Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

Mining opinion targets and opinion words from online reviews are important tasks for fine-grained opinion mining, the key component of which involves detecting opinion relations among words. To this end, this paper proposes a novel approach based on the partially-supervised alignment model, which regards identifying opinion relations as an alignment process. Then, a graph-based co-ranking [...]

Author Topic Model-Based Collaborative Filtering for Personalized POI Recommendations

From social media has emerged continuous needs for automatic travel recommendations. Collaborative filtering (CF) is the most well-known approach. However, existing approaches generally suffer from various weaknesses. For example , sparsity can significantly degrade the performance of traditional CF. If a user only visits very few locations, accurate similar user identification becomes very challenging due [...]

PPSGen: Learning-Based Presentation Slides Generation for Academic Papers

In this paper, we investigate a very challenging task of automatically generating presentation slides for academic papers. The generated presentation slides can be used as drafts to help the presenters prepare their formal slides in a quicker way. A novel system called PPSGen is proposed to address this task. It first employs the regression method [...]

A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services

The Web creates excellent opportunities for businesses to provide personalized online services to their customers. Recommender systems aim to automatically generate personalized suggestions of products/services to customers (businesses or individuals). Although recommender systems have been well studied, there are still two challenges in the development of a recommender system, particularly in real-world B2B e-services: items [...]

Effectiveness of Security Images in Internet Banking

  Internet banking websites often use security images as part of the login process, under the theory that they can help foil phishing attacks. Previous studies, however, have yielded inconsistent results about users’ ability to notice that a security image is missing. This article describes an online study of 482 users that attempts to clarify [...]

Performance Evaluations of Quantum Key Distribution System Architectures

Quantum key distribution (QKD) is the most mature application of the quantum information  eld, o ering the means for two parties to generate secure cryptographic keying material. Employing the laws of quantum physics, QKD can detect eavesdroppers during the key generation process, in which unauthorized observation of quantum communication induces discernible errors. However, QKD [...]

Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security

This paper proposes an energy-efficient security-aware architecture for wireless control systems to be used in factory automation. We face deception attacks that corrupt commands and measurements in a smart way and with intermittent behavior to produce the highest damage without being discovered. The intrusion is hard to distinguish from normal disturbance. Furthermore, protection against attacks [...]

Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data

  Visualization and situational awareness are of vital importance for power systems, as the earlier a power-system event such as a transmission line fault or cyber-attack is identified, the quicker operators can react to avoid unnecessary loss. Accurate time-synchronized data, such as system measurements and device status, provide benefits for system state monitoring. However, the [...]

Emergency satellite communications: research and standardization activities

Space communications is an ideal candidate to handle critical and emergency situations arising on a regional to global scale, provided there is effective integration among them. The article presents a review of solutions offered by space communication systems for early warning and emergency communication services. It includes an up-to-date review of public research and standardization [...]

Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation

            This work proposes a novel reversible image data hiding (RIDH) scheme over encrypted domain. The data embedding is achieved through a public key modulation mechanism, in which access to the secret encryption key is not needed. At the decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and non-encrypted image patches, [...]