Abstract is missing.
- Attention Allocation of Twitter Users in GeopoliticsSaike He, Changliang Li, Hailiang Wang, Xiaolong Zheng 0001, Zhu Zhang, Jiaojiao Wang, Daniel Zeng. 1-6 [doi]
- CrossSimON: A Novel Probabilistic Approach to Cross-Platform Online Social Network SimulationJinwei Liu, Wingyan Chung, Yifan Huang, Cagri Toraman. 7-12 [doi]
- SimON-Feedback: An Iterative Algorithm for Performance Tuning in Online Social SimulationMehul Vora, Wingyan Chung, Cagri Toraman, Yifan Huang. 13-17 [doi]
- User Preferences and Situational Needs of Mobile User Authentication MethodsKanlun Wang, Lina Zhou, Dongsong Zhang. 18-23 [doi]
- Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio NetworksBrendan Kitts, Andrew Potter. 24-29 [doi]
- Securing Machine Learning Engines in IoT Applications with Attribute-Based EncryptionAgus Kurniawan, Marcel Kyas. 30-34 [doi]
- Improvement of Ego Network Detection Algorithm Based on Cluster Validity IndexWenzheng Li, Yijun Gu, an Wang, Kunming Li. 35-40 [doi]
- Enhancing Rumor Detection in Social Media Using Dynamic Propagation StructuresShuai Wang, Qingchao Kong, Yuqi Wang, Lei Wang. 41-46 [doi]
- A Risk Assessment Method based on Software BehaviorGuorong Chen, Kun Wang, Jian Tan, Xiaoyong Li. 47-52 [doi]
- A Forensic Evidence Acquisition Model for Data Leakage AttacksWeifeng Xu, Jie Yan, Hongmei Chi. 53-58 [doi]
- Performance Modeling of Hyperledger Sawtooth BlockchainBenjamin Ampel, Mark W. Patton, Hsinchun Chen. 59-61 [doi]
- CNN-based DGA Detection with High CoverageShaofang Zhou, Lanfen Lin, Junkun Yuan, Feng Wang, Zhaoting Ling, Jia Cui. 62-67 [doi]
- A Deep Learning Approach to Modeling Temporal Social Networks on RedditWingyan Chung, Cagri Toraman, Yifan Huang, Mehul Vora, Jinwei Liu. 68-73 [doi]
- Leverage Temporal Convolutional Network for the Representation Learning of URLsYunji Liang, Jian Kang, Zhiwen Yu, Bin Guo, Xiaolong Zheng 0001, Saike He. 74-79 [doi]
- NO-DOUBT: Attack Attribution Based On Threat Intelligence ReportsLior Perry, Bracha Shapira, Rami Puzis. 80-85 [doi]
- Detecting Deceptive Tweets in Arabic for Cyber-SecurityFrancisco M. Rangel Pardo, Paolo Rosso, Anis Charfi, Wajdi Zaghouani. 86-91 [doi]
- Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) ToolNolan Arnold, MohammadReza Ebrahimi, Ning Zhang, Ben Lazarine, Mark W. Patton, Hsinchun Chen, Sagar Samtani. 92-97 [doi]
- Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on TwitterMariam Nouh, Jason R. C. Nurse, Michael Goldsmith. 98-103 [doi]
- Social Cognition Construction of the Avian Flu based on Social Media Big DataYuejiao Wang, Zhidong Cao. 104-109 [doi]
- Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics ApproachPo-Yi Du, MohammadReza Ebrahimi, Ning Zhang, Hsinchun Chen, Randall A. Brown, Sagar Samtani. 110-115 [doi]
- Massive Meme Identification and Popularity Analysis in GeopoliticsSaike He, Hongtao Yang, Xiaolong Zheng 0001, Bo Wang, Yujun Zhou, Yanjun Xiong, Daniel Zeng. 116-121 [doi]
- Pre-trained Contextualized Representation for Chinese Conversation Topic ClassificationYujun Zhou, Changliang Li, Saike He, Xiaoqi Wang, Yiming Qiu. 122-127 [doi]
- Context-Aware Multi-View Attention Networks for Emotion Cause ExtractionXinglin Xiao, Penghui Wei, Wenji Mao, Lei Wang 0062. 128-133 [doi]
- Inferring Users' Usage Patterns for Drug Abuse SurveillanceRuoran Liu, Qiudan Li, Daniel Dajun Zeng. 134-136 [doi]
- Towards an Understanding of Cryptocurrency: A Comparative Analysis of Cryptocurrency, Foreign Exchange, and StockJiaqi Liang, Linjing Li, Weiyun Chen, Daniel Zeng. 137-139 [doi]
- Healthcare-seeking behavior study on Beijing Hand-Foot-Mouth Disease PatientsJiaojiao Wang, Jinglu Chen, Quannan Zu, Zhidong Cao, Saike He, Daniel Dajun Zeng. 140-142 [doi]
- Exploring Cognitive Dissonance on Social MediaJie Bai, Qingchao Kong, Linjing Li, Lei Wang 0062, Daniel Zeng. 143-145 [doi]
- Capturing Deep Dynamic Information for Mapping Users across Social NetworksChiyu Cai, Linjing Li, Weiyun Chen, Daniel Zeng. 146-148 [doi]
- Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity CompetitionsLindsey Thomas, Moises Balders, Zach Countney, Chen Zhong, Jun Yao, Chunxia Xu. 149-151 [doi]
- Membership Detection for Real-world Groups Hidden in Social NetworkJiale Liu, Yongzhong He. 152-154 [doi]
- Text Watermarking for OOXML Format Documents Based on Color TransformationLi Yang, Wenjie Guo, Yonggang Lu, Yi Yang, Lian Li, Zongli Liu. 155-157 [doi]
