posted by user: nwj668 || 7439 views || tracked by 4 users: [display]

ASONAM-C3 Workshop 2014 : 2014 International Workshop on Curbing Collusive Cyber-gossips in Social Networks (C3-2014)

FacebookTwitterLinkedInGoogle

Link: http://www.tulip.org.au/research/c3-2014
 
When Aug 17, 2014 - Aug 20, 2014
Where Beijing
Submission Deadline May 31, 2014
Notification Due Jun 16, 2014
Final Version Due Jun 25, 2014
Categories    network   security   social computing   data mining
 

Call For Papers



*** C3-2014: Call for Papers (Extended to May 31, 2014) ***

====================================================================================
The 2014 International Workshop on Curbing Collusive Cyber-gossips in Social Networks (C3-2014)
URL: http://www.tulip.org.au/research/c3-2014
Submission System: https://www.easychair.org/conferences/?conf=c32014

Held in conjunction with
The 2014 IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM2014), August 17-20, 2014, Beijing, China
URL: http://www.asonam2014.org/

All accepted and presented workshop papers will be included in the ASONAM 2014 proceedings and forwarded for inclusion in IEEE Computer Society Digital Library (CSDL), IEEE Xplore and the ACM Digital Library. The proceedings will be submitted for EI indexing through INSPEC by the IEEE.

====================================================================================


==========================
Important Dates
==========================

Paper Submission Deadline: May 31, 2014
Author Notification: June 16, 2014
Camera-Ready Deadline: June 25, 2014
Workshop: August 17, 2014

==========================
Workshop Scope
==========================

The emergence of social media is now reshaping the way businesses manage their sales and marketing assets. Unlike traditional media such as the TV, radio or newspaper, the social media (e.g., FaceBook, YouTube, Twitter, TripAdvisor, VirtualTourist, Houzz, Sina Weibo, Tencent WeChat and many other Web 2.0 sites) is characterized by user contributions, sharing, decentralization and being free. Not only are they gaining phenomenal popularity as the Web becomes accessible via all sorts of devices, they also have a strong influence on a brand making it a force that many organizations can no longer ignore. Many of us would have sought online reviews before making a purchase decision or forming an opinion, so do the rest of the consumers.

Unlike traditional media and sites, social media rely on user-generated content. Unfortunately, many of the user-generated content may not be that genuine as expected. It has been found that online paid posters have been hired by public relationship companies to post product comments on different online communities and social networks, without even consuming the services or products. While online paid posters can be used as an efficient e-marketing strategy, they can also act maliciously by spreading gossip or negative information about competitors. More specifically, a group of paid posters could operate with well-coordinated attacks, and generate a desired result of positive or negative opinions, to attract attention or trigger curiosity. This is known as “cyber-gossips” which can mislead online users, and put the individuals or a business in a compromising position or at serious risk. So powerful are these online opinions that businesses cannot ignore their impact on its bottom line. If businesses do not manage their online reputation properly, they risk damaging their brand and sales assets. And the battlefield to do so is clearly played out in the social media arena.

Recent years have witnessed increasing research attention on spammer detection in social networks. This trend raises the need for launching the International Workshop on Curbing Collusive Cyber-gossips in Social Networks (C3). This workshop will be the premier forum in which curbing cyber gossips is promoted as a serious and important research field by its own with relevant challenging problems and emerging issues to be formally addressed.

C3-2014 aims to increase potential collaborations and partnerships by bringing together academic researchers and industry practitioners from data mining, network security, digital forensics, behavioral and psychology sciences with the objectives to present updated research efforts and progresses on foundational and emerging topics of C3, exchange new ideas and identify future research directions.


