default search action
2nd DSC 2017: Shenzhen, China
- Second IEEE International Conference on Data Science in Cyberspace, DSC 2017, Shenzhen, China, June 26-29, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1600-0
Main Conference: International Conference on Data Science in Cyberspace
- Yue Miao, Changbing Tang, Jianfeng Lu, Xiang Li:
Zero-Determinant Strategy for Cooperation Enforcement in Crowdsourcing. 1-6 - Zhiguo Liu, Ni Zhang, Qiu Tang, Ningning Song, Zengming Yu, Hongbin Zhang:
Saving Energy on Processor Micro-Architecture Level for Big Data Stream Mobile Computing. 7-13 - Jiale Wang, Guohui Li:
A Multi-modal Hashing Learning Framework for Automatic Image Annotation. 14-21 - You Zhou, Liangmin Wang:
SDS2: Secure Data-Sharing Scheme for Crowd Owners in Public Cloud Service. 22-29 - Ruohan Cao, Yueming Lu:
On Study of Physical-Layer Attack Detection for Large Volumes of Data. 30-34 - Wenxing Lu, Xiao Wei:
Spatio-temporal Distribution Pattern of Cable Car Passenger Flow in Panholidays: A Case Study of Huangshan Scenic Area. 35-42 - Tinghai Pang, Lei Duan, Jesse Li-Ling, Guozhu Dong:
Mining Similarity-Aware Distinguishing Sequential Patterns from Biomedical Sequences. 43-52 - Xingyue Chen, Tao Shang, Ilryong Kim, Jianwei Liu:
A Remote Data Integrity Checking Scheme for Big Data Storage. 53-59 - Chunkai Zhang, Jianwei Guo, Junru Lu:
Research on Classification Method of High-Dimensional Class-Imbalanced Data Sets Based on SVM. 60-67 - Chunkai Zhang, Xudong Zhang, Panbo Tian:
An Approximate Approach to Frequent Itemset Mining. 68-73 - Jinlin Wang, Hongli Zhang, Binxing Fang, Xing Wang, Lin Ye:
A Survey on Data Cleaning Methods in Cyberspace. 74-81 - Chunkai Zhang, Guoquan Wang, Ying Zhou, Jiayao Jiang:
A New Approach for Imbalanced Data Classification Based on Minimize Loss Learning. 82-87 - Ye Wang, Yanchun Zhang, Bin Zhou, Yan Jia:
Semi-Supervised Collective Matrix Factorization for Topic Detection and Document Clustering. 88-97 - Chi Fei, Bin Liu, Nenghai Yu:
Extracting Sift Keypoints in DCT Domain. 98-101 - Pengpeng Zhou, Bin Wu, Zhen Cao:
EMMBTT: A Novel Event Evolution Model Based on TFxIEF and TDC in Tracking News Streams. 102-107 - Hao Ge, Jinchao Huang, Chong Di, Jianhua Li, Shenghong Li:
Learning Automata Based Approach for Influence Maximization Problem on Social Networks. 108-117 - Kan Zhang, Zichao Zhang, Kaigui Bian, Jin Xu, Jie Gao:
A Personalized Next-Song Recommendation System Using Community Detection and Markov Model. 118-123 - Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Qing Liao:
Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases. 124-132 - Jun Ren, Jinbo Xiong, Zhiqiang Yao, Rong Ma, Mingwei Lin:
DPLK-Means: A Novel Differential Privacy K-Means Mechanism. 133-139 - Fan Zhao, Jingning Chen, Dengpan Ye, Xiangyang Luo:
A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes. 140-144 - Huanhuan Hu, Xin Zuo, Weiming Zhang, Nenghai Yu:
Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion. 145-150 - Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu:
Predicting the Popularity of News Based on Competitive Matrix. 151-155 - Shudong Li, Zhou Yan, Xiaobo Wu, Aiping Li, Bin Zhou:
A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN. 156-161 - Ping Zhang, Honggang Hu, Xianjun Hu, Xiaolong Yang:
New Pseudorandom Number Generators from Block Ciphers. 162-171 - Runhe Li, Dong Zheng, Yinghui Zhang, Haonan Su, Menglei Yang, Pengzhen Lang:
Attribute-Based Encryption with Multi-keyword Search. 172-177 - Fawad Khan, Hui Li, Liangxuan Zhang, Jian Shen:
An Expressive Hidden Access Policy CP-ABE. 178-186 - Tao Feng, Ningning Liu:
A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption. 187-194 - Maoxu Lyu, Xuejun Li, Hui Li:
Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing. 195-204 - Yundong Fan, Xiaoping Wu, Jiasheng Wang:
Multi-authority Attribute-Based Encryption Access Control Scheme with Hidden Policy and Constant Length Ciphertext for Cloud Storage. 205-212 - Liehuang Zhu, Cong Guo, Zijian Zhang, Wei Fu, Rixin Xu:
A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive Security. 213-222 - Yaqian Kang, Zhenhua Liu:
A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query. 223-231 - Fenghua Li, Fangxin Xiong, Chao Li, Lihua Yin, Guozhen Shi, Boxiu Tian:
SRAM: A State-Aware Risk Assessment Model for Intrusion Response. 232-237 - Hua Zhang, Fang Lou, Yunsheng Fu, Zhihong Tian:
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS. 238-241 - Huaijun Shang, Rong Jiang, Aiping Li, Wei Wang:
A Framework to Construct Knowledge Base for Cyber Security. 242-248 - Jiajia Zhang, Hong Liu:
Building Endgame Data set to Improve Opponent Modeling Approach. 255-260 - Fenghua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo:
Cyberspace-Oriented Access Control: Model and Policies. 261-266 - Zhikun Chen, Weizhong Qiang:
ISLUS: An Immediate and Safe Live Update System for C Program. 267-274 - Jie Yin, Xiang Cui, Ke Li:
A Reputation-Based Resilient and Recoverable P2P Botnet. 275-282 - Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
Mining Users' Important Locations and Semantics on Cellular Network Data. 283-291 - Weidong Lin, Chi Zhang:
ITM-LB: An Improved Traffic Matrix-Based Load Balancing Routing Algorithm. 298-303 - Dongfang Li, Zhaoguo Wang, Lixin Li, Zhihua Wang, Yucheng Wang, Yibo Xue:
FgDetector: Fine-Grained Android Malware Detection. 311-318 - Hao Zhou, Wei Zhang, Fengqiong Wei, Yunfang Chen:
Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph. 319-327 - Weigang Zhu, Meng Li, Chuangzhan Zeng:
Research on Online Learning of Radar Emitter Recognition Based on Hull Vector. 328-332 - Kai Fan, Qi Luo, Hui Li, Yintang Yang:
Cloud-Based Lightweight RFID Mutual Authentication Protocol. 333-338
Session W1: International Workshop on Data Visualization
- Huaquan Hu, Lingda Wu, Ronghuan Yu:
Interactive Network Clustering Layout Method Based on Implicit Connection. 339-342 - Zhongwen Zhao, Huanghuang Guo:
Visualization Study of High-Dimensional Data Classification Based on PCA-SVM. 346-349 - Jiang Zhu, Lingda Wu, Hongxing Hao, Xiaorui Song, Yi Lu:
Auto-Encoder Based for High Spectral Dimensional Data Classification and Visualization. 350-354 - Chengxiang Liu, Wei Xiong:
Research on the Space-Based Integrated Information Network Evolution Model Visualization Methods Based on the Super Network Theory. 355-358 - Ronghuan Yu, Wei Xie, Lingda Wu, Hongxing Hao:
Research on Multi-resolution Isosurface Extraction Method for 3D Scalar Field. 359-362 - Yingmei Wei, Xiaolei Du:
Two-Layer Network Visualization for Comprehensive Analysis. 363-367 - Xitao Zhang, Lingda Wu, Huaquan Hu, Shaobo Yu:
Tasks for Visual Analytics in Multilayer Networks. 368-371 - Yuxiang Xie, Xidao Luan, Jingmeng He, Lili Zhang, Xin Zhang, Chen Li:
A Movie Summary Generation System. 372-375
Session W2: International Workshop on Multi-view Network Fusion and Analysis
- Jiawei Shi, Xi Zhang:
Temporal Multi-task Model Framework Using Multi-source Data for Bonds Credit Assessment. 376-381 - Lili Zhou, Jinna Lv, Bin Wu:
Social Network Construction of the Role Relation in Unstructured Data Based on Multi-view. 382-388 - Chunzi Wu, Bai Wang:
Extracting Topics Based on Word2Vec and Improved Jaccard Similarity Coefficient. 389-397 - Chengsen Ru, Shasha Li, Jintao Tang, Yi Gao, Ting Wang:
Open Relation Extraction Based on Core Dependency Phrase Clustering. 398-404 - Xiaoyang Wu, Bin Wu:
The CRFs-Based Chinese Open Entity Relation Extraction. 405-411
Session W3: International Workshop on Data Security and Privacy in Internet of Things
- Jiantao Wang:
An Arithmetic View on Generating Necklaces. 412-416 - Xin-long Song, Chung-Huang Yang:
Mobile Device Management System Based on AOSP and SELinux. 417-420 - Yu Shi, Dong Zheng, Chung-Huang Yang:
The Efficient Implementation of the Android Kernel with China Standard Cryptographic Algorithm. 421-425 - Chan Gao, Chung-Huang Yang:
File-Based Encryption with SM4. 426-430 - Lijuan Guo, Xuelian Li, Xiaolin Lv, Juntao Gao:
Anonymous Fair Exchange Protocol with a Semitrusted Third Party. 431-440 - Yaqing Fan, Zhenhua Liu:
Verifiable Attribute-Based Multi-keyword Search over Encrypted Cloud Data in Multi-owner Setting. 441-449 - Bowei Liu, Ruizhang Huang, Ting Huang, Yingying Yan:
MSDB: A Massive Sensor Data Processing Middleware for HBase. 450-456
Session W4: International Workshop on Privacy for Big Data
- Ping Zhang, Honggang Hu:
Permutation-Based Tweakable On-line Cipher with Improved Security Guarantees. 457-466 - Chunkai Zhang, Haodong Liu, Ye Li:
Time Series Discord Discovery Under Multi-party Privacy Preserving. 467-474 - Liangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan:
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures. 475-482 - Yunfei Ci, Guozhen Shi, Feng Yang, Jiawen Diao, Cuijie Liu, Weihua Mao:
Design and Implementation of the Components of the Symmetric Cryptographic Algorithm. 483-487 - Weihao Li, Ben Niu, Hui Li:
Privacy Preservation Strategy in Time-Sensitive LBSs. 488-493 - Cuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma:
Improving Database Storage Usability with the Cloud-Based Architecture. 494-499
Session W5: International Workshop on Data Science and Web Analytics
- Jiajun Peng, Zheng Huang, Jie Cheng:
A Deep Recurrent Network for Web Server Performance Prediction. 500-504 - Yunlu Xu, Jie Guo, Zheng Huang:
Joint Dictionary Learning for Person Re-identification. 505-510 - Yixiang Zhu, Kang Zhang:
Review of iOS Malware Analysis. 511-515 - Weijie Li, Guohong Liao, Yamin Wen, Zheng Gong:
SpongeMPH: A New Multivariate Polynomial Hash Function based on the Sponge Construction. 516-520 - Yan Zhang, Chong Di, Zhuoran Han, Yichen Li, Shenghong Li:
An Adaptive Honeypot Deployment Algorithm Based on Learning Automata. 521-527 - Qian Liu, Jingsi Ni, Jing Huang, Xiaochuan Shi:
Big Data for Social Media Evaluation: A Case of Wechat Platform Rankings in China. 528-533
Session W6: International Workshop on Cyber-Physical Systems Security & Privacy Workshop
- Ting Wang, Qi Su, Tieming Chen:
Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata. 534-540 - Yonggui Fu, Jianming Zhu, Sheng Gao:
CPS Information Security Risk Evaluation System Based on Petri Net. 541-548 - Qing Li, Ayong Ye, Li Xu:
A Defense Mechanism Against Location Cheating Attack in Social Network. 549-553 - Chao Yuan, Yueming Lu, Jiefu Gan:
Evaluating Network Equipment Information Security Based on D-S Evidence Theory and Principal Components Analysis. 554-560 - Huang Neng:
Construction of High-Availability Bank System in Virtualized Environments. 561-568 - Sheng Zhang, Hui Wang, Xin Zhang, Jiajun Cheng, Pei Li, Zhaoyun Ding:
Embedding-Based Feature Extraction Methods for Chinese Sentiment Classification. 569-577 - Ce Yang, Weiming Zhang, Nenghai Yu:
Range Queries on Two Column Data. 578-584
Session W7: International Workshop on Big Data Cybersecurity Analytics
- Eric Golinko, Thomas Sonderman, Xingquan Zhu:
CNFL: Categorical to Numerical Feature Learning for Clustering and Classification. 585-594 - Dongqing Wang, Yueming Lu, Jiefu Gan:
An Information Security Evaluation Method Based on Entropy Theory and Improved TOPSIS. 595-600 - Yang Sun, Wei Xiong:
Analysis of Network Attack and Defense Game with the Average Recovery Time as the Quantitative Indicators of the Payment Function. 601-605 - Jianwei Ma, Xiaojun Chen, Rui Xu, Jinqiao Shi:
Implementation and Evaluation of Different Parallel Designs of AES Using CUDA. 606-614 - Junfeng Tu, Yucong Duan:
Detecting Congestion and Detour of Taxi Trip via GPS Data. 615-618 - Qisi Liu, Liudong Xing, Chaonan Wang:
Framework of Probabilistic Risk Assessment for Security and Reliability. 619-624 - Zihan Liu, Wei Lu:
Fast Copy-Move Detection of Digital Audio. 625-629
Session W8: International Workshop on Big Data and Business Analytics
- Rongchao Yin, Peng Li, Bin Wang:
Sentiment Lexical-Augmented Convolutional Neural Networks for Sentiment Analysis. 630-635 - Mengying Yuan, Xiangzhou Chen, Yang Wang, Huixia Ding:
A Trusted Power System Network in Electrical Industry. 636-643 - Xin Ni, Yinghui Sai, Anning Wang, Qiang Zhang:
Intelligent Discovery of Notable Product Features by Mining Large Scale Online Reviews. 644-649 - Xuan Zhang, Liang Zuo:
The Influence of Internal Control on Executive Pay-Performance Sensitivity: Based on the Background of the Reform of State-Owned Enterprise in China. 650-654 - Liang Liu, Bin Chen, Bo Qu, Lingnan He, Xiaogang Qiu:
Data Driven Modeling of Continuous Time Information Diffusion in Social Networks. 655-660 - Hui Yan, Junfeng Wang, Chensen Xia:
Research and Application of the Test Data Visualization. 661-665
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.