Social Network Analysis Surveillance Technologies 2017

Call for Papers

The contemporary refugee crisis, due to conflicts in various areas all over the world, has boosted the need of the governments for increased surveillance in borders, in social media as well inside the camps especially for radicalization and extremism. As a result, there is an increased need for novel surveillance related technologies that can be adapted to the new military and civilian conditions as these have been developed worldwide.

There are numerous examples of surveillance-based technologies that have penetrated various aspects of our personal life, such as smart and portable devices, which can be used by operators and decision makers either in a central location or while being on the mobile (by agents in action). While desktop based applications can monitor, process and analyze surveillance data coming from a variety of sources, mobile-based platforms can also be used. These include smart phones, smart watches and in general smart devices, able to continuously collect petabytes of data, not only by governments but also by companies with different pretext.

Another example is biometrics technologies based on face, iris, voice, fingerprints and other hard modalities, or human recognition based on the usage of marks, scars, tattoos and sketches etc. (soft biometrics), including technologies that allow successful spoofing attacks. Finally, multi-modal biometrics and biometrics based on alternative or extreme sensing technologies, e.g. long range human identification at night.

This workshop is expected to bring forward the aforementioned issues. It will aim at presenting novel research developed by experts around the world in the areas of military, civilian and cyber surveillance. The workshop will be focused in discussing the advances in surveillance technologies, such as social media, internet, and cyber space methodological approaches and applications. The latest advances in the field, including, the presentation of novel research methods that are in the service of defense organizations, focusing on usage of social networking platforms, social network analysis and cyber surveillance is also expected to be covered. Other technologies that affect the everyday life of citizens will also be covered, such as video or image analysis as well as human recognition when using portable imaging sensors. Finally, the workshop will cover another very important aspect of surveillance, namely, the ethics and privacy in social networks and how they affect citizens and governments, as they continuously evolve in the light of globalization and international terrorism.

Topics

  • Techniques and tools for social network surveillance
  • Deanonymization and data inferring techniques
  • Digital forensics analysis
  • Visualization techniques for surveillance
  • Mobile-based surveillance applications (human identification etc.)
  • Sentiment surveillance
  • Early warning systems for terrorism, radicalization and extremism
  • Ethics and privacy in social networks
  • Internet surveillance systems
  • Intelligent networks of sensors
  • Disaster detection and prevention
  • Disease control through social network surveillance
  • Biometrics in the Wild
  • Usability and social impacts of biometrics technology
  • Novel sensing technologies and applications

2017
July 31

Syndey
Australia


Papers


Speakers

Organization

Workshop Chairs

Panagiotis Karampelas

Hellenic Air Force Academy (Greece)

 

Thirimachos Bourlai

West Virginia University (USA)

 

Program Committee

Jeremy Dawson

West Virginia University (USA)

Yanfang Ye

West Virginia University (USA)

 

Ioanna Lekea

Hellenic Air Force Academy (Greece)

 

Erin Moore

West Virginia University (USA)

Important Dates

May 10, 2017 May 20, 2017

Paper submission due

June 15, 2017

Notification to authors

June 23, 2017

camera ready due

Submit Your Paper

Full paper manuscripts must be in English with a maximum length of 8 pages or short paper 4 pages (using the IEEE two-column template). Submissions should be in PDF and include the title, author(s), affiliation(s), e-mail address(es) and abstract on the first page. Workshop papers will be submitted through EasyChair Conference System by clicking the Submit button below. If you don't already have an EasyChair account it will be required to create one before submitting a paper.

Submit

Accepted and presented papers will be published in the ASONAM 2017 Conference Proceedings and forwarded for inclusion in IEEE Computer Society Digital Library (CSDL), IEEE Xplore and the ACM Digital Library. The conference proceedings will be submitted for EI indexing through INSPEC by IEEE.

Camera ready submission

Registration

Registration for the Workshop will be done through the registration page of the main conference.

Program

The SNAST workshop will take place in the Wynyard room on Monday July, 31st from 8:30-10:00.

In order to see more information about the program please check the ASONAM Conference Program.

Keynote Speech

The keynote speech will take place in the Ballroom during the Reception on Monday July, 31st from 18:30-20:30.

Mining & Analyzing Social Media Data for Identification using Biometrics

Ramsey Billups, Gemalto Cogent, Inc. Reston, VA USA


Abstract

Large sets of social media data can potentially be mined in a manner to positively identify an individual using biometrics identifiers. Biometrics, as defined by Merriam-Webster, is the measurement and analysis of unique physical or behavioral characteristics as a means of verifying a person’s identity. There are over a dozen biometrics modalities that can be considered, yet this discussion will focus on a subset of biometrics attributes applicable to the process of mining social media data. The selected biometrics include fingerprint, face, voice, signature and keystroke characteristics of an individual.

Short Bio

Mr. Billups is Gemalto Cogent North America Federal Systems Vice President. In this role, Mr. Billups has responsibility for development, integration and delivery of Gemalto Cogent (formerly 3M Cogent) Biometrics product system integration, operations and maintenance for numerous U.S. Federal, and State Government biometrics programs including Department of Homeland Security (DHS) OBIM Biometrics Application. Mr. Billups also has system delivery responsibility for Gemalto Cogent’s Canadian biometrics and related systems.

Mr. Billups has served as Cogent Federal Systems Vice President and Program Manager of Integration, Operations & Maintenance for Cogent's portion of the Department of Homeland Security (DHS) OBIM Automated Fingerprint Identification System (AFIS) operations. OBIM, formerly known as US-VISIT is one of the largest AFIS programs in the world.

Mr. Billups has legacy fingerprint and face recognition biometrics experience as Technical Director of Biometrics with Raytheon where he served as Raytheon’s program manager for the DHS predecessor organization - Immigration Naturalization Service (INS) IDENT AFIS border control program. Mr. Billups previously worked for IBM Federal Systems on FAA programs and as a civilian for the Department of Defense at the Armament Research & Development Center where he had technical leadership responsibilities for embedded weapon systems software development.

Mr. Billups has a Bachelor of Science degree in Data Processing within the Computer Science department from the University of Dayton in Dayton, Ohio and is an IEEE Certified Biometrics Professional (CBP) and board member for the International Biometrics Identification Association (IBIA).

 

 

Ramsey Billups, CBP

Academic Sponsor

Silver Sponsor

Conference Venue

Mercure Hotel Sydney
818-820 George St
Ultimo NSW 2007 Sydney
New South Wales, Australia
website: http://www.mercuresydney.com.au/

Previous Workshops