics In Security Informatics
- Qianyu Wang, Saike He, Xiaolong Zheng, Daniel Zeng:

Marketing Pattern Risks Detection Based on Semi-Supervised Learning. 229
Security Analytics and Threat Intelligence
- Yanfei Liu, Zhenhua Wang, Guangyu Zhang:

Application of Multi-domain Stereo Prevention and Control Technology in Counter-terrorism. 230
Part IV: Invited Paper
- Bhavani Thuraisingham:

Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board. 231-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














