Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2022
Android malware obfuscation variants detection method based on multi-granularity opcode features
Future Generation Computer Systems (FGCS), Volume 129, Issue CPages 141–151https://doi.org/10.1016/j.future.2021.11.005AbstractAndroid malware poses a serious security threat to ordinary mobile users. However, the obfuscation technology can generate malware variants, which can bypass existing detection methods and significantly reduce detection accuracy. ...
Highlights- Anti-obfuscation features selection based on multi-granularity opcode features.
- research-articleNovember 2021
Multi-topical authority sensitive influence maximization with authority based graph pruning and three-stage heuristic optimization
Applied Intelligence (KLU-APIN), Volume 51, Issue 11Pages 8432–8450https://doi.org/10.1007/s10489-021-02213-9AbstractInfluence maximization is closely related to the interesting topic of users. However, it is often ignored by most previous researches. Even though topics are considered by some previous researches, they neglect users’ different authority on ...
- research-articleNovember 2019
Imbalance Rectification in Deep Logistic Regression for Multi-Label Image Classification Using Random Noise Samples
CIKM '19: Proceedings of the 28th ACM International Conference on Information and Knowledge ManagementPages 1131–1140https://doi.org/10.1145/3357384.3357962Logistic regression (LR) is the most commonly used loss function in multi-label image classification. However, it suffers from class imbalance problem caused by the huge difference in quantity between positive and negative samples as well as between ...
- short-paperJuly 2019
TDP: Personalized Taxi Demand Prediction Based on Heterogeneous Graph Embedding
SIGIR'19: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information RetrievalPages 1177–1180https://doi.org/10.1145/3331184.3331368Predicting users' irregular trips in a short term period is one of the crucial tasks in the intelligent transportation system. With the prediction, the taxi requesting services, such as Didi Chuxing in China, can manage the transportation resources to ...
- research-articleApril 2019
EADP: An extended adaptive density peaks clustering for overlapping community detection in social networks
Neurocomputing (NEUROC), Volume 337, Issue CPages 287–302https://doi.org/10.1016/j.neucom.2019.01.074Highlights- Extend DPC to be able to detect overlapping communities.
- Come up with a common ...
Overlapping community detection plays an important role in studying social networks. The existing overlapping community detection methods seldom perform well on networks with complex weight distribution. Density peaks clustering (DPC) ...
-
- research-articleJanuary 2019
SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method
Android usually employs the Secure Socket Layer (SSL) protocol to protect the user’s privacy in network transmission. However, developers may misuse SSL-related APIs, which would lead attackers to steal user’s privacy through man-in-the-middle ...
- ArticleDecember 2018
Hashtag Recommendation with Attention-Based Neural Image Hashtagging Network
AbstractWith the increasing number of microblog users, the hashtag recommendation task has become an important component in social media. Most hashtag recommendation related methods get relative low precisions, because hashtags are not necessarily related ...
- ArticleNovember 2018
Topical Authority-Sensitive Influence Maximization
Web Information Systems Engineering – WISE 2018Pages 262–277https://doi.org/10.1007/978-3-030-02922-7_18AbstractInfluence maximization has been widely studied in social network analysis. However, most existing works focus on user’s global influence while ignoring the fact that user’s influence varies with different topics. Even though a few works take ...
- ArticleAugust 2018
Distant Domain Adaptation for Text Classification
AbstractText classification becomes a hot topic nowadays. In reality, the training data and the test data may come from different distributions, which causes the problem of domain adaptation. In this paper, we study a novel learning problem: Distant ...
- ArticleAugust 2018
Stock Price Prediction Using Time Convolution Long Short-Term Memory Network
Knowledge Science, Engineering and ManagementPages 461–468https://doi.org/10.1007/978-3-319-99365-2_41AbstractThe time series of stock prices are non-stationary and non-linear, making the prediction of future price trends much challenging. Inspired by Convolutional Neural Network (CNN), we make convolution on the time dimension to capture the long-term ...