==========================
Topics of Interest
==========================

C3-2014 calls for original papers focus on but not limited to the following topics:

(1) Content Based Methods: Information / Opinion / Knowledge Modeling and Spread Analysis

l Agent-based data retrieval
l Complex sequence analysis
l Content and Opinion analysis
l Temporal-sequential pattern mining
l Impact-oriented pattern mining
l Event/activity/action filtering
l Multi-granularity data visualization

(2) Behavior Based Methods: Behavior Modeling and Mining

l Behavior structure extraction
l Behavior life cycles
l Sequential/Parallel/Distributed behavior modeling
l Behavior dynamics
l Cyber Criminal behavior analysis
l Social networking behavior analysis

(3) Social Relation Based Methods: Cyber Analysis

l Group and group behavior detection, tracking and recognition
l Collusive crime/piracy detection
l Graph-based behavior/social modeling
l Dynamic/hidden group presentation
l Collaborative social recommendation
l Group interaction, collaboration, representation and profiling
l Cyber-Gossip Spread Models

(4) Applications and Open Case Study

l Poster spam detection
l Blog spam detection
l Click spam detection
l Identity authentication
l Botnets prevention
l Datasets for cyber-gossips detection


==========================
Paper Submissions
==========================

Submitted papers must be in English with a maximum length of 8 pages using the IEEE CPS two-column template:
http://www.ieee.org/conferences_events/conferences/publishing/templates.html

Submission is only electronic using the C3-2014 paper submission page linked here:
https://www.easychair.org/conferences/?conf=c32014

(1) LaTeX and Word Templates. To help ensure correct formatting, please use the style files for U.S. Letter Size found at the following link as templates for your submission. http://www.ieee.org/conferences_events/conferences/publishing/templates.html. These include LaTeX and Word.

(2) Manuscript Style Information
- Only papers prepared in PDF format will be accepted.
- Paper Length: Up to 8 pages, including figures, tables & references.
- Paper Formatting: double column, single spaced, #10 point Times Roman font.
- Margins: Left, Right, and Bottom: 0.75" (19mm). Top margin: 0.75" (19 mm), except for the title page where it should be 1" (25 mm).

(3) At least one author of each accepted paper must attend the workshop and present the paper.


==========================
Publication
==========================

All accepted and presented workshop papers will be included in the ASONAM 2014 proceedings and forwarded for inclusion in IEEE Computer Society Digital Library (CSDL), IEEE Xplore and the ACM Digital Library. The proceedings will be submitted for EI indexing through INSPEC by the IEEE.

Extended versions of selected research papers will be invited for potential publication in a planned special issue.


==========================
Organization Committee
==========================


General Co-Chairs

Prof. Li Guo, Institute of Information Engineering, Chinese Academy of Sciences, China
Email: guoli@iie.ac.cn

Prof. Lynn Batten, School of Information Technology, Deakin University, Australia
Email: lynn.batten@deakin.edu.au


Program Co-Chairs

Dr Wenjia Niu, Institute of Information Engineering, Chinese Academy of Sciences, China
Email: niuwenjia@iie.ac.cn

Dr Gang Li, School of Information Technology, Deakin University, Australia
Email: gangli@acm.org


Organization Co-Chairs

Prof. Yue Hu, Institute of Information Engineering, Chinese Academy of Sciences, China
Email: huyue@iie.ac.cn

A/Prof. Ping Xiong, Zhongnan University of Economics and Laws, China
Email: pingxiong@znufe.edu.cn



Related Resources

ASONAM 2017   Advances in Social Networks Analysis and Mining: Other Tracks, Workshops, Co-located Events
SDM 2018   SIAM International Conference on Data Mining
Social Information Systems @ HICSS-51   Social Information Systems Minitrack - Hawaii International Conference on System Sciences (HICSS-51)
PAKDD 2018   The 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
MLDM 2018   14th International Conference on Machine Learning and Data Mining MLDM 2018
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
ICDM 2018   18th Industrial Conference on Data Mining ICDM 2018
BDA4CID 2017   2017 International Workshop on Big Data Analytics for Cyber Intelligence and Defense
eCrime 2018   13th Symposium on Electronic Crime Research