dblp: DSC 2019 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


4th DSC 2019: Hangzhou, China

- > Home > Conferences and Workshops > DSC
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Fourth IEEE International Conference on Data Science in Cyberspace, DSC 2019, Hangzhou, China, June 23-25, 2019. IEEE 2019, ISBN 978-1-7281-4528-0
2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)
Session 1: Deep Learning Algorithm and Applications 1

Daihui Li, Shangyou Zeng, Zhou Yue, Bing Pan, Yang Lei:
Design of High Performance Convolutional Neural Network for Lightweight Platform. 1-8

Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li
:
RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases. 16-22
Session 2: Cyberspace Security 1

Haocheng Zhong, Chenxi Zeng, Aiping Li, Yan Jia, Rong Jiang, Yulu Qi, Weihong Han:
Research of Trojan Attack Effect Evaluation Based on FAHP. 31-37

Hailong Yao, Xingbing Fu, Caifen Wang, Congcong Meng, Bo Hai, Shiqiang Zhu:
Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments. 38-45

Yuntao Zhang, Tong Liu, Zhongru Wang, Qiang Ruan, Binxing Fang:
AutoDE: Automated Vulnerability Discovery and Exploitation. 46-53
Session 3: Deep Learning Algorithm and Applications 2

Yu Tao
, Yuanxing Zhang
, Kaigui Bian:
Attentive Context-Aware Music Recommendation. 54-61

Lixingjian An, Changwei Ren, Zhaoquan Gu, Yuexuan Wang, Yunjun Gao:
Rebalancing the Car-Sharing System: A Reinforcement Learning Method. 62-69

Xiaowei Wang, Jiaxin Xiong, Rui Wang, Worku J. Sori, Jingtian Wang, Shaohui Liu, Feng Jiang:
FS-Net: Medical Image Denoising via Local Receptive Field Smoothing Network. 70-76

Khouanetheva Pholsena, Li Pan, Zhenpeng Zheng:
Multi-node Mode Decomposition Based Deep Learning Model for Road Section Traffic Prediction. 77-83
Session 4: Cyberspace Security 2

Huijuan Lian, Weidong Qiu, Di Yan
, Zheng Huang, Peng Tang:
Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment. 84-91

Yepeng Deng, Chunkai Zhang, Xuan Wang:
A Multi-objective Examples Generation Approach to Fool the Deep Neural Networks in the Black-Box Scenario. 92-99

Yanwei Sun, Li Chen, Lihua Yin, Yunchuan Guo, Xiangjie Meng, Peng Zhang:
Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security. 100-105
Session 5: Knowledge Graph and Knowledge Processing

Yunxuan Liu, Aiping Li, Jiuming Huang, Xinping Zheng, Hao Wang, Weihong Han, Zhichao Wang:
Joint Extraction of Entities and Relations Based on Multi-label Classification. 106-111

Yichen Song, Aiping Li, Yan Jia, Jiuming Huang, Xiao-Juan Zhao:
Knowledge Fusion: Introduction of Concepts and Techniques. 112-118

Xiao-Juan Zhao, Yan Jia, Aiping Li, Rong Jiang, Haocheng Xie, Yichen Song, Weihong Han:
Multi-source Knowledge Fusion: A Survey. 119-127
Session 6: Machine Learning 1

Qing Meng, Yongheng Wang, Jingbin An, Zhongru Wang, Baoxing Zhang, Lijie Liu:
Learning Non-Stationary Dynamic Bayesian Network Structure from Data Stream. 128-134

Han Yu, Aiping Li, Rong Jiang, Yan Jia, Xiao-Juan Zhao, Weihong Han:
HDGS: A Hybrid Dialogue Generation System using Adversarial Learning. 135-141

Yongheng Wang, Rong Zhu, Zengwang Wang, Xiaozan Zhang, Baoxing Zhang:
Logic-Based Online Complex Event Rule Learning with Weight Optimization. 150-155
Session 7: Social Networks 1

Yongheng Wang, Xiaozan Zhang, Xiangge Wang, Rong Zhu, Zengwang Wang, Lijie Liu:
Text Sentiment Analysis Based on Parallel Recursive Constituency Tree-LSTM. 156-161

Jiajia Zhang, Shuqiang Yang, Weizhe Zhang, Bin Zhang, Zhenhuan Luo, Ying Zhou, Jia Xie:
Negotiation Game Model for Big Data Transactions. 162-167

