Conference Program
 

IEEE ISI Conference Program
Beijing Friendship Hotel, Beijing

July 9, 2011 (Saturday)

8:30am-5:30pm

Conference and Workshop Registration Lobby, Ruibin Building
9:00am-5:30pm

Pacific-Asia ISI 2011 Workshop

Meeting Room 4,1st Floor, Ruibin Building
12:00pm-1:30pm Lunch Coffee House, Friendship Palace
1:30pm-5:00pm Social Computing 2011 Workshop Meeting Room 3, 1st Floor, Ruibin Building
 
July 10, 2011 (Sunday)
8:30am-5:30pm Registration Lobby, Ruibin Building
9:00am-10:00am Opening Ceremony & Keynote Speech Keynote Presentation-I
Glenn R. Widmann. Advances in Active Safety Systems to Improve Vehicle Safety
Meeting Room, 2nd Floor, Ruibin Building
10:00am-11:00am Keynote Presentation-II
Ali Hessami. Intelligent Railway Transportation Safety & Security - A Systems Approach
Meeting Room, 2nd Floor, Ruibin Building
11:00am-12:00pm Keynote Presentation-III
Chongqing Guo. IT Redefining Services
Meeting Room, 2nd Floor, Ruibin Building
12:10pm-1:30pm Lunch Yashi Hall, 1st Floor, Guibin Building
1:30pm-3:10pm
Sessions S1-I, S1-II
S1-I: Terrorism Informatics-I
Session chair: Bhavani Thuraisingham

ShuoZeng, Mingfeng Lin and Hsinchun Chen. Dynamic User-level Affect Analysis in Social Media: Modeling Violence in the Dark Web

Jiexun Liand G. Alan Wang. Criminal Identity Resolution Using Social Behavior and Relationship Attributes *

Hsinchun Chen, Dorothy Denning, Nancy Roberts, Catherine A.Larson, Ximing Yu and Chun-Neng Huang. The Dark Web Forum Portal: From Multi-lingual to Video
Meeting Room 3, 1st Floor, Ruibin Building
S1-II: Behaviorial modeling
Session chair: Latifur Khan

Heping Li, Jie Liu and Shuwu Zhang. Automatic Behavior Model Selection by Iterative Learning and Abnormality recognition

Polina Zilberman, Shlomi Dolev, Gilad Katz, Yuval Elovici and Asaf Shabtai. Analyzing Group Communication for Preventing Data Leakage via Email

Xiaofeng Wang and Donald E.Brown. The Spatio-Temporal Generalized Additive Model for Criminal Incident
Meeting Room 4, 1st Floor, Ruibin Building
3:10pm-3:30pm Break and Set-up of Poster Session

3:30pm-5:10pm

Sessions S2-I, S2-II
S2-I: Terrorism Informatics-II
Session chair: Jason Jiexun Li

Jiyoung Woo, Jaebong Son and Hsinchun Chen. An SIR model for violent topic diffusion in social media

Hsinchun Chen, Catherine Larson, Theodore Elhourani, David Zimbra and David Ware. The Geopolitical Web: Assessing Societal Risk in an Uncertain World

Sun Duo-Yong, GuoShu-Quan, Li Ben-Xian and Liu Xiao-Peng. Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis
Meeting Room 3, 1st Floor, Ruibin Building
S2-II: Infrastructure Protection and Emergency Responses-I
Session chair: Nasrullah Memon

Hamed Yaghoubi Shahir, Uwe Glässer, Piper Jackson and Hans When. Test-Case Generation for Marine Safety and Security Scenarios

Piper Jackson, Uwe Glässer, Hamed Yaghoubi Shahir and Hans Wehn. An Extensible Decision Engine for Marine Safety and Security

Irina Sakharova. Al Qaeda Terrorist Financing and Technologies to Track the Finance Network

Meeting Room 4, 1st Floor, Ruibin Building
6:00pm-7:00pm Welcome Reception Yashi Hall, 1st Floor, Guibin Building
6:45pm-8:15pm Poster Session Meeting Room 2+3, Building 8
 
July 11, 2010 (Monday)
8:30am-5:30pm Registration Lobby, Ruibin Building
9:00am-4:50pm Software Security & Protection 2011 Workshop VIP Room , 1st Floor, Friendship Palace
9:00am-10:10am
Sessions M1-I, M1-II
M1-I: Network-based Data Analysis-I
Session chair: Kuiyu Chang

Kristin Glass and Richard Colbaugh.  Estimating the Sentiment of Social Media Content for Security Informatics Applications

Il-Chul Moon, Alice H.Oh and Kathleen M.Carley. Analyzing Social Media in Escalating Crisis Situations
Meeting Room 3, 1st Floor, Ruibin Building
M1-II: Information Sharing and Data/Text Mining-I
Session chair: G. Alan Wang

Fatih OZGUL, Claus ATZENBECK, Ahmet CELIK and Zeki ERDEM. Incorporating data sources and methodologies for crime data mining *

Peng Su, Wenji Mao, Daniel Zeng and Huimin Zhao. Mining Actionable Behavioral Rules from Group Data *

Xiaochen Li, Wenji Mao, Daniel Zeng and Fei-Yue Wang. Forecasting Group Behavior via Multiple-Plan Recognition*
Meeting Room 4, 1st Floor, Ruibin Building
10:10am-10:40am Break
10:40am-12:00pm
Sessions M2-I, M2-II
M2-I: Network-based Data Analysis-II
Session chair: You Chen

Raymond Heatherly and Murat Kantarcioglu. Extending the classification of Nodes in Social Networks

Richard Colbaugh and Kristin Glass. Detecting Emerging Topics and Trends Via Predictive Analysis of ‘Meme’ Dynamics *
Meeting Room 3, 1st Floor, Ruibin Building
M2-II: Information Sharing and Data/Text Mining-II
Session chair: Yanzhen Qu