- Targeted Addresses Identification for Bitcoin with Network Representation LearningJiaqi Liang, Linjing Li, Weiyun Chen, Daniel Zeng. 158-160 [doi]
- The entropy source of pseudo random number generators: from low entropy to high entropyJizhi Wang, Jingshan Pan, Xueli Wu. 161-163 [doi]
- Study on rigidity, flexibility, resilience and tenacity of anti-interference ability of wireless communication systemYingtao Niu, Cheng Li, Yan Liu, Yusheng Li. 164-166 [doi]
- Forensic Analysis of Bitcoin TransactionsYan Wu, Anthony Luo, Dianxiang Xu. 167-169 [doi]
- Does Appearance Matter? Exploring the Role of Facial Features for Judging Borrowers' Credibility in Online P2P Lending MarketsDongyu Chen, Jennifer Jie Xu. 170-172 [doi]
- Insider Threat Detection Based on Adaptive Optimization DBN by Grid SearchJiange Zhang, Yue Chen, Kuiwu Yang, Jian Zhao, Xincheng Yan. 173-175 [doi]
- Lawsuit category prediction based on machine learningYuru Xu, Mingming Zhang, Shaowu Wu, Junfeng Hu. 176-178 [doi]
- The Corporation Lawsuit Prediction based on Guiding Learning and Collaborative Filtering RecommendationZhenyu Wu, Guangda Chen, Jingjing Yao. 179-181 [doi]
- Privacy Protection in Transformer-based Neural NetworkJiaqi Lang, Linjing Li, Weiyun Chen, Daniel Zeng. 182-184 [doi]
- Identifying Risks of the Internet Finance Platforms Using Multi-Source Text DataDonglei Zhang, Jie Bai, Lei Wang, Min He, Yin Luo. 185-187 [doi]
- Information Hiding in OOXML Format Data based on the Splitting of Text ElementsWenjie Guo, Li Yang, Yonggang Lu, Yi Yang, Lian Li, Zongli Liu. 188-190 [doi]
- A BP Neural Network for Identifying Corporate Financial FraudXin Ma, Xunjia Li, Yanjie Song, Xiaolong Zheng, Zhongshan Zhang, Renjie He. 191-193 [doi]
- Building Terrorist Knowledge Graph from Global Terrorism Database and WikipediaTian Xia, Yijun Gu. 194-196 [doi]
- Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics ExtractionTianyi Wang, Kam-Pui Chow. 197-199 [doi]
- Exploring the Dark Web for Cyber Threat Intelligence using Machine LeaningMasashi Kadoguchi, Shota Hayashi, Masaki Hashimoto, Akira Otsuka. 200-202 [doi]
- Detection of Fraudulent Tweets: An Empirical Investigation Using Network Analysis and Deep Learning TechniqueJaewan Lim, Zhihui Liu, Lina Zhou. 203-205 [doi]
- Sentiment Analysis Based on Background Knowledge AttentionChangliang Li, Yujun Zhou, Saike He, Hailiang Wang. 206-208 [doi]
- A Framework for Policy Information Popularity Prediction in New MediaYin Luo, Fangfang Wang, Feifei Zhao, Jianbin Guo, Lei Wang, Yanni Hao, Daniel Dajun Zeng. 209-211 [doi]
- Analyzing Topics of JUUL Discussions on Social Media Using a Semantics-assisted NMF modelHejing Liu, Qiudan Li, Riheng Yao, Daniel Dajun Zeng. 212-214 [doi]
- A Prior Knowledge Based Neural Attention Model for Opioid Topic IdentificationRiheng Yao, Qiudan Li, Wei-Hsuan Lo-Ciganic, Daniel Dajun Zeng. 215-217 [doi]
- Quantum-Inspired Density Matrix Encoder for Sexual Harassment Personal Stories ClassificationPeng Yan, Linjing Li, Weiyun Chen, Daniel Zeng. 218-220 [doi]
- Research on Information Dissemination of Public Health Events Based on WeChat: A Case Study of Avian InfluenzaTianyi Luo, Zhidong Cao, Daniel Zeng. 221 [doi]
- Understanding User Behaviors When Phishing Attacks OccurYi Li, Kaiqi Xiong, Xiangyang Li. 222 [doi]
- Community Partition immunization strategy based on Search EngineZhaokang Ke, Cai Fu, Liqing Cao, Mingjun Yin, Xiwu Chen, Yang Li. 223 [doi]
- Role-based Static Desensitization Protection MethodTan Hu State, Jianfei Chen, Wenting Wang, Hao Zhang. 224 [doi]
- A SDN-Based Hierarchical Authentication Mechanism for IPv6 AddressXiao Liang, Heyao Chen. 225 [doi]
- Public Opinion Guidance Under the Background of Big Data TechnologyPinjie Sun, Liye Zhang. 226 [doi]
- Applied Layered-Security Model to IoMTDominick Rizk, Rodrigue Rizk, Sonya H. Y. Hsu. 227 [doi]
- Consensus Mechanism in Enterprise BlockchainAyokomi Lasisi, Sonya H. Y. Hsu. 228 [doi]
- Marketing Pattern Risks Detection Based on Semi-Supervised LearningQianyu Wang, Saike He, Xiaolong Zheng 0001, Daniel Zeng. 229 [doi]
- Application of Multi-domain Stereo Prevention and Control Technology in Counter-terrorismYanfei Liu, Zhenhua Wang, Guangyu Zhang. 230 [doi]
- Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the BoardBhavani M. Thuraisingham. 231-236 [doi]