In this paper, we discuss building an information dissemination model based on individual behavior. We analyze the individual behavior related to information dissemination and the factors that affect the sharing behav...In this paper, we discuss building an information dissemination model based on individual behavior. We analyze the individual behavior related to information dissemination and the factors that affect the sharing behavior of individuals, and we define and quantify these factors. We consider these factors as characteristic attributes and use a Bayesian classifier to classify individuals. Considering the forwarding delay characteristics of information dissemination, we present a random time generation method that simulates the delay of information dissemination. Given time and other constraints, a user might not look at all the information that his/her friends published. Therefore, this paper proposes an algorithm to predict information visibility, i.e., it estimates the probability that an individual will see the information. Based on the classification of individual behavior and combined with our random time generation and information visibility prediction method, we propose an information dissemination model based on individual behavior. The model can be used to predict the scale and speed of information propagation. We use data sets from Sina Weibo to validate and analyze the prediction methods of the individual behavior and information dissemination model based on individual behavior. A previously proposedinformation dissemination model provides the foundation for a subsequent study on the evolution of the network and social network analysis. Predicting the scale and speed of information dissemination can also be used for public opinion monitoring.展开更多
A new application of cluster states is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. In our scheme, a four-qubit cluster state and a Bell state are shared by a sender (Alic...A new application of cluster states is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. In our scheme, a four-qubit cluster state and a Bell state are shared by a sender (Alice), a controller (Charlie), and a receiver (Bob). Both the sender and controller only need to perform Bell-state measurements (BSMs), the receiver can reconstruct the arbitrary three-qubit state by performing some appropriately unitary transformations on his qubits after he knows the measured results of both the sender and the controller. This QIS scheme is deterministic.展开更多
On the semantic web, data interoperability and ontology heterogeneity are becoming ever more important issues. To resolve these problems, multiple classification methods can be used to learn the matching between ontol...On the semantic web, data interoperability and ontology heterogeneity are becoming ever more important issues. To resolve these problems, multiple classification methods can be used to learn the matching between ontologies. The paper uses the general statistic classification method to discover category features in data instances and use the first-order learning algorithm FOIL to exploit the semantic relations among data instances. When using multistrategy learning approach, a central problem is the evaluation of multistrategy classifiers. The goal and the conditions of using multistrategy classifiers within ontology matching are different from the ones for general text classification. This paper describes the combination rule of multiple classifiers called the Best Outstanding Champion, which is suitable for heterogeneous ontology mapping. On the prediction results of individual methods, the method can well accumulate the correct matching of alone classifier. The experiments show that the approach achieves high accuracy on real-world domain.展开更多
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on steganalysis against spatial least significant bit(LSB) ma...Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on steganalysis against spatial least significant bit(LSB) matching,which is the prototype of many advanced information hiding methods.Many existing algorithms deal with steganalysis problems by using the dependencies between adjacent pixels.From another aspect,this paper calculates the differences among pixel pairs and proves that the histogram of difference values will be smoothed by stego noises.We calculate the difference histogram characteristic function(DHCF) and deduce that the moment of DHCFs(DHCFM) will be diminished after stego bits are hidden in the image.Accordingly,we compute the DHCFMs as the discriminative features.We calibrate the features by decreasing the influence of image content on them and train support vector machine classifiers based on the calibrated features.Experimental results demonstrate that the DHCFMs calculated with nonadjacent pixels are helpful to detect stego messages hidden by LSB matching.展开更多
Although, researchers in the ATC field have done a wide range of work based on SVM, almost all existing approaches utilize an empirical model of selection algorithms. Their attempts to model automatic selection in pra...Although, researchers in the ATC field have done a wide range of work based on SVM, almost all existing approaches utilize an empirical model of selection algorithms. Their attempts to model automatic selection in practical, large-scale, text classification systems have been limited. In this paper, we propose a new model selection algorithm that utilizes the DDAG learning architecture. This architecture derives a new large-scale text classifier with very good performance. Experimental results show that the proposed algorithm has good efficiency and the necessary generalization capability while handling large-scale multi-class text classification tasks.展开更多
Pornographic image/video recognition plays a vital role in network information surveillance and management. In this paper, its key techniques, such as skin detection, key frame extraction, and classifier design, etc.,...Pornographic image/video recognition plays a vital role in network information surveillance and management. In this paper, its key techniques, such as skin detection, key frame extraction, and classifier design, etc., are studied in compressed domain. A skin detection method based on data-mining in compressed domain is proposed firstly and achieves the higher detection accuracy as well as higher speed. Then, a cascade scheme of pornographic image recognition based on selective decision tree ensemble is proposed in order to improve both the speed and accuracy of recognition. A pornographic video oriented key frame extraction solution in compressed domain and an approach of pornographic video recognition are discussed respectively in the end.展开更多
基金sponsored by the National Natural Science Foundation of China under grant number No. 61100008 the Natural Science Foundation of Heilongjiang Province of China under Grant No. LC2016024
文摘In this paper, we discuss building an information dissemination model based on individual behavior. We analyze the individual behavior related to information dissemination and the factors that affect the sharing behavior of individuals, and we define and quantify these factors. We consider these factors as characteristic attributes and use a Bayesian classifier to classify individuals. Considering the forwarding delay characteristics of information dissemination, we present a random time generation method that simulates the delay of information dissemination. Given time and other constraints, a user might not look at all the information that his/her friends published. Therefore, this paper proposes an algorithm to predict information visibility, i.e., it estimates the probability that an individual will see the information. Based on the classification of individual behavior and combined with our random time generation and information visibility prediction method, we propose an information dissemination model based on individual behavior. The model can be used to predict the scale and speed of information propagation. We use data sets from Sina Weibo to validate and analyze the prediction methods of the individual behavior and information dissemination model based on individual behavior. A previously proposedinformation dissemination model provides the foundation for a subsequent study on the evolution of the network and social network analysis. Predicting the scale and speed of information dissemination can also be used for public opinion monitoring.