Yongcai Tao, Xinqian Zhang, Lei Shi
, Lin Wei, Zhaoyang Hai, Junaid Abdul Wahid:
Joint Embedding of Emoticons and Labels Based on CNN for Microblog Sentiment Analysis. 168-175

Yaoxuan Ji, Li Pan, Peng Wu
:
Influence Maximization on Large-Scale Networks with a Group-Based Method via Network Embedding. 176-182
Session 8: Intelligent System

Meixiang Dai, Guojun Dai
, Yifan Wu, Yixing Xia, Fangyao Shen, Hua Zhang:
An Improved Feature Fusion for Speaker Recognition. 183-187

Ming-hui Xiong, Wei Xiong, Ping Jian:
Visualization of the Non-Dominated Solutions in Many-Objective Optimization. 188-195

Tianpeng Ye, Xiang Lin, Jun Wu, Gaolei Li, Jianhua Li:
Toward Dynamic Computation Offloading for Data Processing in Vehicular Fog Based F-RAN. 196-201

Sijie Yang, Xiaofeng Wang, Lun An, Guizhu Zhang:
Yun: A High-Performance Container Management Service Based on OpenStack. 202-209

Boyu Zhang, Kai Yang, Lianfang Wang, Yu-an Tan, Sikang Hu:
Tracing Android Kernel Codes at Early Stage without Extra Hardware Components. 210-216
Session 9: Machine Learning 2

Ye Tao, Yanzhe Wang, Cao Shi, Xiaodong Wang, Canhui Xu, Zhifang Xu:
Cross-Domain User Profile Construction by Log Analysis. 217-221

Qianhong Lin, Hua-Rui Wu, Jidong Yuan, Jingqiu Gu:
The Nearest Neighbor Classifiers for Time Series with Complex Shape Features. 222-227

Bencai Zhang, Hua-Rui Wu, Yange Sun, Ronghua Gao:
Semi-Random Forest Based on Representative Patterns for Noisy and Non-Stationary Data Stream. 228-234

Xiaoyi Huang, Jun Zheng, Kejun Zhang, Dong Liu, Jie Chen, Lei Bi:
A Standardized Aerosol Repository System for Knowledge Services and Crowdsourcing. 235-241
Session 10: Social Networks 2

Lingyu Zeng, Chenguang Song, Bin Wu, Bai Wang:
SMAM: Detecting Rumors from Microblogs with Stance Mining Assisting Task. 242-249

Chunhua Sun, Yinjie Xu:
Topic Model-Based Recommender System for Longtailed Products Against Popularity Bias. 250-256

Chen Chang, Jianjun Cao, Guojun Lv, Nianfeng Weng:
An Unsupervised Approach of Truth Discovery from Multi-sourced Text Data. 257-263

Liangliang Zhang, Xiao Sun, Peng Wang, Jinxin Hou, Guidong Sun:
Identifying Influential Nodes with a Community Structure Measure. 264-269
Workshops
Big Data and Business Analytics (BDBA 2019)

Chan Jiang Jiang, Shaoyong Li
, Guangcheng Huo, Lei Luo:
Research on the Relationship between APP Size and Installation Time in Intelligent Mobile Devices. 270-277

Yiwei Zhu, Shilin Wang, Zheng Huang, Kai Chen, Xiang Lin, Quanhai Zhang:
Attention-Based Text Recognition in Image. 278-283

Weixiong Hu, Zhaoquan Gu, Yushun Xie, Le Wang, Keke Tang
:
Chinese Text Classification Based on Neural Networks and Word2vec. 284-291

Zheng Shen, Zhaoquan Gu, Yuexuan Wang, Xiaoling Zheng, Mingli Song:
Weighted-Ring Similarity Measurement for Community Detection in Social Network. 292-299

Peng Tang, Weidong Qiu, Min Yan, Zheng Huang, Shuang Chen, Huijuan Lian:
Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-Gram. 300-305

Shuang Chen, Weidong Qiu, Peng Tang, Guorui Duan, Min Yan, Zheng Huang:
Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network. 306-311

Jian Dong, Bin Chen, Chuan Ai, Fang Zhang:
A Spatio-Temporal Flow Model of Dockless Shared Bikes. 312-317

Cao Shi, Ye Tao, Can Xu, Xiaodong Wang, Yanzhe Wang, Zihao Wang:
Sentiment Analysis of Home Appliance Comment Based on Generative Probabilistic Model. 318-321

Guohao Qiao, Bin Wu, Bai Wang, Baoli Zhang:
Competency Analysis in Human Resources Using Text Classification Based on Deep Neural Network. 322-329