Zhenmin Lin and Jerzy W.Jaromczyk. Privacy Preserving Two-Party k-means Clustering Over Vertically Partitioned Dataset *

Tarique Anwar, Muhammad Abulaish and Khaled Alghathbar. Web Content Mining for Alias Identification: A first step towards suspect tracking *
Meeting Room 4, 1st Floor, Ruibin Building
12:00pm-1:30pm Lunch Yashi Hall, 1st Floor, Guibin Building
1:30pm-3:00pm
Sessions M3-I, M3-II
M3-I: Text Mining and Content Analysis-I
Session chair: Gilad Katz

JianpingZeng, JiangjiaoDuan and Chengrong Wu. Topic discovery based on dual EM merging

Tam T.Nguyen, Kuiyu Chang and Siu Cheung Hui. Supervised Term Weighting for Sentiment Analysis

Pir Abdul Rasool Qureshi, Nasrullah Memon and UffeKock Wiil. LanguageNet: A Novel Framework for Processing Unstructured Text Information
Meeting Room 3, 1st Floor, Ruibin Building
M3-II: Enterprise Risk Management and Information Systems Security-I
Session chair: Amir Harel

You Chen, Steve Nyemba, Wen Zhang and Bradley Malin. Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments

Richard Colbaugh and Kristin Glass. Proactive Defense for Evolving Cyber Threats

Maya Bercovitch, Meir Renford, Lior Hasson, Asaf Shabtai, Lior Rokach and Yuval Elovici. HoneyGen: an Automated Honeytokens Generator
Meeting Room 4, 1st Floor, Ruibin Building
3:00pm-3:20pm Break
3:20pm-4:50pm
Sessions M4-I, M4-II
M4-I: Text Mining and Content Analysis-II
Session chair: Xiaofeng Wang

Johnson James R.(Bob), Miller Anita, Khan Latifur, Thuraisingham Bhavani and Kantarcioglu Murat. Identification of Related Information of Interest across Free Text Documents

Johnson James R.(Bob), Miller Anita, Khan Latifur, Thuraisingham Bhavani and Kantarcioglu Murat. Extraction of Expanded Entity Phrases

Patricia Brantingham, Paul Brantingham and Amir H.Ghaseminejad. The Distribution of Event Complexity in the British Columbia Court System
Meeting Room 3, 1st Floor, Ruibin Building
M4-II: Enterprise Risk Management and Information Systems Security-II
Session chair: Xiaolong Zheng

Edith Felix, Olivier Delande, Fabio Massacci and Federica Paci. Managing Changes with Legacy Security Engineering Processes

Justin Zhan, B.John Oommen and Johanna Crisostomo. Anomaly Detection Using Weak Estimators

Amir Harel, Asaf Shabtai, Lior Rokach and Yuval Elovici. Dynamic Sensitivity-Based Access Control *
Meeting Room 4, 1st Floor, Ruibin Building
4:50pm-5:50pm Panel Discussion
Emerging ISI research topic
 
6:00pm-8:30pm Banquet and Award Ceremony Multifunction Hall, 2nd Floor, Guibin Building
 
July 12, 2011 (Tuesday)
8:30am-11:30am Registration Lobby, Ruibin Building
9:00am-11:30am Software Security & Protection 2011 Media Table Meeting Room 5, 1st Floor, Jiabin Building
9:00am-10:10am
Sessions T1-I, T1-II
T1-I: Innovative and Emerging Applications-I
Session chair: Frank Lu

Zhanyong Tang and Dingyi Fang. A Tamper-proof Software Watermark using Code Encryption

Xiarong Li, Yong Liu and Daniel Zeng. Publisher Click Fraud in the Pay-Per-Click Advertising Market: Incentives and Consequences *
Meeting Room 3, 1st Floor, Ruibin Building
T1-II: Enterprise Risk Management and Information Systems Security-III
Session chair: Yigal Arens

Jian Guan, James H.Graham and Jeffrey L.Hieb. A Digraph Model for Risk Identification and Mangement in SCADA Systems

Sk. Md. MizanurRahman, Md. MehediMasud, Carlisle Adams, Hussein Mouftah and Atsuo Inomata. Session-wise Private Data Exchange in eHealth Peer-to-Peer Database Management Systems *
Meeting Room 4, 1st Floor, Ruibin Building
10:10am-10:30am
Break
10:30am-11:40am
Sessions T2-I, T2-II
T2-I: Innovative and Emerging Applications-II
Session chair: Fabio Massacci

Hesiri Weerasinghe, Huirong Fu, Supeng Leng and Ye Zhu. Enhancing Unlinkability in Vehicular Ad Hoc Networks

Muniba Shaikh, Nasrullah Memon and UffeKock Wiil. Extended Approximate String Matching Algorithms To Detect Name Aliases *
Meeting Room 3, 1st Floor, Ruibin Building
T2-II: Infrastructure Protection and Emergency Responses-II
Session chair: Zhidong Cao

Jing Gong, William Wallace and John Mitchell. Decision Modeling For Resilient Infrastructures *

He Gao, Yuanzhuo Wang and Li Wang. Trojan Characteristics Analysis Based on Stochastic Petri Nets *
Meeting Room 4, 1st Floor, Ruibin Building
12:00pm-1:30pm Lunch Yashi Hall, 1st Floor, Guibin Building
1:30pm-5:30pm Tutorial on “Managing Security in Services” Meeting Room 1, 13th Floor, Automation Building, Institute of Automation, Chinese Academy of Sciences
  Long papers: 30 minutes (25 minutes for presentation and 5 minutes for Q&A)
*Short papers: 20 minutes (15 minutes for presentation and 5 minutes for Q&A)