


default search action
4th DSC 2019: Hangzhou, China
- Fourth IEEE International Conference on Data Science in Cyberspace, DSC 2019, Hangzhou, China, June 23-25, 2019. IEEE 2019, ISBN 978-1-7281-4528-0

2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)
Session 1: Deep Learning Algorithm and Applications 1
- Daihui Li, Shangyou Zeng, Zhou Yue, Bing Pan, Yang Lei:

Design of High Performance Convolutional Neural Network for Lightweight Platform. 1-8 - Xujian Li, Kai Xu:

Research on Data Caching Method of Gradient Consistent Hash. 9-15 - Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li

:
RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases. 16-22
Session 2: Cyberspace Security 1
- Ao Liu, Bin Sun:

The Improved Model for Anomaly Detection Based on Clustering and Dividing of Flow. 23-30 - Haocheng Zhong, Chenxi Zeng, Aiping Li, Yan Jia, Rong Jiang, Yulu Qi, Weihong Han:

Research of Trojan Attack Effect Evaluation Based on FAHP. 31-37 - Hailong Yao, Xingbing Fu, Caifen Wang, Congcong Meng, Bo Hai, Shiqiang Zhu:

Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments. 38-45 - Yuntao Zhang, Tong Liu, Zhongru Wang, Qiang Ruan, Binxing Fang:

AutoDE: Automated Vulnerability Discovery and Exploitation. 46-53
Session 3: Deep Learning Algorithm and Applications 2
- Yu Tao

, Yuanxing Zhang
, Kaigui Bian:
Attentive Context-Aware Music Recommendation. 54-61 - Lixingjian An, Changwei Ren, Zhaoquan Gu, Yuexuan Wang, Yunjun Gao:

Rebalancing the Car-Sharing System: A Reinforcement Learning Method. 62-69 - Xiaowei Wang, Jiaxin Xiong, Rui Wang, Worku J. Sori, Jingtian Wang, Shaohui Liu, Feng Jiang:

FS-Net: Medical Image Denoising via Local Receptive Field Smoothing Network. 70-76 - Khouanetheva Pholsena, Li Pan, Zhenpeng Zheng:

Multi-node Mode Decomposition Based Deep Learning Model for Road Section Traffic Prediction. 77-83
Session 4: Cyberspace Security 2
- Huijuan Lian, Weidong Qiu, Di Yan

, Zheng Huang, Peng Tang:
Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment. 84-91 - Yepeng Deng, Chunkai Zhang, Xuan Wang:

A Multi-objective Examples Generation Approach to Fool the Deep Neural Networks in the Black-Box Scenario. 92-99 - Yanwei Sun, Li Chen, Lihua Yin, Yunchuan Guo, Xiangjie Meng, Peng Zhang:

Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security. 100-105
Session 5: Knowledge Graph and Knowledge Processing
- Yunxuan Liu, Aiping Li, Jiuming Huang, Xinping Zheng, Hao Wang, Weihong Han, Zhichao Wang:

Joint Extraction of Entities and Relations Based on Multi-label Classification. 106-111 - Yichen Song, Aiping Li, Yan Jia, Jiuming Huang, Xiao-Juan Zhao:

Knowledge Fusion: Introduction of Concepts and Techniques. 112-118 - Xiao-Juan Zhao, Yan Jia, Aiping Li, Rong Jiang, Haocheng Xie, Yichen Song, Weihong Han:

Multi-source Knowledge Fusion: A Survey. 119-127
Session 6: Machine Learning 1
- Qing Meng, Yongheng Wang, Jingbin An, Zhongru Wang, Baoxing Zhang, Lijie Liu:

Learning Non-Stationary Dynamic Bayesian Network Structure from Data Stream. 128-134 - Han Yu, Aiping Li, Rong Jiang, Yan Jia, Xiao-Juan Zhao, Weihong Han:

HDGS: A Hybrid Dialogue Generation System using Adversarial Learning. 135-141 - Jie Zhang, Yan Wang, Jie Tang:

A Fast Network Embedding Approach with Preserving Hierarchical Proximities. 142-149 - Yongheng Wang, Rong Zhu, Zengwang Wang, Xiaozan Zhang, Baoxing Zhang:

Logic-Based Online Complex Event Rule Learning with Weight Optimization. 150-155
Session 7: Social Networks 1
- Yongheng Wang, Xiaozan Zhang, Xiangge Wang, Rong Zhu, Zengwang Wang, Lijie Liu:

Text Sentiment Analysis Based on Parallel Recursive Constituency Tree-LSTM. 156-161 - Jiajia Zhang, Shuqiang Yang, Weizhe Zhang, Bin Zhang, Zhenhuan Luo, Ying Zhou, Jia Xie:

Negotiation Game Model for Big Data Transactions. 162-167 - Yongcai Tao, Xinqian Zhang, Lei Shi

