{"id":"https://openalex.org/W2604111604","doi":"https://doi.org/10.3233/978-1-61499-744-3-129","title":"Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification","display_name":"Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2604111604","doi":"https://doi.org/10.3233/978-1-61499-744-3-129","mag":"2604111604"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-744-3-129","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-744-3-129","pdf_url":null,"source":{"id":"https://openalex.org/S4306463470","display_name":"IOS Press eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"ebook platform"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptology and Information Security Series","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/978-1-61499-744-3-129","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116338216","display_name":"Lee Chien Eao","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lee Chien Eao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001904143","display_name":"Lilei Zheng","orcid":"https://orcid.org/0000-0002-8621-2666"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zheng Lilei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100386273","display_name":"Ying Zhang","orcid":"https://orcid.org/0000-0003-4906-5828"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang Ying","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5104678439","display_name":"Thing Vrizlynn L.L.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thing Vrizlynn L.L.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5116338216"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.267,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50401207,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13650","display_name":"Computational Physics and Python Applications","score":0.9340999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13650","display_name":"Computational Physics and Python Applications","score":0.9340999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bigram","display_name":"Bigram","score":0.8622651100158691},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6018428802490234},{"id":"https://openalex.org/keywords/fragment","display_name":"Fragment (logic)","score":0.5248875021934509},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33644092082977295},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32363784313201904},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17365658283233643}],"concepts":[{"id":"https://openalex.org/C108757681","wikidata":"https://www.wikidata.org/wiki/Q2773912","display_name":"Bigram","level":3,"score":0.8622651100158691},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6018428802490234},{"id":"https://openalex.org/C2776235265","wikidata":"https://www.wikidata.org/wiki/Q18392052","display_name":"Fragment (logic)","level":2,"score":0.5248875021934509},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33644092082977295},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32363784313201904},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17365658283233643},{"id":"https://openalex.org/C137546455","wikidata":"https://www.wikidata.org/wiki/Q3213474","display_name":"Trigram","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/978-1-61499-744-3-129","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-744-3-129","pdf_url":null,"source":{"id":"https://openalex.org/S4306463470","display_name":"IOS Press eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"ebook platform"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptology and Information Security Series","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/978-1-61499-744-3-129","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-744-3-129","pdf_url":null,"source":{"id":"https://openalex.org/S4306463470","display_name":"IOS Press eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"ebook platform"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptology and Information Security Series","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3020951519","https://openalex.org/W3173084154","https://openalex.org/W2334448532","https://openalex.org/W2982021180","https://openalex.org/W2131563376","https://openalex.org/W2033914206","https://openalex.org/W2042327336"],"abstract_inverted_index":{"File":[0],"carving":[1],"is":[2,24,49,82,216],"the":[3,14,38,54,59,100,119,140,153,162,176,194,202,207,223],"process":[4],"which":[5,81,109,146,173],"aims":[6],"to":[7,20,37,75,138,158,191,219],"recover":[8],"files":[9],"from":[10,118,126],"storage":[11,45,62],"media":[12],"without":[13],"file":[15,42,55,204],"system":[16],"meta-data.":[17],"The":[18],"ability":[19],"perform":[21,181],"such":[22,79],"recovery":[23,56],"particularly":[25],"important":[26,51],"in":[27,44,53,98,133,136,152,189],"this":[28,92],"digital":[29],"era":[30],"when":[31],"it":[32],"involves":[33],"forensic":[34,87],"investigation.":[35],"Due":[36],"inevitable":[39],"occurrence":[40],"of":[41,61,66,71,83,142,170,201,214],"fragmentation":[43],"system,":[46],"fragment":[47,104],"classification":[48,199,212],"an":[50,96,210],"step":[52],"process.":[57],"Following":[58],"increase":[60],"capacity":[63],"and":[64,115,149],"usage":[65],"mobile":[67,107],"phones,":[68,108],"large":[69,168],"amount":[70,169],"personal":[72],"data":[73,172],"tends":[74],"be":[76],"stored":[77],"on":[78,106],"devices,":[80],"great":[84],"interest":[85],"for":[86,198],"analysis":[88,124],"during":[89],"investigations.":[90],"In":[91],"paper,":[93],"we":[94,129,180],"present":[95],"approach":[97,135],"classifying":[99],"most":[101,195],"commonly":[102],"found":[103],"types":[105],"include":[110],"JPG,":[111],"MP3,":[112],"MP4,":[113],"MOV":[114],"SQLite.":[116],"Departing":[117],"conventional":[120],"approaches":[121],"that":[122],"utilize":[123],"derived":[125],"unigram":[127,224],"statistics,":[128],"employ":[130],"bigram":[131,163],"statistics":[132,164,225],"our":[134],"order":[137,145,190],"capture":[139,159],"frequency":[141],"local":[143],"byte":[144],"retains":[147],"meaningful":[148],"exploitable":[150],"pattern":[151],"fragments.":[154],"While":[155],"being":[156],"able":[157],"more":[160],"information,":[161],"also":[165],"contain":[166],"a":[167],"redundant":[171],"greatly":[174],"increases":[175],"computational":[177],"workload.":[178],"Therefore,":[179],"dimensionality":[182],"reduction":[183],"through":[184,227],"Principal":[185],"Component":[186],"Analysis":[187],"(PCA)":[188],"extract":[192],"only":[193],"significant":[196],"dimensions":[197],"purpose":[200],"targeted":[203],"types.":[205],"Using":[206],"resulting":[208],"features,":[209],"average":[211],"accuracy":[213],"96.19%":[215],"achieved,":[217],"comparing":[218],"88.40%":[220],"while":[221],"using":[222],"alone":[226],"Support":[228],"Vector":[229],"Machine":[230],"(SVM).":[231]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
