ISI C

64 papers

YearTitle / Authors
20192019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019, Shenzhen, China, July 1-3, 2019
2019A BP Neural Network for Identifying Corporate Financial Fraud.
Xin Ma, Xunjia Li, Yanjie Song, Xiaolong Zheng, Zhongshan Zhang, Renjie He
2019A Deep Learning Approach to Modeling Temporal Social Networks on Reddit.
Wingyan Chung, Cagri Toraman, Yifan Huang, Mehul Vora, Jinwei Liu
2019A Forensic Evidence Acquisition Model for Data Leakage Attacks.
Weifeng Xu, Jie Yan, Hongmei Chi
2019A Framework for Policy Information Popularity Prediction in New Media.
Yin Luo, Fangfang Wang, Feifei Zhao, Jianbin Guo, Lei Wang, Yanni Hao, Daniel Dajun Zeng
2019A Prior Knowledge Based Neural Attention Model for Opioid Topic Identification.
Riheng Yao, Qiudan Li, Wei-Hsuan Lo-Ciganic, Daniel Dajun Zeng
2019A Risk Assessment Method based on Software Behavior.
Guorong Chen, Kun Wang, Jian Tan, Xiaoyong Li
2019A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address.
Xiao Liang, Heyao Chen
2019Analyzing Topics of JUUL Discussions on Social Media Using a Semantics-assisted NMF model.
Hejing Liu, Qiudan Li, Riheng Yao, Daniel Dajun Zeng
2019Application of Multi-domain Stereo Prevention and Control Technology in Counter-terrorism.
Yanfei Liu, Zhenhua Wang, Guangyu Zhang
2019Applied Layered-Security Model to IoMT.
Dominick Rizk, Rodrigue Rizk, Sonya H. Y. Hsu
2019Attention Allocation of Twitter Users in Geopolitics.
Saike He, Changliang Li, Hailiang Wang, Xiaolong Zheng, Zhu Zhang, Jiaojiao Wang, Daniel Zeng
2019Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction.
Tianyi Wang, Kam-Pui Chow
2019Building Terrorist Knowledge Graph from Global Terrorism Database and Wikipedia.
Tian Xia, Yijun Gu
2019CNN-based DGA Detection with High Coverage.
Shaofang Zhou, Lanfen Lin, Junkun Yuan, Feng Wang, Zhaoting Ling, Jia Cui
2019Capturing Deep Dynamic Information for Mapping Users across Social Networks.
Chiyu Cai, Linjing Li, Weiyun Chen, Daniel Zeng
2019Community Partition immunization strategy based on Search Engine.
Zhaokang Ke, Cai Fu, Liqing Cao, Mingjun Yin, Xiwu Chen, Yang Li
2019Consensus Mechanism in Enterprise Blockchain.
Ayokomi Lasisi, Sonya H. Y. Hsu
2019Context-Aware Multi-View Attention Networks for Emotion Cause Extraction.
Xinglin Xiao, Penghui Wei, Wenji Mao, Lei Wang
2019CrossSimON: A Novel Probabilistic Approach to Cross-Platform Online Social Network Simulation.
Jinwei Liu, Wingyan Chung, Yifan Huang, Cagri Toraman
2019Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board.
Bhavani Thuraisingham
2019Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions.
Lindsey Thomas, Moises Balders, Zach Countney, Chen Zhong, Jun Yao, Chunxia Xu
2019Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool.
Nolan Arnold, Mohammadreza Ebrahimi, Ning Zhang, Ben Lazarine, Mark W. Patton, Hsinchun Chen, Sagar Samtani
2019Detecting Deceptive Tweets in Arabic for Cyber-Security.
Francisco M. Rangel Pardo, Paolo Rosso, Anis Charfi, Wajdi Zaghouani
2019Detection of Fraudulent Tweets: An Empirical Investigation Using Network Analysis and Deep Learning Technique.
Jaewan Lim, Zhihui Liu, Lina Zhou
2019Does Appearance Matter? Exploring the Role of Facial Features for Judging Borrowers' Credibility in Online P2P Lending Markets.
Dongyu Chen, Jennifer Jie Xu
2019Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks.
Brendan Kitts, Andrew Potter
2019Enhancing Rumor Detection in Social Media Using Dynamic Propagation Structures.
Shuai Wang, Qingchao Kong, Yuqi Wang, Lei Wang
2019Exploring Cognitive Dissonance on Social Media.
Jie Bai, Qingchao Kong, Linjing Li, Lei Wang, Daniel Zeng
2019Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning.
Masashi Kadoguchi, Shota Hayashi, Masaki Hashimoto, Akira Otsuka
2019Forensic Analysis of Bitcoin Transactions.
Yan Wu, Anthony Luo, Dianxiang Xu
2019Healthcare-seeking behavior study on Beijing Hand-Foot-Mouth Disease Patients.