- ArticleJuly 2018
Rank-Integrated Topic Modeling: A General Framework
AbstractRank-integrated topic models which incorporate link structures into topic modeling through topical ranking have shown promising performance comparing to other link combined topic models. However, existing work on rank-integrated topic modeling ...
- research-articleSeptember 2017
EDS
Future Generation Computer Systems (FGCS), Volume 74, Issue CPages 220–231https://doi.org/10.1016/j.future.2016.02.014Caching is an effective optimization in search engine storage architectures. Many caching algorithms have been proposed to improve retrieval performance. The data selection policy of search engine cache management plays an important role, which ...
- research-articleFebruary 2016
Role mining using answer set programming
Future Generation Computer Systems (FGCS), Volume 55, Issue CPages 336–343https://doi.org/10.1016/j.future.2014.10.018With the increasing adoption of role-based access control (RBAC) in business security, role mining technology has been widely applied to aid the process of migrating a non-RBAC system to an RBAC system. However, because it is hard to deal with a variety ...
- ArticleOctober 2015
Subtopic-Level Sentiment Analysis of Emergencies
Knowledge Science, Engineering and ManagementPages 312–317https://doi.org/10.1007/978-3-319-25159-2_28AbstractWith the rapid development of microblog, millions of Internet users share their opinions on different aspects of daily life. By analyzing and monitoring sentiment information extracting from tweets related to an important event, we are able to ...
- articleAugust 2015
Role mining based on cardinality constraints
Concurrency and Computation: Practice & Experience (CCOMP), Volume 27, Issue 12Pages 3126–3144https://doi.org/10.1002/cpe.3456Role mining was recently proposed to automatically find roles among user-permission assignments using data mining technologies. However, the current studies about role mining mainly focus on how to find roles, without considering the constraints that are ...
- ArticleAugust 2015
An Efficient Data Selection Policy for Search Engine Cache Management
HPCC-CSS-ICESS '15: Proceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf on Embedded Software and SystemsPages 122–127https://doi.org/10.1109/HPCC-CSS-ICESS.2015.216Caching is an effective optimization in search engine. The data selection policy plays a key role in caching, which places the data to be cached in memory. However, the current data selection policies are not suitable to the hybrid storage architecture ...
- ArticleAugust 2015
Semantic SPARQL Query in a Relational Database Based on Ontology Construction
SKG '15: Proceedings of the 2015 11th International Conference on Semantics, Knowledge and Grids (SKG)Pages 25–32https://doi.org/10.1109/SKG.2015.14Constructing an ontology from RDBs and its query through ontologies is a fundamental problem for the development of the semantic web. This paper proposes an approach to extract ontology directly from RDB in the form of OWL/RDF triples, to ensure its ...
- articleApril 2014
Detecting network communities using regularized spectral clustering algorithm
Artificial Intelligence Review (ARTR), Volume 41, Issue 4Pages 579–594https://doi.org/10.1007/s10462-012-9325-3The progressively scale of online social network leads to the difficulty of traditional algorithms on detecting communities. We introduce an efficient and fast algorithm to detect community structure in social networks. Instead of using the eigenvectors ...
- articleJanuary 2014
Optimizing ranking method using social annotations based on language model
Artificial Intelligence Review (ARTR), Volume 41, Issue 1Pages 81–96https://doi.org/10.1007/s10462-011-9299-6Recent research has shown that more and more web users utilize social annotations to manage and organize their interested resources. Therefore, with the growing popularity of social annotations, it is becoming more and more important to utilize such ...
- demonstrationJune 2013
RMiner: a tool set for role mining
SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologiesPages 193–196https://doi.org/10.1145/2462410.2462431Recently, there are many approaches proposed for mining roles using automated technologies. However, it lacks a tool set that can be used to aid the application of role mining approaches and update role states. In this demonstration, we introduce a tool ...