基金*Supported by the National Natural Science Foundation of China under Grant No. 60807014, the Natural Science Foundation of Jiangxi Province of China under Grant No. 2009GZW0005, the Research Foundation of state key laboratory of advanced optical communication systems and networks, and the Research Foundation of the Education Department of Jiangxi Province under Grant No. G J J09153
文摘A new application of cluster states is investigated for quantum information splitting (QIS) of an arbitrary three-qubit state. In our scheme, a four-qubit cluster state and a Bell state are shared by a sender (Alice), a controller (Charlie), and a receiver (Bob). Both the sender and controller only need to perform Bell-state measurements (BSMs), the receiver can reconstruct the arbitrary three-qubit state by performing some appropriately unitary transformations on his qubits after he knows the measured results of both the sender and the controller. This QIS scheme is deterministic.
文摘On the semantic web, data interoperability and ontology heterogeneity are becoming ever more important issues. To resolve these problems, multiple classification methods can be used to learn the matching between ontologies. The paper uses the general statistic classification method to discover category features in data instances and use the first-order learning algorithm FOIL to exploit the semantic relations among data instances. When using multistrategy learning approach, a central problem is the evaluation of multistrategy classifiers. The goal and the conditions of using multistrategy classifiers within ontology matching are different from the ones for general text classification. This paper describes the combination rule of multiple classifiers called the Best Outstanding Champion, which is suitable for heterogeneous ontology mapping. On the prediction results of individual methods, the method can well accumulate the correct matching of alone classifier. The experiments show that the approach achieves high accuracy on real-world domain.
基金supported by the NSFC(61173141,61362032,U1536206, 61232016,U1405254,61373133,61502242,61572258)BK20150925+4 种基金the Natural Science Foundation of Jiangxi Province, China(20151BAB207003)the Fund of Jiangsu Engineering Center of Network Monitoring(KJR1402)the Fund of MOE Internet Innovation Platform(KJRP1403)the CICAEET fundthe PAPD fund
文摘Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on steganalysis against spatial least significant bit(LSB) matching,which is the prototype of many advanced information hiding methods.Many existing algorithms deal with steganalysis problems by using the dependencies between adjacent pixels.From another aspect,this paper calculates the differences among pixel pairs and proves that the histogram of difference values will be smoothed by stego noises.We calculate the difference histogram characteristic function(DHCF) and deduce that the moment of DHCFs(DHCFM) will be diminished after stego bits are hidden in the image.Accordingly,we compute the DHCFMs as the discriminative features.We calibrate the features by decreasing the influence of image content on them and train support vector machine classifiers based on the calibrated features.Experimental results demonstrate that the DHCFMs calculated with nonadjacent pixels are helpful to detect stego messages hidden by LSB matching.
文摘Although, researchers in the ATC field have done a wide range of work based on SVM, almost all existing approaches utilize an empirical model of selection algorithms. Their attempts to model automatic selection in practical, large-scale, text classification systems have been limited. In this paper, we propose a new model selection algorithm that utilizes the DDAG learning architecture. This architecture derives a new large-scale text classifier with very good performance. Experimental results show that the proposed algorithm has good efficiency and the necessary generalization capability while handling large-scale multi-class text classification tasks.
基金Supported by the National Natural Science Foundation of China (No.60772069)863 High-Tech Project (2008AA01A313)
文摘Pornographic image/video recognition plays a vital role in network information surveillance and management. In this paper, its key techniques, such as skin detection, key frame extraction, and classifier design, etc., are studied in compressed domain. A skin detection method based on data-mining in compressed domain is proposed firstly and achieves the higher detection accuracy as well as higher speed. Then, a cascade scheme of pornographic image recognition based on selective decision tree ensemble is proposed in order to improve both the speed and accuracy of recognition. A pornographic video oriented key frame extraction solution in compressed domain and an approach of pornographic video recognition are discussed respectively in the end.