Jiaojiao Wang, Jinglu Chen, Quannan Zu, Zhidong Cao, Saike He, Daniel Dajun Zeng
2019Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach.
Po-Yi Du, Mohammadreza Ebrahimi, Ning Zhang, Hsinchun Chen, Randall A. Brown, Sagar Samtani
2019Identifying Risks of the Internet Finance Platforms Using Multi-Source Text Data.
Donglei Zhang, Jie Bai, Lei Wang, Min He, Yin Luo
2019Improvement of Ego Network Detection Algorithm Based on Cluster Validity Index.
Wenzheng Li, Yijun Gu, An Wang, Kunming Li
2019Inferring Users' Usage Patterns for Drug Abuse Surveillance.
Ruoran Liu, Qiudan Li, Daniel Dajun Zeng
2019Information Hiding in OOXML Format Data based on the Splitting of Text Elements.
Wenjie Guo, Li Yang, Yonggang Lu, Yi Yang, Lian Li, Zongli Liu
2019Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search.
Jiange Zhang, Yue Chen, Kuiwu Yang, Jian Zhao, Xincheng Yan
2019Lawsuit category prediction based on machine learning.
Yuru Xu, Mingming Zhang, Shaowu Wu, Junfeng Hu
2019Leverage Temporal Convolutional Network for the Representation Learning of URLs.
Yunji Liang, Jian Kang, Zhiwen Yu, Bin Guo, Xiaolong Zheng, Saike He
2019Marketing Pattern Risks Detection Based on Semi-Supervised Learning.
Qianyu Wang, Saike He, Xiaolong Zheng, Daniel Zeng
2019Massive Meme Identification and Popularity Analysis in Geopolitics.
Saike He, Hongtao Yang, Xiaolong Zheng, Bo Wang, Yujun Zhou, Yanjun Xiong, Daniel Zeng
2019Membership Detection for Real-world Groups Hidden in Social Network.
Jiale Liu, YongZhong He
2019NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports.
Lior Perry, Bracha Shapira, Rami Puzis
2019Performance Modeling of Hyperledger Sawtooth Blockchain.
Benjamin Ampel, Mark W. Patton, Hsinchun Chen
2019Pre-trained Contextualized Representation for Chinese Conversation Topic Classification.
Yujun Zhou, Changliang Li, Saike He, Xiaoqi Wang, Yiming Qiu
2019Privacy Protection in Transformer-based Neural Network.
Jiaqi Lang, Linjing Li, Weiyun Chen, Daniel Zeng
2019Public Opinion Guidance Under the Background of Big Data Technology.
Pinjie Sun, Liye Zhang
2019Quantum-Inspired Density Matrix Encoder for Sexual Harassment Personal Stories Classification.
Peng Yan, Linjing Li, Weiyun Chen, Daniel Zeng
2019Research on Information Dissemination of Public Health Events Based on WeChat: A Case Study of Avian Influenza.
Tianyi Luo, Zhidong Cao, Daniel Zeng
2019Role-based Static Desensitization Protection Method.
Tan Hu State, Jianfei Chen, Wenting Wang, Hao Zhang
2019Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption.
Agus Kurniawan, Marcel Kyas
2019Sentiment Analysis Based on Background Knowledge Attention.
Changliang Li, Yujun Zhou, Saike He, Hailiang Wang
2019SimON-Feedback: An Iterative Algorithm for Performance Tuning in Online Social Simulation.
Mehul Vora, Wingyan Chung, Cagri Toraman, Yifan Huang
2019Social Cognition Construction of the Avian Flu based on Social Media Big Data.
Yuejiao Wang, Zhidong Cao
2019Study on rigidity, flexibility, resilience and tenacity of anti-interference ability of wireless communication system.
Yingtao Niu, Cheng Li, Yan Liu, Yusheng Li
2019Targeted Addresses Identification for Bitcoin with Network Representation Learning.
Jiaqi Liang, Linjing Li, Weiyun Chen, Daniel Zeng
2019Text Watermarking for OOXML Format Documents Based on Color Transformation.
Li Yang, Wenjie Guo, Yonggang Lu, Yi Yang, Lian Li, Zongli Liu
2019The Corporation Lawsuit Prediction based on Guiding Learning and Collaborative Filtering Recommendation.
Zhenyu Wu, Guangda Chen, Jingjing Yao
2019The entropy source of pseudo random number generators: from low entropy to high entropy.
Jizhi Wang, Jingshan Pan, Xueli Wu
2019Towards an Understanding of Cryptocurrency: A Comparative Analysis of Cryptocurrency, Foreign Exchange, and Stock.
Jiaqi Liang, Linjing Li, Weiyun Chen, Daniel Zeng
2019Understanding User Behaviors When Phishing Attacks Occur.
Yi Li, Kaiqi Xiong, Xiangyang Li
2019Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter.
Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith
2019User Preferences and Situational Needs of Mobile User Authentication Methods.
Kanlun Wang, Lina Zhou, Dongsong Zhang