default search action
8th DSC 2023: Hefei, China
- 8th International Conference on Data Science in Cyberspace, DSC 2023, Hefei, China, August 18-20, 2023. IEEE 2023, ISBN 979-8-3503-3103-5
- Songxuan Wei, Yushun Xie, Angxiao Zhao, Xiao Jing, Cui Luo, Zhaoquan Gu:
Fusing Security Alerts Improves Cyber-Security: An Alert Normalization Framework for Heterogeneous Devices. 1-7 - Xiaofang Zhou, Yezheng Liu:
Message from the General Chairs DSC 2023. 1 - Jingbing Chen, Yali Gao, Xiaoyong Li:
DACTI: a Generation-Based Data Augmentation Method for Cyber Threat Intelligence. 8-15 - Zengxie Ma, Ning Hu, Bo Qu, Yao Xin, Shengan Song, Xinyi Qiu:
Building a High-Performance Data Channel for the Federal Cyber Range. 16-23 - Guojin Sun, Chi Jiang, Jinqing Shen, Yin Zhang:
SCOBERT: A Pre-Trained BERT for Smart Contract Vulnerability Detection. 24-30 - Yuhang Wang, Salman Nazir:
Logic-Based Trust Model for Industrial Cyber Intelligence with Enhanced Trustworthiness. 31-37 - Dong Zhu, Haonan Tan, Le Wang, YuJie Feng, Yao Lin, Zhaoquan Gu:
Knowledge Graph Embedding via Adaptive Negative Subsampling. 38-43 - Yashen Wang, Qiang Li, Yi Zhang, Xuecheng Zhang, Zhuoya Ju, Jian Sun:
A Simplified Variant for Graph Convolutional Network Based Knowledge Graph Completion Model. 44-51 - Changqing Li, Ye Qian, Li Pan:
Multimodal Features Enhanced Named Entity Recognition Based on Self-Attention Mechanism. 52-59 - Angxiao Zhao, Yunhui Liu, Songxuan Wei, Yu Long, Wenying Feng, Zhaoquan Gu:
Research on the Prospect of Knowledge Graph Completion Based on the Federated Setting. 60-67 - Weiqi Hu, Ye Wang, Yan Jia:
Multi-Modal Knowledge Representation: A Survey. 68-75 - Liqun Sun, Yulu Qi, Shuqiang Yang, Weihong Han, Xiaoxia Li:
Analyzing Security Attacks Against Platoon of Intelligent and Connected Vehicles. 76-81 - Zihan Zhou, Weivi Hu, Yiran Tian, Lei Luo, Yun Li, Lirong Chen:
Particle Filter Localization Algorithm Based on LOS Possibility for Smart Vehicle Digital Key. 82-89 - Yipeng Lu, Denghui Zhang, Zhaoquan Gu, Jing Qiu:
Towards Scale-Aware Self-Supervised Multi-Frame Depth Estimation with IMU Motion Dynamics. 90-97 - Fanyao Meng, Jin Li, Jiaqi Gao, Junjie Liu, Junpeng Ru, Yueming Lu:
Blockchain Storage Method Based on Erasure Code. 98-105 - Min Zhang, Qing Ye, Kaihuan Deng:
Based on Linkable Ring Signature Map Review Scheme for Zero-Trust Autonomous Vehicles. 106-113 - Zhengjun Huang, Kaihan Lin, Yangyang Mei:
The Intelligent Information Search System IISI and Its Key Technologies for Internet Big Data. 114-119 - Yungcong Yang, Minghao Lai, Xiao Han:
CoReg: Membership Privacy Protection via Collaborative Regularization. 120-127 - Jiahao Liu, Chao Li, Ruoyu Wang, Junjian Li, Wuhao Xia:
A Blockchain-Based Secure Data Sharing Approach with Proxy Re-Encryption. 128-134 - Jiacheng Wei, Qingmei Wang, Zheng Wang:
Quantitative Dynamic Scalability Model and Analysis of Blockchain Database System. 135-142 - Haiyang Zhu, Xiaofeng Chen, Suyan Li, Yejin Wang, Xinwei Fang, Minfeng Zhu:
Data Governance: Status, Technologies, Applications and Development Trends. 143-150 - Xiaochen Liu, Hao Tan, Junjian Zhang, Aiping Li, Zhaoquan Gu:
Universal Adversarial Perturbation From Dominant Feature For Speaker Recognition. 151-158 - Xinchen Xia, Yuee Huang, Yiwen Zhang:
Multi-Task Learning for Game Review Classification with Emotion and Sarcasm Detection. 159-165 - Haonan Tan, Yunhui Liu, Le Wang, Jie Jiang, Jianyu Deng, Dong Zhu:
Anti-Breast Cancer Active Compound Screening Method Based on Simulated Annealing Algorithm and BP Neural Network. 166-171 - Xinru Huang, Jiapeng Zhao, Jinqiao Shi, Yanwei Sun, Xuebin Wang, Liyan Shen:
Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency Parsing. 172-180 - Yizu Yang, Yuzhang Lee, Zeyu He, Chunlu Wang:
Hierarchical Abstract Syntax Tree Representation Learning Based on Graph Coarsening for Program Classification. 181-188 - Shuai Xu, Xinyong Peng, Dandan Huang, Changsong Yang, Yong Ding, Hai Liang:
OBiLSTM-Based Intrusion Detection Method for Industrial Internet of Things. 189-196 - XiTing Ma, Tao Liu, Ning Hu, Xin Liu:
Bi-ETC: A Bidirectional Encrypted Traffic Classification Model Based on BERT and BiLSTM. 197-204 - Nurali Sarbakysh, Zheng Wang:
A1BERT: A Language-Agnostic Graph Neural Network Model for Vulnerability Detection. 205-212 - Zhuoer Lu, Xiaoyong Li, Pengfei Qiu:
An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion Detection. 213-220 - Peng Yang, Lijie Wang, Yun Li, Xuedong Song, Yaxin Wang, Guo Biheng:
CAKG: A Framework for Cybersecurity Threat Detection of Automotive via Knowledge Graph. 221-228 - Zhihong Liu, Qing Liao, Wenchao Gu, Cuiyun Gao:
Software Vulnerability Detection with GPT and In-Context Learning. 229-236 - Xiansen Chen, Kun Xiao, Lei Luo, Yun Li, Lirong Chen:
GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles Based on Generative Adversarial Networks. 237-244 - Haibo Ye, Lei Zhao, Leiting Tao, Xiaofeng Wang:
Network Security Evaluation for Space-Ground Integrated Networks Based on Network Simulation. 245-252 - Yunhui Liu, Angxiao Zhao, Lei Du, Chenhui Zhang, Hao Yan, Zhaoquan Gu:
OIDMD: A Novel Open-Set Intrusion Detection Method Based on Mahalanobis Distance. 253-260 - Jun-Zheng Yang, Lu-Lu Liang, Jia-Yin Qi:
A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-Insurance. 261-269 - Youming Zhang, Zhizheng Li, Lei Wang, Yan Lv, Yan Xiong, Liu Yang:
An Interpretable Data-Driven Approach for Employee Ability Assessment. 270-276 - Liu Yuan, Yashen Wang, Tianzhu Chen, Xuecheng Zhang, Chenyu Liu, Yi Zhang:
A Novel Concept-Driven Negative Sampling Mechanism for Enhancing Semanticity and Interpretability of Knowledge Graph Completion Task. 277-284 - Yaling Zheng, Ziwen Cheng, Yi Liu, Bowen Wang, Cheng Zhu:
Collaborative Learning for Cross-Organizational Data Sharing Using Hyperledger Fabric. 285-292 - JunFang Shi, Yong Yang, Mingyao Chen:
Improved Grey Wolf Optimization Algorithm Based on Arctangent Inertia Weight. 293-297 - Haojie Chen, Jiapeng Zhao, Jinqiao Shi, Xuebin Wang, Liyan Shen, Yanwei Sun:
Self-Disclosure Causality Detection: Discover What Cause the Self-Disclosure. 298-305 - Chao Li, Wuhao Xia, Zhengliang Jiang:
Weak Feature Defect Generation with GAN for Faster RCNN Based PCB Defect Detection. 306-312 - Qing Zhang, Jianshan Sun, Kun Yuan, Yuanchun Jiang:
An Image Emotion Classification Method Based on Supervised Contrastive Learning. 313-320 - Zhaoxuan Lv, Jiahao Qi, Jiaehen Zhang, Junmei Ding, Yueming Lu:
Cluster Analysis of Target Events Based on Multidimensional Network Traffic Characteristics. 321-328 - Xiaoling Zhu, Yashen Wang, Yi Zhang, Xuecheng Zhang:
Leveraging Concept-Driven Pre-Training Model for Shot-Text Conceptualization Task. 329-336 - Wenting Zhu, Zhe Liu, Zongyi Chen, Chuan Shi, Xi Zhang, Sanchuan Guo:
FedValidate: A Robust Federated Learning Framework Based on Client-Side Validation. 337-344 - Kun Xiao, Fuzhong Hao, Weijian Zhang, Nuannuan Li, Haiyan Zhi, Yintao Wang:
Research and Implementation of Bluetooth AOA Indoor Positioning System. 345-353 - Dong Liu, Yang Liu, Zhicheng Liu, Xiaofei Zhang, Xueying Zhang:
Analysis and Reflection on the Situation of Industrial Information Security Ransomware Attacks. 354-358 - Jiawei Luo, Tao Liu, Mengen Liang, Ning Hu:
A HMM-Based ICS Adaptive Deception Defense Framework. 359-366 - Weidong Shi, Mingrui Fan, Jiaqi Gao, Jiahao Qi, Daoqi Han, Yueming Lu:
Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace. 367-374 - Pengyu Zhang, Kun Xiao, Lei Luo, Yun Li, Lirong Chen:
Efficient Lightweight Intrusion Detection Method for IoT OS: A Study on the Application of Multi-Teacher Distillation. 375-382 - Zhuoran Chen, Hongyu Zhu, Chen Yi, Zhen Liu:
Research Ideas on Network Security Experiment and Appraisal of Avionics System. 383-390 - Wei Han, Yiliang Xia, Haoyu Xue, Mengxuan Sun, Jinliang Chen, Gong Cao, Gang Lin:
Research on Fault Diagnosis Model of Shearer Cutting Motor Based on Fuzzy Neural Network and Expert System. 391-396 - Ang Zeng, Xusen Cheng, Yajie Wang:
Exploring the Factors and Influence Mechanisms of User Loyalty for Generative AI. 397-400 - XiuLei Wang, Sisi Chen, Jianzhang Zhang, Xiuxiu Zhang, Chuang Liu:
Research on Recommendation Algorithms Based on Asymmetric Attention Mechanism Models. 401-408 - Jingzhu Lu, Feifan Song, Jingchen Wu, Xu Wu:
An Unsupervised Graph Embedding Method Based on Dynamic Graph Attention Networks and Infomax for Link Prediction. 409-415 - Yanan Du, Can Yang, Qi Li, Liping Zhi:
Assessing the Risk of Heavy Metal Mixture Exposure and its Association with Cancer Mortality. 416-421 - Lin Xu:
A Data Sharing and Access Control Model Based on Blockchain. 422-428 - Danna Lu, Qing Li, Zikang Liu, Shumei Li, Xiaobo Wu, Shudong Li:
A Review of User Identity Linkage Across Social Networks. 429-436 - Ning Su, Lijuan Sun, Yutong Gao, Jingchen Wu, Xu Wu:
Violence Detection In Videos via Motion-Guided Global and Local Views. 437-442 - Zhongbai Jiang, Yanwei Sun, Beibei Li, Bowen Sun, Shenduo Xiong, Yehao Li, Wenyue Du:
Threat-Aware Data Transmission in Software-Defined Networks. 443-449 - Tianjian Zhao, Zhikai Lu, Wenxuan Wu, Fang Xiong, Ruitian Yang, Huaxu Zhou, Boyang Zhang, Yifan Hu, Yue Jiang:
The Report of Standardization for Blockchain-Based Digital Right Management System. 450-455 - Hu Li, Qiongmin Ma, Ming Zhang, Xiaohui Kuang:
Machine Learning Security Analysis Framework Based on Threat Matrix. 456-460 - Jiahe Ji, Wei Kong, Jianwen Tian, Taotao Gu, Yuanping Nie, Xiaohui Kuang:
Survey on Fuzzing Techniques in Deep Learning Libraries. 461-467 - Chongyang Zhao, Hu Li, Dongxia Wang, Ruiqi Liu:
Adversarial Example Detection for Deep Neural Networks: A Review. 468-475 - Zhaowei Zhang, Wenjing Yu, Zibin Wang, Youlin Xiang:
A Blackbox Fuzzing Based on Automated State Machine Extraction. 476-482 - Yu Long, Xiayu Xiang, Xiao Jing, Angxiao Zhao, Lei Du, Zhaoquan Gu:
MDATA Model Based Cyber Security Knowledge Representation and Application. 483-490 - JunJun Chen, Chengliang Gao, Fei Tang, Jiaxu Xing, Qianlong Xiao, Dongyang Zheng, Jing Qiu:
Automatically Identifying Sentences with Attack Behavior from Cyber Threat Intelligence Reports. 491-498 - Wenhao Ye, Jun Xia, Shuo Feng, Xiangyu Zhong, Shuai Yuan, Zhitao Guan:
FixGPT: A Novel Three-Tier Deep Learning Model for Automated Program Repair. 499-505 - Shouyou Song, Pu Wang, Yangchun Li, Nanyang Wang, Wei Jiang:
Towards Accurate and Efficient Super Spreader Detection with Sketching. 506-511 - Lei Wang, Tong Li, Chao Yang, Yang Liu, Jian Chen, Zhongjie Wang:
A Intrusion Detection Method of Industrial Internet of Things Based on One-Dimensional Cropping Multi-Model. 512-519 - Bokai Li, Shenglong Wu, Yuke Yang, Geyao Zhang:
Analysis and Research of Neural Network Adversarial Samples for Power Grid Security. 520-525 - Shenglong Wu, Boyang Cui, Yaqi Zhang:
Application of Real-Time Big Data Technology in Complex Power Engineering Management. 526-532 - Ruoyu Wang, Junjian Li, Chao Li, Naqin Zhou, Jiahao Liu:
A Trust Usage Control Approach for Media Player Based on Intel SGX. 533-539 - Lijing Ren, Denghui Zhang, Qingduo Zeng, Zhaoquan Gu:
Toward the Secure Transmission of Large-Scale Images in Autonomous Driving. 540-545 - Shizhun Jia, Tian Zhang, Wenhui Lin, Mi Zhou, Xiaoxia Li:
An Evaluation Method of Vehicle-Road-Cloud Collaborative System Security Situation Based on (CD)2-A Elastic Computing Framework. 546-550 - Simiao Cui, Dinghua Wang, Xi Zhang, Ming Zhang, Sanchuan Guo:
Identifying Mobile Application Over Shadowsocks with Single-Direction Traffic. 551-558 - Jiaqi Nie, Jiangtao Hao, Songtao Peng, Xincheng Shu, Zhongyuan Ruan, Qi Xuan:
Empirical Study of the IPv4 and IPv6 Networks at the Autonomous System Level. 559-565 - Jiakai Xiao, Wei Du, Zhengxiang Xu, Yang Qian:
Cross-System Data Integration Based on Rule-Based NLP and Node2Vec. 566-570 - Lin Qiao, Ruiting Qu, Qing Song, Xuming Lyu, Lixia Wang, Jun Qi:
Graph Pattern Matching Based Intelligent Operation and Maintenance Method for Cloud Resource Operation. 571-578 - Ruiting Qu, Lin Qiao, Qing Song, Yuanqi Yu, Zhenjiang Lei, Ran Ran, Haomiao Wang, Tianbo Wang:
Service Resources Mining Based on Association Rules. 579-582 - Changchang Ma, Denghui Zhang, Junjian Zhang, Le Wang, Hao Li, Zhaoquan Gu:
Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis. 583-590 - Yueyue Shen, Feifan Song, Jingchen Wu, Xu Wu:
SSDAEE: Semi-Supervised Data-Augmented Event Extraction for Transfer Learning. 591-598 - Fanfeixue Meng, Jingchen Wu, Feifan Song, Xu Wu, Lan Hu:
EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature Mining. 599-606
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.