, Lin Wei, Zhaoyang Hai, Junaid Abdul Wahid:
Joint Embedding of Emoticons and Labels Based on CNN for Microblog Sentiment Analysis. 168-175 - Yaoxuan Ji, Li Pan, Peng Wu

:
Influence Maximization on Large-Scale Networks with a Group-Based Method via Network Embedding. 176-182
Session 8: Intelligent System
- Meixiang Dai, Guojun Dai, Yifan Wu, Yixing Xia, Fangyao Shen, Hua Zhang:

An Improved Feature Fusion for Speaker Recognition. 183-187 - Ming-hui Xiong, Wei Xiong, Ping Jian:

Visualization of the Non-Dominated Solutions in Many-Objective Optimization. 188-195 - Tianpeng Ye, Xiang Lin, Jun Wu, Gaolei Li, Jianhua Li:

Toward Dynamic Computation Offloading for Data Processing in Vehicular Fog Based F-RAN. 196-201 - Sijie Yang, Xiaofeng Wang, Lun An, Guizhu Zhang:

Yun: A High-Performance Container Management Service Based on OpenStack. 202-209 - Boyu Zhang, Kai Yang, Lianfang Wang, Yu-an Tan, Sikang Hu:

Tracing Android Kernel Codes at Early Stage without Extra Hardware Components. 210-216
Session 9: Machine Learning 2
- Ye Tao, Yanzhe Wang, Cao Shi, Xiaodong Wang, Canhui Xu, Zhifang Xu:

Cross-Domain User Profile Construction by Log Analysis. 217-221 - Qianhong Lin, Hua-Rui Wu, Jidong Yuan, Jingqiu Gu:

The Nearest Neighbor Classifiers for Time Series with Complex Shape Features. 222-227 - Bencai Zhang, Hua-Rui Wu, Yange Sun, Ronghua Gao:

Semi-Random Forest Based on Representative Patterns for Noisy and Non-Stationary Data Stream. 228-234 - Xiaoyi Huang, Jun Zheng, Kejun Zhang, Dong Liu, Jie Chen, Lei Bi:

A Standardized Aerosol Repository System for Knowledge Services and Crowdsourcing. 235-241
Session 10: Social Networks 2
- Lingyu Zeng, Chenguang Song, Bin Wu, Bai Wang:

SMAM: Detecting Rumors from Microblogs with Stance Mining Assisting Task. 242-249 - Chunhua Sun, Yinjie Xu:

Topic Model-Based Recommender System for Longtailed Products Against Popularity Bias. 250-256 - Chen Chang, Jianjun Cao, Guojun Lv, Nianfeng Weng:

An Unsupervised Approach of Truth Discovery from Multi-sourced Text Data. 257-263 - Liangliang Zhang, Xiao Sun, Peng Wang, Jinxin Hou, Guidong Sun:

Identifying Influential Nodes with a Community Structure Measure. 264-269
Workshops
Big Data and Business Analytics (BDBA 2019)
- Chan Jiang Jiang, Shaoyong Li

, Guangcheng Huo, Lei Luo:
Research on the Relationship between APP Size and Installation Time in Intelligent Mobile Devices. 270-277 - Yiwei Zhu, Shilin Wang, Zheng Huang, Kai Chen, Xiang Lin, Quanhai Zhang:

Attention-Based Text Recognition in Image. 278-283 - Weixiong Hu, Zhaoquan Gu, Yushun Xie, Le Wang, Keke Tang

:
Chinese Text Classification Based on Neural Networks and Word2vec. 284-291 - Zheng Shen, Zhaoquan Gu, Yuexuan Wang, Xiaoling Zheng, Mingli Song:

Weighted-Ring Similarity Measurement for Community Detection in Social Network. 292-299 - Peng Tang, Weidong Qiu, Min Yan, Zheng Huang, Shuang Chen, Huijuan Lian:

Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram. 300-305 - Shuang Chen, Weidong Qiu, Peng Tang, Guorui Duan, Min Yan, Zheng Huang:

Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network. 306-311 - Jian Dong, Bin Chen, Chuan Ai, Fang Zhang:

A Spatio-Temporal Flow Model of Dockless Shared Bikes. 312-317 - Cao Shi, Ye Tao, Can Xu, Xiaodong Wang, Yanzhe Wang, Zihao Wang:

Sentiment Analysis of Home Appliance Comment Based on Generative Probabilistic Model. 318-321 - Guohao Qiao, Bin Wu, Bai Wang, Baoli Zhang:

Competency Analysis in Human Resources Using Text Classification Based on Deep Neural Network. 322-329 - Leijun Huang, Hailin Feng, Ying Le:

Finding Water Quality Trend Patterns Using Time Series Clustering: A Case Study. 330-337 - Jian Zhang, Huanran Jin, Liangyi Gong, Jing Cao, Zhaojun Gu:

Overview of IoT Security Architecture. 338-345 - Jian Zhang, Huaijian Chen, Liangyi Gong, Jing Cao, Zhaojun Gu:

The Current Research of IoT Security. 346-353
Big Data Mining for Cyberspace (BDMC 2019)
- Yuanqi Yang, Lize Gu, Xiaoning Zhu:

Conflicts Resolving for Fusion of Multi-source Data. 354-360 - Huikang Sun, Lize Gu, Bin Sun:

Adathm: Adaptive Gradient Method Based on Estimates of Third-Order Moments. 361-366 - Junqiang Liu, Rong Zhao, Xiangcai Yang, Yong Zhang, Xiaoning Jiang:

Efficient Parallel Algorithm for Mining High Utility Patterns Based on Spark. 367-372 - Xiayu Xiang, Zhongru Wang, Yan Jia, Binxing Fang:

Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey. 373-380 - Longcheng Zhai, Bin Wu, Qiuyue Li:

KSC: A Fast and Simple Spectral Clustering Algorithm. 381-387 - Miaomiao Hong, Bin Wu, Bai Wang, Pengpeng Zhou:

STNS-CSG: Syntax Tree Networks with Self-Attention for Complex SQL Generation. 388-395 - Yang Chen, Guangjie Zhang, Dongliang Hu, Qingguang Tao:

Multiscale Emulation Technology Based on the Integration of Virtualization, Physical and Simulation Networks. 396-402 - Peng Peng, Dongwei Xu, He Gao, Qi Xuan, Yi Liu, Haifeng Guo, Defeng He:

Short-Term Traffic Flow Prediction using Attention-Based Long Short-Term Memory Network. 403-409 - Zexuan Yu, Xu Wu, Xiaqing Xie, Jin Xu:

Hot Event Detection for Social Media Based on Keyword Semantic Information. 410-415 - Yan Liu, Dongwen Zhang, Lei Du, Zhaoquan Gu, Jing Qiu, Qingji Tan:

A Simple but Effective Way to Improve the Performance of RNN-Based Encoder in Neural Machine Translation Task. 416-421 - Yanan Du, Yueming Lu:

A Weakness Relevance Evaluation Method Based on PageRank. 422-427
Multi-source Network Fusion and Analysis (MSNFA 2019)
- Jingjing Li, Yang Liu, Hongri Liu, Bailing Wang, Wei Wang, Lianhai Wang:

Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation. 428-431 - Hao Wang, Bin Zhou, Jiuming Huang, Yunxuan Liu, Xinping Zheng, Weihong Han:

BICON: Connecting the Same Users of Different Social Networks using BiLSTM. 432-438 - Yue Cai, Xu Wu, Xiaqing Xie, Jin Xu:

A Topic Mining Method for Multi-source Network Public Opinion Based on Improved Hierarchical Clustering. 439-444 - Xinzhe Wang, Xu Wu, Xiaqing Xie, Jin Xu:

Hybrid Text Topic Discovery Method for Multi-source Information. 445-452 - Yu Tao

, Kaigui Bian, Chengliang Gao, Yuanxing Zhang
, Lingyang Song, Shaoling Dong:
Machine Learning Assisted Content Delivery at Edge of Mobile Social Networks. 453-458 - Yilin Yang, Nianwen Ning, Yunlei Zhang, Bin Wu:

Community Preserving Node Embedding Based on Seed-Expansion Sampling. 459-465 - Xueting Luo, Yueming Lu:

A Method of Conflict Detection for Security Policy Based on B+ Tree. 466-472
Vulnerability Analysis and Adversarial Learning (VAAL 2019)
- Chengru Song, Changqiao Xu, Shujie Yang, Zan Zhou, Changhui Gong:

A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input. 473-479 - Junbin Fang, Aiping Li, Qianyue Jiang, Shudong Li, Weihong Han:

A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match. 480-486 - Zhihui Guo, Jin Peng, Jun Fu, Yexia Cheng, Cancan Chen:

Botnet Detection Method Based on Artificial Intelligence. 487-494 - Haitian Liu, Weihong Han, Yan Jia:

Construction of Cyber Range Network Security Indication System Based on Deep Learning. 495-502 - Jingjing Zhang, Qiang Wang, Lin Yang, Tao Feng:

Formal Verification of 5G-EAP-TLS Authentication Protocol. 503-509 - Yulu Qi, Jincheng Zhong, Rong Jiang, Yan Jia, Aiping Li, Li Huang, Weihong Han:

FSM-Based Cyber Security Status Analysis Method. 510-515 - Haocheng Xie, Aiping Li, Rong Jiang, Yan Jia, Li Huang, Weihong Han:

Intrusion Detection Results Analysis Based on Variational Auto-Encoder. 516-521 - Jin Li, Minhuan Huang, Shuaibing Lu, Hu Li, Jin-Fu Chen:

Research on Evaluation Index System for Software Vulnerability Analysis Methods. 522-527 - Jie Lin, Chuanyi Liu, Xinyi Zhang

, Rongfei Zhuang, Binxing Fang:
VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries. 528-535 - Shouyou Song, Zhongru Wang, Shuai Xu, Shi-Ce Ni, Jia Xiao:

A Novel Text Classification Approach Based on Word2vec and TextRank Keyword Extraction. 536-543 - Jing Du, Fujiang Ao, Yaxin Zhao, Yinglong Liu:

A Detection Method Based on K-Cores Algorithm for Abnormal Processes in the Server. 544-548 - Shuaibing Lu, Zhechao Lin, Ming Zhang:

Kernel Vulnerability Analysis: A Survey. 549-554
Virtual Narration and User Experience Design Analysis (VNUEDA 2019)
- Shilong Wu, Sinan He, Yu Peng, Weiying Li, Moli Zhou, Daisong Guan:

An Empirical Study on Expectation of Relationship Between Human and Smart Devices - With Smart Speaker as an Example. 555-560 - Lin Shao:

Facial Movements Recognition Using Multichannel EMG Signals. 561-566 - Xiaomei Nie, Shunru Li, Chun Yuan, Qifang Cao, Mingchun Wang, Wenlong Liu, Maomao Li:

Narratology-Based Interaction Design of 3D Reconstructed Cultural Relics. 567-574 - Jianzhi Xie, Xumeng Liu, Jing Li, Ling Zou:

Research on the Application of Chinese Traditional Patterns Innovation and Development Based on Interactive Media. 575-580 - Yali Zhang, Yingqing Xu, Shufan Li, Fangya Deng:

Study on Digital Chromatography of Fahai Temple Frescoes in Ming Dynasty Based on Visualization. 581-586 - Jiamin Huang, Yueming Lu, Kun Guo:

A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition. 587-592 - Lai Kang, Jie Jiang

, Yingmei Wei, Yuxiang Xie:
Efficient Randomized Hierarchy Construction for Interactive Visualization of Large Scale Point Clouds. 593-597
Data Analysis for Bridging Cyber-Real Spaces (DA4BS2 2019)
- Shuang Sun, Shudong Chen, Rong Du, Weiwei Li, Donglin Qi:

Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy. 598-603 - Guodong Yang, Jianhai Zhang, Li Zhu, Weitao Huan, Guang Lin

, Zheng Ma:
UAV-Based Motion Target Detection and Tracking Method in Dynamic Scenes. 604-609 - Qiang Chen, Yunyuan Gao, Yun Peng, Jianhai Zhang, Ke Sun:

Accurate Object Recognition for Unmanned Aerial Vehicle Electric Power Inspection using an Improved YOLOv2 Algorithm. 610-617 - Hang Xu, Jing Cao, Jian Zhang, Liangyi Gong, Zhaojun Gu:

A Survey: Cloud Data Security Based on Blockchain Technology. 618-624 - Yongheng Wang, Zengwang Wang, Lijie Liu, Xiaozan Zhang:

Uncertain Complex Event Processing Based on Markov Logical Networks. 625-629 - Min Sun, Yu Zhang, Xiao Sun:

Analyzing the Cross-Sector Sharing of Government Data Based on the Niche Theory. 630-634 - Libo Xu, Lin Qiao, Feng Zhao, Bo Yang, Qiong Wang, Ping Ding, Lei Li

:
Improvement and Application of Apriori Algorithm Based on Equalization. 635-641 - Xixi Huang, Jian Guan, Bin Zhang, Shuhan Qi, Xuan Wang, Qing Liao:

Differentially Private Convolutional Neural Networks with Adaptive Gradient Descent. 642-648 - Jiayu Ding, Xiaohuan Cao, Linmei Hu, Chuan Shi:

Meta-Path based Text Feature Enrichment Using Knowledge Graph. 649-655 - Ziyi Gong, Geping Wang, Qiong Wu:

Grey Island: Immersive tangible interaction through augmented reality. 656-661 - Jiajie Du, Li Pan, Huijuan Li, Lihong Yao:

Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks. 662-667 - Zilin Zeng, Xiangan Heng:

Feature selection and visualization based on interaction dominance. 668-673 - Xiaolei Zhou, Hao Yan, Xiaoxiong Zhang, Hui Zhang:

A Localization Approach for Non-localizable Wireless Sensor Network with Stationary Passive. 674-679 - Jianshan Sun, Yajue Liu, Chunhua Sun, Chunli Liu:

The Impact of Personality on User-Generated Content in Online Social Networks. 680-685 - Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Xinyi Zhang

, Binxing Fang:
Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction. 686-693

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