Leijun Huang, Hailin Feng, Ying Le:
Finding Water Quality Trend Patterns Using Time Series Clustering: A Case Study. 330-337

Jian Zhang, Huanran Jin, Liangyi Gong, Jing Cao, Zhaojun Gu:
Overview of IoT Security Architecture. 338-345

Jian Zhang, Huaijian Chen, Liangyi Gong, Jing Cao, Zhaojun Gu:
The Current Research of IoT Security. 346-353
Big Data Mining for Cyberspace (BDMC 2019)

Yuanqi Yang, Lize Gu, Xiaoning Zhu:
Conflicts Resolving for Fusion of Multi-source Data. 354-360

Huikang Sun, Lize Gu, Bin Sun:
Adathm: Adaptive Gradient Method Based on Estimates of Third-Order Moments. 361-366

Junqiang Liu, Rong Zhao, Xiangcai Yang, Yong Zhang, Xiaoning Jiang:
Efficient Parallel Algorithm for Mining High Utility Patterns Based on Spark. 367-372

Xiayu Xiang, Zhongru Wang, Yan Jia, Binxing Fang:
Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey. 373-380

Longcheng Zhai, Bin Wu, Qiuyue Li:
KSC: A Fast and Simple Spectral Clustering Algorithm. 381-387

Miaomiao Hong, Bin Wu, Bai Wang, Pengpeng Zhou:
STNS-CSG: Syntax Tree Networks with Self-Attention for Complex SQL Generation. 388-395

Yang Chen, Guangjie Zhang, Dongliang Hu, Qingguang Tao:
Multiscale Emulation Technology Based on the Integration of Virtualization, Physical and Simulation Networks. 396-402

Peng Peng, Dongwei Xu, He Gao, Qi Xuan, Yi Liu, Haifeng Guo, Defeng He:
Short-Term Traffic Flow Prediction using Attention-Based Long Short-Term Memory Network. 403-409

Zexuan Yu, Xu Wu, Xiaqing Xie, Jin Xu:
Hot Event Detection for Social Media Based on Keyword Semantic Information. 410-415

Yan Liu, Dongwen Zhang, Lei Du, Zhaoquan Gu, Jing Qiu, Qingji Tan:
A Simple but Effective Way to Improve the Performance of RNN-Based Encoder in Neural Machine Translation Task. 416-421

Yanan Du, Yueming Lu:
A Weakness Relevance Evaluation Method Based on PageRank. 422-427
Multi-source Network Fusion and Analysis (MSNFA 2019)

Jingjing Li, Yang Liu, Hongri Liu, Bailing Wang, Wei Wang, Lianhai Wang:
Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation. 428-431

Hao Wang, Bin Zhou, Jiuming Huang, Yunxuan Liu, Xinping Zheng, Weihong Han:
BICON: Connecting the Same Users of Different Social Networks using BiLSTM. 432-438

Yue Cai, Xu Wu, Xiaqing Xie, Jin Xu:
A Topic Mining Method for Multi-source Network Public Opinion Based on Improved Hierarchical Clustering. 439-444

Xinzhe Wang, Xu Wu, Xiaqing Xie, Jin Xu:
Hybrid Text Topic Discovery Method for Multi-source Information. 445-452

Yu Tao
, Kaigui Bian, Chengliang Gao, Yuanxing Zhang
, Lingyang Song, Shaoling Dong:
Machine Learning Assisted Content Delivery at Edge of Mobile Social Networks. 453-458

Yilin Yang, Nianwen Ning, Yunlei Zhang, Bin Wu:
Community Preserving Node Embedding Based on Seed-Expansion Sampling. 459-465

Xueting Luo, Yueming Lu:
A Method of Conflict Detection for Security Policy Based on B+ Tree. 466-472
Vulnerability Analysis and Adversarial Learning (VAAL 2019)

Chengru Song, Changqiao Xu, Shujie Yang, Zan Zhou, Changhui Gong:
A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional Input. 473-479

Junbin Fang, Aiping Li, Qianyue Jiang, Shudong Li, Weihong Han:
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match. 480-486

Zhihui Guo, Jin Peng, Jun Fu, Yexia Cheng, Cancan Chen:
Botnet Detection Method Based on Artificial Intelligence. 487-494

Haitian Liu, Weihong Han, Yan Jia:
Construction of Cyber Range Network Security Indication System Based on Deep Learning. 495-502

Jingjing Zhang, Qiang Wang, Lin Yang, Tao Feng:
Formal Verification of 5G-EAP-TLS Authentication Protocol. 503-509

