default search action
4th DSC 2019: Hangzhou, China
- Fourth IEEE International Conference on Data Science in Cyberspace, DSC 2019, Hangzhou, China, June 23-25, 2019. IEEE 2019, ISBN 978-1-7281-4528-0
2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)
Session 1: Deep Learning Algorithm and Applications 1
- Daihui Li, Shangyou Zeng, Zhou Yue, Bing Pan, Yang Lei:
Design of High Performance Convolutional Neural Network for Lightweight Platform. 1-8 - Xujian Li, Kai Xu:
Research on Data Caching Method of Gradient Consistent Hash. 9-15 - Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li:
RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases. 16-22
Session 2: Cyberspace Security 1
- Ao Liu, Bin Sun:
The Improved Model for Anomaly Detection Based on Clustering and Dividing of Flow. 23-30 - Haocheng Zhong, Chenxi Zeng, Aiping Li, Yan Jia, Rong Jiang, Yulu Qi, Weihong Han:
Research of Trojan Attack Effect Evaluation Based on FAHP. 31-37 - Hailong Yao, Xingbing Fu, Caifen Wang, Congcong Meng, Bo Hai, Shiqiang Zhu:
Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments. 38-45 - Yuntao Zhang, Tong Liu, Zhongru Wang, Qiang Ruan, Binxing Fang:
AutoDE: Automated Vulnerability Discovery and Exploitation. 46-53
Session 3: Deep Learning Algorithm and Applications 2
- Yu Tao, Yuanxing Zhang, Kaigui Bian:
Attentive Context-Aware Music Recommendation. 54-61 - Lixingjian An, Changwei Ren, Zhaoquan Gu, Yuexuan Wang, Yunjun Gao:
Rebalancing the Car-Sharing System: A Reinforcement Learning Method. 62-69 - Xiaowei Wang, Jiaxin Xiong, Rui Wang, Worku J. Sori, Jingtian Wang, Shaohui Liu, Feng Jiang:
FS-Net: Medical Image Denoising via Local Receptive Field Smoothing Network. 70-76 - Khouanetheva Pholsena, Li Pan, Zhenpeng Zheng:
Multi-node Mode Decomposition Based Deep Learning Model for Road Section Traffic Prediction. 77-83
Session 4: Cyberspace Security 2
- Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Peng Tang:
Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment. 84-91 - Yepeng Deng, Chunkai Zhang, Xuan Wang:
A Multi-objective Examples Generation Approach to Fool the Deep Neural Networks in the Black-Box Scenario. 92-99 - Yanwei Sun, Li Chen, Lihua Yin, Yunchuan Guo, Xiangjie Meng, Peng Zhang:
Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security. 100-105
Session 5: Knowledge Graph and Knowledge Processing
- Yunxuan Liu, Aiping Li, Jiuming Huang, Xinping Zheng, Hao Wang, Weihong Han, Zhichao Wang:
Joint Extraction of Entities and Relations Based on Multi-label Classification. 106-111 - Yichen Song, Aiping Li, Yan Jia, Jiuming Huang, Xiao-Juan Zhao:
Knowledge Fusion: Introduction of Concepts and Techniques. 112-118 - Xiao-Juan Zhao, Yan Jia, Aiping Li, Rong Jiang, Haocheng Xie, Yichen Song, Weihong Han:
Multi-source Knowledge Fusion: A Survey. 119-127
Session 6: Machine Learning 1
- Qing Meng, Yongheng Wang, Jingbin An, Zhongru Wang, Baoxing Zhang, Lijie Liu:
Learning Non-Stationary Dynamic Bayesian Network Structure from Data Stream. 128-134 - Han Yu, Aiping Li, Rong Jiang, Yan Jia, Xiao-Juan Zhao, Weihong Han:
HDGS: A Hybrid Dialogue Generation System using Adversarial Learning. 135-141 - Jie Zhang, Yan Wang, Jie Tang:
A Fast Network Embedding Approach with Preserving Hierarchical Proximities. 142-149 - Yongheng Wang, Rong Zhu, Zengwang Wang, Xiaozan Zhang, Baoxing Zhang:
Logic-Based Online Complex Event Rule Learning with Weight Optimization. 150-155
Session 7: Social Networks 1
- Yongheng Wang, Xiaozan Zhang, Xiangge Wang, Rong Zhu, Zengwang Wang, Lijie Liu:
Text Sentiment Analysis Based on Parallel Recursive Constituency Tree-LSTM. 156-161 - Jiajia Zhang, Shuqiang Yang, Weizhe Zhang, Bin Zhang, Zhenhuan Luo, Ying Zhou, Jia Xie:
Negotiation Game Model for Big Data Transactions. 162-167 - Yongcai Tao, Xinqian Zhang, Lei Shi, Lin Wei, Zhaoyang Hai, Junaid Abdul Wahid:
Joint Embedding of Emoticons and Labels Based on CNN for Microblog Sentiment Analysis. 168-175 - Yaoxuan Ji, Li Pan, Peng Wu:
Influence Maximization on Large-Scale Networks with a Group-Based Method via Network Embedding. 176-182
Session 8: Intelligent System
- Meixiang Dai, Guojun Dai, Yifan Wu, Yixing Xia, Fangyao Shen, Hua Zhang:
An Improved Feature Fusion for Speaker Recognition. 183-187 - Ming-hui Xiong, Wei Xiong, Ping Jian:
Visualization of the Non-Dominated Solutions in Many-Objective Optimization. 188-195 - Tianpeng Ye, Xiang Lin, Jun Wu, Gaolei Li, Jianhua Li:
Toward Dynamic Computation Offloading for Data Processing in Vehicular Fog Based F-RAN. 196-201 - Sijie Yang, Xiaofeng Wang, Lun An, Guizhu Zhang:
Yun: A High-Performance Container Management Service Based on OpenStack. 202-209 - Boyu Zhang, Kai Yang, Lianfang Wang, Yu-an Tan, Sikang Hu:
Tracing Android Kernel Codes at Early Stage without Extra Hardware Components. 210-216
Session 9: Machine Learning 2
- Ye Tao, Yanzhe Wang, Cao Shi, Xiaodong Wang, Canhui Xu, Zhifang Xu:
Cross-Domain User Profile Construction by Log Analysis. 217-221 - Qianhong Lin, Hua-Rui Wu, Jidong Yuan, Jingqiu Gu:
The Nearest Neighbor Classifiers for Time Series with Complex Shape Features. 222-227 - Bencai Zhang, Hua-Rui Wu, Yange Sun, Ronghua Gao:
Semi-Random Forest Based on Representative Patterns for Noisy and Non-Stationary Data Stream. 228-234 - Xiaoyi Huang, Jun Zheng, Kejun Zhang, Dong Liu, Jie Chen, Lei Bi:
A Standardized Aerosol Repository System for Knowledge Services and Crowdsourcing. 235-241
Session 10: Social Networks 2
- Lingyu Zeng, Chenguang Song, Bin Wu, Bai Wang:
SMAM: Detecting Rumors from Microblogs with Stance Mining Assisting Task. 242-249 - Chunhua Sun, Yinjie Xu:
Topic Model-Based Recommender System for Longtailed Products Against Popularity Bias. 250-256 - Chen Chang, Jianjun Cao, Guojun Lv, Nianfeng Weng:
An Unsupervised Approach of Truth Discovery from Multi-sourced Text Data. 257-263 - Liangliang Zhang, Xiao Sun, Peng Wang, Jinxin Hou, Guidong Sun:
Identifying Influential Nodes with a Community Structure Measure. 264-269
Workshops
Big Data and Business Analytics (BDBA 2019)
- Chan Jiang Jiang, Shaoyong Li, Guangcheng Huo, Lei Luo:
Research on the Relationship between APP Size and Installation Time in Intelligent Mobile Devices. 270-277 - Yiwei Zhu, Shilin Wang, Zheng Huang, Kai Chen, Xiang Lin, Quanhai Zhang:
Attention-Based Text Recognition in Image. 278-283 - Weixiong Hu, Zhaoquan Gu, Yushun Xie, Le Wang, Keke Tang:
Chinese Text Classification Based on Neural Networks and Word2vec. 284-291 - Zheng Shen, Zhaoquan Gu, Yuexuan Wang, Xiaoling Zheng, Mingli Song:
Weighted-Ring Similarity Measurement for Community Detection in Social Network. 292-299 - Peng Tang, Weidong Qiu, Min Yan, Zheng Huang, Shuang Chen, Huijuan Lian:
Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram. 300-305 - Shuang Chen, Weidong Qiu, Peng Tang, Guorui Duan, Min Yan, Zheng Huang:
Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network. 306-311 - Jian Dong, Bin Chen, Chuan Ai, Fang Zhang:
A Spatio-Temporal Flow Model of Dockless Shared Bikes. 312-317 - Cao Shi, Ye Tao, Can Xu, Xiaodong Wang, Yanzhe Wang, Zihao Wang:
Sentiment Analysis of Home Appliance Comment Based on Generative Probabilistic Model. 318-321 - Guohao Qiao, Bin Wu, Bai Wang, Baoli Zhang:
Competency Analysis in Human Resources Using Text Classification Based on Deep Neural Network. 322-329 - Leijun Huang, Hailin Feng, Ying Le:
Finding Water Quality Trend Patterns Using Time Series Clustering: A Case Study. 330-337 - Jian Zhang, Huanran Jin, Liangyi Gong, Jing Cao, Zhaojun Gu:
Overview of IoT Security Architecture. 338-345 - Jian Zhang, Huaijian Chen, Liangyi Gong, Jing Cao, Zhaojun Gu:
The Current Research of IoT Security. 346-353
Big Data Mining for Cyberspace (BDMC 2019)
- Yuanqi Yang, Lize Gu, Xiaoning Zhu:
Conflicts Resolving for Fusion of Multi-source Data. 354-360 - Huikang Sun, Lize Gu, Bin Sun:
Adathm: Adaptive Gradient Method Based on Estimates of Third-Order Moments. 361-366 - Junqiang Liu, Rong Zhao, Xiangcai Yang, Yong Zhang, Xiaoning Jiang:
Efficient Parallel Algorithm for Mining High Utility Patterns Based on Spark. 367-372 - Xiayu Xiang, Zhongru Wang, Yan Jia, Binxing Fang:
Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey. 373-380 - Longcheng Zhai, Bin Wu, Qiuyue Li:
KSC: A Fast and Simple Spectral Clustering Algorithm. 381-387 - Miaomiao Hong, Bin Wu, Bai Wang, Pengpeng Zhou:
STNS-CSG: Syntax Tree Networks with Self-Attention for Complex SQL Generation. 388-395 - Yang Chen, Guangjie Zhang, Dongliang Hu, Qingguang Tao:
Multiscale Emulation Technology Based on the Integration of Virtualization, Physical and Simulation Networks. 396-402 - Peng Peng, Dongwei Xu, He Gao, Qi Xuan, Yi Liu, Haifeng Guo, Defeng He:
Short-Term Traffic Flow Prediction using Attention-Based Long Short-Term Memory Network. 403-409 - Zexuan Yu, Xu Wu, Xiaqing Xie, Jin Xu:
Hot Event Detection for Social Media Based on Keyword Semantic Information. 410-415 - Yan Liu, Dongwen Zhang, Lei Du, Zhaoquan Gu, Jing Qiu, Qingji Tan:
A Simple but Effective Way to Improve the Performance of RNN-Based Encoder in Neural Machine Translation Task. 416-421 - Yanan Du, Yueming Lu:
A Weakness Relevance Evaluation Method Based on PageRank. 422-427
Multi-source Network Fusion and Analysis (MSNFA 2019)
- Jingjing Li, Yang Liu, Hongri Liu, Bailing Wang, Wei Wang, Lianhai Wang:
Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation. 428-431 - Hao Wang, Bin Zhou, Jiuming Huang, Yunxuan Liu, Xinping Zheng, Weihong Han:
BICON: Connecting the Same Users of Different Social Networks using BiLSTM. 432-438 - Yue Cai, Xu Wu, Xiaqing Xie, Jin Xu:
A Topic Mining Method for Multi-source Network Public Opinion Based on Improved Hierarchical Clustering. 439-444 - Xinzhe Wang, Xu Wu, Xiaqing Xie, Jin Xu:
Hybrid Text Topic Discovery Method for Multi-source Information. 445-452 - Yu Tao, Kaigui Bian, Chengliang Gao, Yuanxing Zhang, Lingyang Song, Shaoling Dong:
Machine Learning Assisted Content Delivery at Edge of Mobile Social Networks. 453-458 - Yilin Yang, Nianwen Ning, Yunlei Zhang, Bin Wu:
Community Preserving Node Embedding Based on Seed-Expansion Sampling. 459-465 - Xueting Luo, Yueming Lu:
A Method of Conflict Detection for Security Policy Based on B+ Tree. 466-472
Vulnerability Analysis and Adversarial Learning (VAAL 2019)
- Chengru Song, Changqiao Xu, Shujie Yang, Zan Zhou, Changhui Gong:
A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input. 473-479 - Junbin Fang, Aiping Li, Qianyue Jiang, Shudong Li, Weihong Han:
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match. 480-486 - Zhihui Guo, Jin Peng, Jun Fu, Yexia Cheng, Cancan Chen:
Botnet Detection Method Based on Artificial Intelligence. 487-494 - Haitian Liu, Weihong Han, Yan Jia:
Construction of Cyber Range Network Security Indication System Based on Deep Learning. 495-502 - Jingjing Zhang, Qiang Wang, Lin Yang, Tao Feng:
Formal Verification of 5G-EAP-TLS Authentication Protocol. 503-509 - Yulu Qi, Jincheng Zhong, Rong Jiang, Yan Jia, Aiping Li, Li Huang, Weihong Han:
FSM-Based Cyber Security Status Analysis Method. 510-515 - Haocheng Xie, Aiping Li, Rong Jiang, Yan Jia, Li Huang, Weihong Han:
Intrusion Detection Results Analysis Based on Variational Auto-Encoder. 516-521 - Jin Li, Minhuan Huang, Shuaibing Lu, Hu Li, Jin-Fu Chen:
Research on Evaluation Index System for Software Vulnerability Analysis Methods. 522-527 - Jie Lin, Chuanyi Liu, Xinyi Zhang, Rongfei Zhuang, Binxing Fang:
VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries. 528-535 - Shouyou Song, Zhongru Wang, Shuai Xu, Shi-Ce Ni, Jia Xiao:
A Novel Text Classification Approach Based on Word2vec and TextRank Keyword Extraction. 536-543 - Jing Du, Fujiang Ao, Yaxin Zhao, Yinglong Liu:
A Detection Method Based on K-Cores Algorithm for Abnormal Processes in the Server. 544-548 - Shuaibing Lu, Zhechao Lin, Ming Zhang:
Kernel Vulnerability Analysis: A Survey. 549-554
Virtual Narration and User Experience Design Analysis (VNUEDA 2019)
- Shilong Wu, Sinan He, Yu Peng, Weiying Li, Moli Zhou, Daisong Guan:
An Empirical Study on Expectation of Relationship Between Human and Smart Devices - With Smart Speaker as an Example. 555-560 - Lin Shao:
Facial Movements Recognition Using Multichannel EMG Signals. 561-566 - Xiaomei Nie, Shunru Li, Chun Yuan, Qifang Cao, Mingchun Wang, Wenlong Liu, Maomao Li:
Narratology-Based Interaction Design of 3D Reconstructed Cultural Relics. 567-574 - Jianzhi Xie, Xumeng Liu, Jing Li, Ling Zou:
Research on the Application of Chinese Traditional Patterns Innovation and Development Based on Interactive Media. 575-580 - Yali Zhang, Yingqing Xu, Shufan Li, Fangya Deng:
Study on Digital Chromatography of Fahai Temple Frescoes in Ming Dynasty Based on Visualization. 581-586 - Jiamin Huang, Yueming Lu, Kun Guo:
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition. 587-592 - Lai Kang, Jie Jiang, Yingmei Wei, Yuxiang Xie:
Efficient Randomized Hierarchy Construction for Interactive Visualization of Large Scale Point Clouds. 593-597
Data Analysis for Bridging Cyber-Real Spaces (DA4BS2 2019)
- Shuang Sun, Shudong Chen, Rong Du, Weiwei Li, Donglin Qi:
Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy. 598-603 - Guodong Yang, Jianhai Zhang, Li Zhu, Weitao Huan, Guang Lin, Zheng Ma:
UAV-Based Motion Target Detection and Tracking Method in Dynamic Scenes. 604-609 - Qiang Chen, Yunyuan Gao, Yun Peng, Jianhai Zhang, Ke Sun:
Accurate Object Recognition for Unmanned Aerial Vehicle Electric Power Inspection using an Improved YOLOv2 Algorithm. 610-617 - Hang Xu, Jing Cao, Jian Zhang, Liangyi Gong, Zhaojun Gu:
A Survey: Cloud Data Security Based on Blockchain Technology. 618-624 - Yongheng Wang, Zengwang Wang, Lijie Liu, Xiaozan Zhang:
Uncertain Complex Event Processing Based on Markov Logical Networks. 625-629 - Min Sun, Yu Zhang, Xiao Sun:
Analyzing the Cross-Sector Sharing of Government Data Based on the Niche Theory. 630-634 - Libo Xu, Lin Qiao, Feng Zhao, Bo Yang, Qiong Wang, Ping Ding, Lei Li:
Improvement and Application of Apriori Algorithm Based on Equalization. 635-641 - Xixi Huang, Jian Guan, Bin Zhang, Shuhan Qi, Xuan Wang, Qing Liao:
Differentially Private Convolutional Neural Networks with Adaptive Gradient Descent. 642-648 - Jiayu Ding, Xiaohuan Cao, Linmei Hu, Chuan Shi:
Meta-Path based Text Feature Enrichment Using Knowledge Graph. 649-655 - Ziyi Gong, Geping Wang, Qiong Wu:
Grey Island: Immersive tangible interaction through augmented reality. 656-661 - Jiajie Du, Li Pan, Huijuan Li, Lihong Yao:
Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks. 662-667 - Zilin Zeng, Xiangan Heng:
Feature selection and visualization based on interaction dominance. 668-673 - Xiaolei Zhou, Hao Yan, Xiaoxiong Zhang, Hui Zhang:
A Localization Approach for Non-localizable Wireless Sensor Network with Stationary Passive. 674-679 - Jianshan Sun, Yajue Liu, Chunhua Sun, Chunli Liu:
The Impact of Personality on User-Generated Content in Online Social Networks. 680-685 - Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Xinyi Zhang, Binxing Fang:
Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction. 686-693
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.