


default search action
2nd DSC 2017: Shenzhen, China
- Second IEEE International Conference on Data Science in Cyberspace, DSC 2017, Shenzhen, China, June 26-29, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1600-0

Main Conference: International Conference on Data Science in Cyberspace
- Yue Miao, Changbing Tang, Jianfeng Lu, Xiang Li

:
Zero-Determinant Strategy for Cooperation Enforcement in Crowdsourcing. 1-6 - Zhiguo Liu, Ni Zhang, Qiu Tang, Ningning Song, Zengming Yu, Hongbin Zhang:

Saving Energy on Processor Micro-Architecture Level for Big Data Stream Mobile Computing. 7-13 - Jiale Wang, Guohui Li:

A Multi-modal Hashing Learning Framework for Automatic Image Annotation. 14-21 - You Zhou, Liangmin Wang:

SDS2: Secure Data-Sharing Scheme for Crowd Owners in Public Cloud Service. 22-29 - Ruohan Cao, Yueming Lu:

On Study of Physical-Layer Attack Detection for Large Volumes of Data. 30-34 - Wenxing Lu, Xiao Wei:

Spatio-temporal Distribution Pattern of Cable Car Passenger Flow in Panholidays: A Case Study of Huangshan Scenic Area. 35-42 - Tinghai Pang, Lei Duan, Jesse Li-Ling, Guozhu Dong:

Mining Similarity-Aware Distinguishing Sequential Patterns from Biomedical Sequences. 43-52 - Xingyue Chen, Tao Shang, Ilryong Kim, Jianwei Liu

:
A Remote Data Integrity Checking Scheme for Big Data Storage. 53-59 - Chunkai Zhang, Jianwei Guo, Junru Lu:

Research on Classification Method of High-Dimensional Class-Imbalanced Data Sets Based on SVM. 60-67 - Chunkai Zhang, Xudong Zhang, Panbo Tian:

An Approximate Approach to Frequent Itemset Mining. 68-73 - Jinlin Wang

, Hongli Zhang, Binxing Fang, Xing Wang, Lin Ye:
A Survey on Data Cleaning Methods in Cyberspace. 74-81 - Chunkai Zhang, Guoquan Wang, Ying Zhou, Jiayao Jiang:

A New Approach for Imbalanced Data Classification Based on Minimize Loss Learning. 82-87 - Ye Wang, Yanchun Zhang, Bin Zhou, Yan Jia:

Semi-Supervised Collective Matrix Factorization for Topic Detection and Document Clustering. 88-97 - Chi Fei, Bin Liu, Nenghai Yu:

Extracting Sift Keypoints in DCT Domain. 98-101 - Pengpeng Zhou, Bin Wu, Zhen Cao:

EMMBTT: A Novel Event Evolution Model Based on TFxIEF and TDC in Tracking News Streams. 102-107 - Hao Ge, Jinchao Huang, Chong Di, Jianhua Li, Shenghong Li:

Learning Automata Based Approach for Influence Maximization Problem on Social Networks. 108-117 - Kan Zhang, Zichao Zhang

, Kaigui Bian, Jin Xu, Jie Gao:
A Personalized Next-Song Recommendation System Using Community Detection and Markov Model. 118-123 - Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Qing Liao:

Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases. 124-132 - Jun Ren

, Jinbo Xiong, Zhiqiang Yao, Rong Ma
, Mingwei Lin
:
DPLK-Means: A Novel Differential Privacy K-Means Mechanism. 133-139 - Fan Zhao, Jingning Chen, Dengpan Ye, Xiangyang Luo:

A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes. 140-144 - Huanhuan Hu, Xin Zuo, Weiming Zhang, Nenghai Yu:

Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion. 145-150 - Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu:

Predicting the Popularity of News Based on Competitive Matrix. 151-155 - Shudong Li, Zhou Yan, Xiaobo Wu, Aiping Li, Bin Zhou:

A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN. 156-161 - Ping Zhang, Honggang Hu, Xianjun Hu

, Xiaolong Yang:
New Pseudorandom Number Generators from Block Ciphers. 162-171 - Runhe Li, Dong Zheng, Yinghui Zhang, Haonan Su, Menglei Yang, Pengzhen Lang:

Attribute-Based Encryption with Multi-keyword Search. 172-177 - Fawad Khan

, Hui Li, Liangxuan Zhang, Jian Shen
:
An Expressive Hidden Access Policy CP-ABE. 178-186 - Tao Feng, Ningning Liu:

A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption. 187-194 - Maoxu Lyu, Xuejun Li, Hui Li:

Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing. 195-204 - Yundong Fan, Xiaoping Wu, Jiasheng Wang:

Multi-authority Attribute-Based Encryption Access Control Scheme with Hidden Policy and Constant Length Ciphertext for Cloud Storage. 205-212 - Liehuang Zhu, Cong Guo, Zijian Zhang, Wei Fu, Rixin Xu:

A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive Security. 213-222 - Yaqian Kang, Zhenhua Liu:

A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query. 223-231 - Fenghua Li, Fangxin Xiong, Chao Li, Lihua Yin, Guozhen Shi, Boxiu Tian:

SRAM: A State-Aware Risk Assessment Model for Intrusion Response. 232-237 - Hua Zhang, Fang Lou, Yunsheng Fu, Zhihong Tian:

A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS. 238-241 - Huaijun Shang, Rong Jiang, Aiping Li, Wei Wang:

A Framework to Construct Knowledge Base for Cyber Security. 242-248 - Jiajia Zhang, Hong Liu:

Building Endgame Data set to Improve Opponent Modeling Approach. 255-260 - Fenghua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo:

Cyberspace-Oriented Access Control: Model and Policies. 261-266 - Zhikun Chen, Weizhong Qiang:

ISLUS: An Immediate and Safe Live Update System for C Program. 267-274 - Jie Yin, Xiang Cui, Ke Li:

A Reputation-Based Resilient and Recoverable P2P Botnet. 275-282 - Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:

Mining Users' Important Locations and Semantics on Cellular Network Data. 283-291 - Weidong Lin, Chi Zhang:

ITM-LB: An Improved Traffic Matrix-Based Load Balancing Routing Algorithm. 298-303 - Dongfang Li, Zhaoguo Wang, Lixin Li, Zhihua Wang, Yucheng Wang, Yibo Xue:

FgDetector: Fine-Grained Android Malware Detection. 311-318 - Hao Zhou

, Wei Zhang, Fengqiong Wei, Yunfang Chen:
Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph. 319-327 - Weigang Zhu, Meng Li, Chuangzhan Zeng:

Research on Online Learning of Radar Emitter Recognition Based on Hull Vector. 328-332 - Kai Fan, Qi Luo, Hui Li, Yintang Yang:

Cloud-Based Lightweight RFID Mutual Authentication Protocol. 333-338
Session W1: International Workshop on Data Visualization
- Huaquan Hu, Lingda Wu, Ronghuan Yu:

Interactive Network Clustering Layout Method Based on Implicit Connection. 339-342 - Zhongwen Zhao, Huanghuang Guo:

Visualization Study of High-Dimensional Data Classification Based on PCA-SVM. 346-349 - Jiang Zhu, Lingda Wu, Hongxing Hao, Xiaorui Song, Yi Lu:

Auto-Encoder Based for High Spectral Dimensional Data Classification and Visualization. 350-354 - Chengxiang Liu, Wei Xiong:

Research on the Space-Based Integrated Information Network Evolution Model Visualization Methods Based on the Super Network Theory. 355-358 - Ronghuan Yu, Wei Xie, Lingda Wu, Hongxing Hao:

Research on Multi-resolution Isosurface Extraction Method for 3D Scalar Field. 359-362 - Yingmei Wei, Xiaolei Du:

Two-Layer Network Visualization for Comprehensive Analysis. 363-367 - Xitao Zhang, Lingda Wu, Huaquan Hu, Shaobo Yu:

Tasks for Visual Analytics in Multilayer Networks. 368-371 - Yuxiang Xie, Xidao Luan, Jingmeng He, Lili Zhang, Xin Zhang, Chen Li:

A Movie Summary Generation System. 372-375
Session W2: International Workshop on Multi-view Network Fusion and Analysis
- Jiawei Shi, Xi Zhang:

Temporal Multi-task Model Framework Using Multi-source Data for Bonds Credit Assessment. 376-381 - Lili Zhou, Jinna Lv, Bin Wu:

Social Network Construction of the Role Relation in Unstructured Data Based on Multi-view. 382-388 - Chunzi Wu, Bai Wang:

Extracting Topics Based on Word2Vec and Improved Jaccard Similarity Coefficient. 389-397 - Chengsen Ru, Shasha Li, Jintao Tang, Yi Gao, Ting Wang:

Open Relation Extraction Based on Core Dependency Phrase Clustering. 398-404 - Xiaoyang Wu, Bin Wu:

The CRFs-Based Chinese Open Entity Relation Extraction. 405-411
Session W3: International Workshop on Data Security and Privacy in Internet of Things
- Jiantao Wang:

An Arithmetic View on Generating Necklaces. 412-416 - Xin-long Song, Chung-Huang Yang:

Mobile Device Management System Based on AOSP and SELinux. 417-420 - Yu Shi, Dong Zheng, Chung-Huang Yang:

The Efficient Implementation of the Android Kernel with China Standard Cryptographic Algorithm. 421-425 - Chan Gao, Chung-Huang Yang:

File-Based Encryption with SM4. 426-430 - Lijuan Guo, Xuelian Li, Xiaolin Lv, Juntao Gao:

Anonymous Fair Exchange Protocol with a Semitrusted Third Party. 431-440 - Yaqing Fan, Zhenhua Liu:

Verifiable Attribute-Based Multi-keyword Search over Encrypted Cloud Data in Multi-owner Setting. 441-449 - Bowei Liu, Ruizhang Huang, Ting Huang, Yingying Yan:

MSDB: A Massive Sensor Data Processing Middleware for HBase. 450-456
Session W4: International Workshop on Privacy for Big Data
- Ping Zhang, Honggang Hu:

Permutation-Based Tweakable On-line Cipher with Improved Security Guarantees. 457-466 - Chunkai Zhang, Haodong Liu, Ye Li:

Time Series Discord Discovery Under Multi-party Privacy Preserving. 467-474 - Liangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan

:
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures. 475-482 - Yunfei Ci, Guozhen Shi, Feng Yang, Jiawen Diao, Cuijie Liu, Weihua Mao:

Design and Implementation of the Components of the Symmetric Cryptographic Algorithm. 483-487 - Weihao Li, Ben Niu, Hui Li:

Privacy Preservation Strategy in Time-Sensitive LBSs. 488-493 - Cuicui Su, Yongzhi Wang, Yulong Shen, Ke Cheng, Jiawen Ma:

Improving Database Storage Usability with the Cloud-Based Architecture. 494-499
Session W5: International Workshop on Data Science and Web Analytics
- Jiajun Peng, Zheng Huang, Jie Cheng:

A Deep Recurrent Network for Web Server Performance Prediction. 500-504 - Yunlu Xu, Jie Guo, Zheng Huang:

Joint Dictionary Learning for Person Re-identification. 505-510 - Yixiang Zhu, Kang Zhang:

Review of iOS Malware Analysis. 511-515 - Weijie Li, Guohong Liao, Yamin Wen, Zheng Gong:

SpongeMPH: A New Multivariate Polynomial Hash Function based on the Sponge Construction. 516-520 - Yan Zhang, Chong Di, Zhuoran Han, Yichen Li, Shenghong Li:

An Adaptive Honeypot Deployment Algorithm Based on Learning Automata. 521-527 - Qian Liu

, Jingsi Ni, Jing Huang, Xiaochuan Shi:
Big Data for Social Media Evaluation: A Case of Wechat Platform Rankings in China. 528-533
Session W6: International Workshop on Cyber-Physical Systems Security & Privacy Workshop
- Ting Wang, Qi Su, Tieming Chen

:
Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata. 534-540 - Yonggui Fu, Jianming Zhu, Sheng Gao

:
CPS Information Security Risk Evaluation System Based on Petri Net. 541-548 - Qing Li, Ayong Ye, Li Xu:

A Defense Mechanism Against Location Cheating Attack in Social Network. 549-553 - Chao Yuan, Yueming Lu, Jiefu Gan:

Evaluating Network Equipment Information Security Based on D-S Evidence Theory and Principal Components Analysis. 554-560 - Huang Neng:

Construction of High-Availability Bank System in Virtualized Environments. 561-568 - Sheng Zhang, Hui Wang, Xin Zhang, Jiajun Cheng, Pei Li, Zhaoyun Ding:

Embedding-Based Feature Extraction Methods for Chinese Sentiment Classification. 569-577 - Ce Yang, Weiming Zhang, Nenghai Yu:

Range Queries on Two Column Data. 578-584
Session W7: International Workshop on Big Data Cybersecurity Analytics
- Eric Golinko, Thomas Sonderman, Xingquan Zhu

:
CNFL: Categorical to Numerical Feature Learning for Clustering and Classification. 585-594 - Dongqing Wang, Yueming Lu, Jiefu Gan:

An Information Security Evaluation Method Based on Entropy Theory and Improved TOPSIS. 595-600 - Yang Sun, Wei Xiong:

Analysis of Network Attack and Defense Game with the Average Recovery Time as the Quantitative Indicators of the Payment Function. 601-605 - Jianwei Ma, Xiaojun Chen, Rui Xu, Jinqiao Shi:

Implementation and Evaluation of Different Parallel Designs of AES Using CUDA. 606-614 - Junfeng Tu, Yucong Duan:

Detecting Congestion and Detour of Taxi Trip via GPS Data. 615-618 - Qisi Liu, Liudong Xing, Chaonan Wang:

Framework of Probabilistic Risk Assessment for Security and Reliability. 619-624 - Zihan Liu, Wei Lu:

Fast Copy-Move Detection of Digital Audio. 625-629
Session W8: International Workshop on Big Data and Business Analytics
- Rongchao Yin, Peng Li, Bin Wang:

Sentiment Lexical-Augmented Convolutional Neural Networks for Sentiment Analysis. 630-635 - Mengying Yuan, Xiangzhou Chen, Yang Wang, Huixia Ding:

A Trusted Power System Network in Electrical Industry. 636-643 - Xin Ni, Yinghui Sai, Anning Wang, Qiang Zhang:

Intelligent Discovery of Notable Product Features by Mining Large Scale Online Reviews. 644-649 - Xuan Zhang, Liang Zuo:

The Influence of Internal Control on Executive Pay-Performance Sensitivity: Based on the Background of the Reform of State-Owned Enterprise in China. 650-654 - Liang Liu, Bin Chen, Bo Qu, Lingnan He, Xiaogang Qiu:

Data Driven Modeling of Continuous Time Information Diffusion in Social Networks. 655-660 - Hui Yan, Junfeng Wang, Chensen Xia:

Research and Application of the Test Data Visualization. 661-665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