Yulu Qi, Jincheng Zhong, Rong Jiang, Yan Jia, Aiping Li, Li Huang, Weihong Han:
FSM-Based Cyber Security Status Analysis Method. 510-515

Haocheng Xie, Aiping Li, Rong Jiang, Yan Jia, Li Huang, Weihong Han:
Intrusion Detection Results Analysis Based on Variational Auto-Encoder. 516-521

Jin Li, Minhuan Huang, Shuaibing Lu, Hu Li, Jin-Fu Chen:
Research on Evaluation Index System for Software Vulnerability Analysis Methods. 522-527

Jie Lin, Chuanyi Liu, Xinyi Zhang
, Rongfei Zhuang, Binxing Fang:
VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries. 528-535

Shouyou Song, Zhongru Wang, Shuai Xu, Shi-Ce Ni, Jia Xiao:
A Novel Text Classification Approach Based on Word2vec and TextRank Keyword Extraction. 536-543

Jing Du, Fujiang Ao, Yaxin Zhao, Yinglong Liu:
A Detection Method Based on K-Cores Algorithm for Abnormal Processes in the Server. 544-548

Shuaibing Lu, Zhechao Lin, Ming Zhang:
Kernel Vulnerability Analysis: A Survey. 549-554
Virtual Narration and User Experience Design Analysis (VNUEDA 2019)

Shilong Wu, Sinan He, Yu Peng, Weiying Li, Moli Zhou, Daisong Guan:
An Empirical Study on Expectation of Relationship Between Human and Smart Devices - With Smart Speaker as an Example. 555-560

Lin Shao:
Facial Movements Recognition Using Multichannel EMG Signals. 561-566

Xiaomei Nie, Shunru Li, Chun Yuan, Qifang Cao, Mingchun Wang, Wenlong Liu, Maomao Li:
Narratology-Based Interaction Design of 3D Reconstructed Cultural Relics. 567-574

Jianzhi Xie, Xumeng Liu, Jing Li, Ling Zou:
Research on the Application of Chinese Traditional Patterns Innovation and Development Based on Interactive Media. 575-580

Yali Zhang, Yingqing Xu, Shufan Li, Fangya Deng:
Study on Digital Chromatography of Fahai Temple Frescoes in Ming Dynasty Based on Visualization. 581-586

Jiamin Huang, Yueming Lu, Kun Guo:
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition. 587-592

Lai Kang, Jie Jiang
, Yingmei Wei, Yuxiang Xie:
Efficient Randomized Hierarchy Construction for Interactive Visualization of Large Scale Point Clouds. 593-597
Data Analysis for Bridging Cyber-Real Spaces (DA4BS2 2019)

Shuang Sun, Shudong Chen, Rong Du, Weiwei Li, Donglin Qi:
Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy. 598-603

Guodong Yang, Jianhai Zhang, Li Zhu, Weitao Huan, Guang Lin
, Zheng Ma:
UAV-Based Motion Target Detection and Tracking Method in Dynamic Scenes. 604-609

Qiang Chen, Yunyuan Gao, Yun Peng, Jianhai Zhang, Ke Sun:
Accurate Object Recognition for Unmanned Aerial Vehicle Electric Power Inspection using an Improved YOLOv2 Algorithm. 610-617

Hang Xu, Jing Cao, Jian Zhang, Liangyi Gong, Zhaojun Gu:
A Survey: Cloud Data Security Based on Blockchain Technology. 618-624

Yongheng Wang, Zengwang Wang, Lijie Liu, Xiaozan Zhang:
Uncertain Complex Event Processing Based on Markov Logical Networks. 625-629

Jiayu Ding, Xiaohuan Cao, Linmei Hu, Chuan Shi:
Meta-Path based Text Feature Enrichment Using Knowledge Graph. 649-655

Ziyi Gong, Geping Wang, Qiong Wu:
Grey Island: Immersive tangible interaction through augmented reality. 656-661

Jiajie Du, Li Pan, Huijuan Li, Lihong Yao:
Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks. 662-667

Zilin Zeng, Xiangan Heng:
Feature selection and visualization based on interaction dominance. 668-673

Xiaolei Zhou, Hao Yan, Xiaoxiong Zhang, Hui Zhang:
A Localization Approach for Non-localizable Wireless Sensor Network with Stationary Passive. 674-679

Jianshan Sun, Yajue Liu, Chunhua Sun, Chunli Liu:
The Impact of Personality on User-Generated Content in Online Social Networks. 680-685

Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Xinyi Zhang
, Binxing Fang:
Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction. 686-693

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







