ebook img

Intelligence and Security Informatics: 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings PDF

211 Pages·2016·9.826 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Intelligence and Security Informatics: 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings

Michael Chau G. Alan Wang Hsinchun Chen (Eds.) 0 Intelligence and 5 6 9 S Security Informatics C N L 11th Pacific Asia Workshop, PAISI 2016 Auckland, New Zealand, April 19, 2016 Proceedings 123 Lecture Notes in Computer Science 9650 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zürich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany More information about this series at http://www.springer.com/series/7410 Michael Chau G. Alan Wang (cid:129) Hsinchun Chen (Eds.) Intelligence and Security Informatics fi 11th Paci c Asia Workshop, PAISI 2016 Auckland, New Zealand, April 19, 2016 Proceedings 123 Editors Michael Chau Hsinchun Chen TheUniversity of HongKong TheUniversity of Arizona Hong Kong Tucson,AZ SARChina USA G.AlanWang Virginia Tech Blacksburg, VA USA ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin Computer Science ISBN 978-3-319-31862-2 ISBN978-3-319-31863-9 (eBook) DOI 10.1007/978-3-319-31863-9 LibraryofCongressControlNumber:2016934010 LNCSSublibrary:SL4–SecurityandCryptology ©SpringerInternationalPublishingSwitzerland2016 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade. Printedonacid-freepaper ThisSpringerimprintispublishedbySpringerNature TheregisteredcompanyisSpringerInternationalPublishingAGSwitzerland Preface Intelligence and security informatics (ISI) is an interdisciplinary research area con- cerned with the study of the development and use of advanced information tech- nologies and systems for national, international, and societal security-related applications. In the past few years, we have witnessed ISI experiencing tremendous growth and attracting significant interest involving academic researchers in related fields as well as practitioners from both government agencies and industry. PAISI2016wasthe11thworkshopintheseries.In2006,thefirstworkshoponISI was held in Singapore in conjunction with PAKDD, with most contributors and par- ticipants coming from the Pacific Asian region. The second workshop, PAISI 2007, was heldin Chengdu. Following that, the annual PAISI workshop was held in Taipei, Taiwan (2008), Bangkok, Thailand (2009), Hyderabad, India (2010), Beijing, China (2011, 2013), Kuala Lumpur, Malaysia (2012), Tainan, Taiwan (2014), and Ho Chi Minh City, Vietnam (2015). Building on the success of these ISI meetings, we held PAISI 2016 in conjunction with PAKDD 2016 in Auckland, New Zealand, in April 2016. PAISI 2016 brought together ISI researchers from Pacific Asia and other regions working on a variety of fieldsandprovidedastimulatingforumforthemtoexchangeideasandreportontheir research progress. This volume of Springer’s Lecture Notes in Computer Science contains 14 research papers presented at PAISI 2016. It presents a significant view on regional data sets and case studies, covering such topics as criminal network analysis, malware detection, data mining, and text mining. We wish to express our gratitude to all members of the Workshop Program Com- mittee and additional reviewers who provided high-quality, constructive review com- ments within a tight schedule. Our special thanks go to the PAKDD 2016 Organizing Committee and workshop chairs. We would also like to acknowledge the excellent cooperation with Springer in the preparation of this volume, as well as the effective conference management software EasyChair. Last but not least, we thank all researchersintheISIcommunityfortheirstrongandcontinuoussupportofthePAISI series and other related research activities. April 2016 Michael Chau G. Alan Wang Hsinchun Chen Organization Workshop Co-chairs Michael Chau The University of Hong Kong, Hong Kong SAR China G. Alan Wang Virginia Tech, USA Hsinchun Chen The University of Arizona, USA Program Committee Robert Weiping Chang Central Police University, Taiwan Vladimir Estivill-Castro Griffith University, Australia Uwe Gläesser Simon Fraser University, Canada Eul Gyu Im Hanyang University, South Korea Da-Yu Kao Central Police University, Taiwan Siddharth Kaza Towson University, USA Paul W.H. Kwan University of New England, Australia Wai Lam The Chinese University of Hong Kong, Hong Kong SAR China Mark Last Ben-Gurion University of the Negev, Israel Ickjai Lee James Cook University, Australia You-Lu Liao Central Police University, Taiwan Hsin-Min Lu National Taiwan University, Taiwan Jun Luo The Chinese Academy of Sciences, China Xin (Robert) Luo The University of New Mexico, USA Byron Marshall Oregon State University, USA Dorbin Ng The Chinese University of Hong Kong, Hong Kong SAR China Symeon Papadopoulos Information Technologies Institute, Greece Shaojie Qiao Southwest Jiaotong University, China Shrisha Rao International Institute of Information Technology - Bangalore, India Srinath Srinivasa International Institute of Information Technology - Bangalore, India Aixin Sun Nanyang Technological University, Singapore Paul Thompson Dartmouth College, USA Jau-Hwang Wang Central Police University, Taiwan Jennifer J. Xu Bentley University, USA Yilu Zhou Fordham University, USA Keynote Speech: Cloud-Centric Assured Information Sharing Bhavani Thuraisingham The University of Texasat Dallas, USA [email protected] Abstract.Thispresentationwilldescribeourresearchanddevelopmentefforts inassuredcloudcomputingfortheAirForceOfficeofScientificResearch.We havedevelopedasecurecloudcomputingframeworkaswellasmultiplesecure cloud query processing systems. Our framework uses Hadoop to store and retrieve large numbers of RDF triples by exploiting the cloud computing paradigm and we have developed a scheme to store RDF data in a Hadoop Distributed File System. We implemented XACML-based policy management and integrated it with our query processing strategies. For secure query pro- cessingwithrelationaldataweutilizedtheHIVEframework.Morerecentlywe have developed strategies for secure storage and query processing in a hybrid cloud.Inparticular,wehavedevelopedalgorithmsforqueryprocessingwherein user’slocalcomputingcapabilityisexploitedalongsidepubliccloudservicesto deliver an efficient and secure data management solution. We have also developedtechniquesforsecurevirtualizationusingtheXENhypervisortohost ourclouddatamanagersaswellasanRDF-basedpolicyenginehostedonour cloudcomputingframework.Finallywehavedevelopedasecuresocialmedia frameworkhostedonoursecurecloudcomputingframework.Thepresentation will discuss our secure cloud computing framework for assured information sharinganddiscussthesecuresocialmediaframework.Wewillthendiscussthe relationshiptobigdatasecurityandprivacyaspectsandconnectourresearchto Secure Internet of Thingswith aspecial emphasis ondata privacy. Keywords:Cloudcomputing(cid:129)Hadoop(cid:129)HIVE(cid:129)Informationsharing(cid:129)Social media (cid:129)Secure internet ofthings (cid:129)Dataprivacy Speaker Bio: Dr. Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor of Computer Science and the Executive Director of the Cyber Security ResearchandEducationInstitute(CSI)atTheUniversityofTexasatDallas.Sheisalso a Visiting Senior Research Fellow at Kings College, University of London. She is an elected Fellow of IEEE, the AAAS, the British Computer Society, and the SPDS (Society for Design and Process Science). She received several prestigious award including IEEE Computer Society’s 1997 Technical Achievement Award for “out- standing and innovative contributions to secure data management”, the 2010 ACM SIGSAC (Association for Computing Machinery, Special Interest Group on Security, Audit and Control) Outstanding Contributions Award for “seminal research contribu- tionsandleadershipindataandapplicationssecurityforover25years”andtheSDPS Transformative Achievement Gold Medal for her contributions to interdisciplinary X Keynote Speech: Cloud-CentricAssured Information Sharing research.Shehasuniqueexperienceworkinginthecommercialindustry(Honeywell), federal research laboratory (MITRE), USgovernment(NSF) andacademiaandher35 year career includes research and development, technology transfer, product devel- opment, program management, and consulting for the federal government. Her work has resulted in 100+ journal articles, 200+ conference papers, 100+ keynote and fea- turedaddresses,eightUSpatents(threepending)andfifteenbooks(onepending).She receivedtheprestigiousearnedhigherdoctoratedegree(DEng)fromtheUniversityof Bristol England in 2011 for her published work in secure data management since her PhD. She has been a strong advocate for women in computing and has delivered featured addresses at events organized by the CRA-W (Computing Research Associ- ation) and SWE (Society for Women Engineers). Contents Network-Based Data Analytics The Use of Reference Graphs in the Entity Resolution of Criminal Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 David Robinson Heterogeneous Information Networks Bi-clustering with Similarity Regularization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 XianchaoZhang,HaixinLi,WenxinLiang,LinlinZong,andXinyueLiu Data and Text Mining AProfile-BasedAuthorshipAttributionApproachtoForensicIdentification in Chinese Online Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Jianbin Ma, Bing Xue, and Mengjie Zhang Multilevel Syntactic Parsing Based on Recursive Restricted Boltzmann Machines and Learning to Rank . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Jungang Xu, Hong Chen, Shilong Zhou, and Ben He Stratified Over-Sampling Bagging Method for Random Forests on Imbalanced Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 He Zhao, Xiaojun Chen, Tung Nguyen, Joshua Zhexue Huang, Graham Williams, and Hui Chen Revisiting Attribute Independence Assumption in Probabilistic Unsupervised Anomaly Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Sunil Aryal, Kai Ming Ting, and Gholamreza Haffari Incremental Privacy-Preserving Association Rule Mining Using Negative Border . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Duc H. Tran, Wee Keong Ng, Y.D. Wong, and Vinh V. Thai Differentially Private Multi-task Learning. . . . . . . . . . . . . . . . . . . . . . . . . . 101 Sunil Kumar Gupta, Santu Rana, and Svetha Venkatesh Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-temporal Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 B.M.S. Bahar Talukder, Brinta Chowdhury, Tamanna Howlader, and S.M. Mahbubur Rahman

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.