


default search action
5th DSC 2020: Hong Kong
- 5th IEEE International Conference on Data Science in Cyberspace, DSC 2020, Hong Kong, July 27-30, 2020. IEEE 2020, ISBN 978-1-7281-9558-2

- Qing Li, M. Tamer Özsu

, Hui Xiong:
Message from the General Chairs of DSC 2020. 1 - Yiting Qian, Li Pan, Peng Wu

, Zhengmin Xia:
GeST: A Grid Embedding based Spatio-Temporal Correlation Model for Crime Prediction. 1-7 - Qingguang Liu, Jielong Wei, Sining Lei, Qingbao Huang, Mengqiao Zhang, Xiongbin Zhou:

Temperature Prediction Modeling and Control Parameter optimization Based on Data Driven. 8-14 - Changmeng Zheng

, Qi Peng, Xuemiao Xu:
Heterogenous Multi-Source Fusion for Ship Trajectory Complement and Prediction with Sequence Modeling. 15-21 - Yuanyu Yang, Bin Wu, Kai Zhao

, Wenying Guo:
Tweet Stance Detection: A Two-stage DC-BILSTM Model Based on Semantic Attention. 22-29 - Zhanming Guan, Bin Wu, Bai Wang, Hezi Liu:

Personality2vec: Network Representation Learning for Personality. 30-37 - Xiangyi Kong, Zhaoquan Gu, Lihua Yin

:
A Unified Information Diffusion Model for Social Networks. 38-44 - Yang Zhao, Hongzhi Ye, Lingzi Li, Cheng Huang, Tao Zhang:

Detecting DNS Tunnels Using Session Behavior and Random Forest Method. 45-52 - Yunyi Zhang, Yuelong Wu, Shuyuan Jin:

Which DGA Family does A Malicious Domain Name Belong To. 53-60 - Yulu Qi, Rong Jiang, Yan Jia, Aiping Li:

An APT Attack Analysis Framework Based on Self-define Rules and Mapreduce. 61-66 - Kai Xing, Aiping Li, Rong Jiang, Yan Jia:

A Review of APT Attack Detection Methods and Defense Strategies. 67-70 - Shanqing Yu, Jun Zheng, Jinyin Chen, Qi Xuan, Qingpeng Zhang:

Unsupervised Euclidean Distance Attack on Network Embedding. 71-77 - Shihui Ma, Shilin Wang, Xiang Lin:

A Transformer-based Model for Sentence-Level Chinese Mandarin Lipreading. 78-81 - Changhai Wang, Aiping Li, Hongkui Tu, Ye Wang, Chenchen Li, Xiaojuan Zhao:

An Advanced BERT-Based Decomposition Method for Joint Extraction of Entities and Relations. 82-88 - Liqun Gao, Bin Zhou, Yan Jia, Hongkui Tu, Ye Wang, Chenguang Chen, Haiyang Wang, Hongwu Zhuang:

Deep Learning for Social Network Information Cascade Analysis: a survey. 89-97 - Wenyu Huang, Guohua Wang, Huakui Zhang, Feng Chen:

Incorporating Entity Type Information into Knowledge Representation Learning. 98-104 - Zuowei Zhang, Yan Tang:

Context-aware Event Type Identification Based on Context Fusion and Joint Learning. 105-112 - Zhongbai Jiang, Yanwei Sun, Lei Shi, Weihua Hu, Zhaohui Liu:

Secure Data Dissemination among Multiple Base Stations in High-Speed Railway Network. 113-119 - Peiru Fan, Chonghua Wang, Jun Li, Bo Zhao, Zhaoxu Ji:

StateConsisIV: A Privacy-preserving Integrity Verification Method for Cloud Components Based on a Novel State Consistency Feature. 120-126 - Peiyi Han, Chaozheng Wang, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Pengshuai Luo:

SecureMLDebugger: A Privacy-Preserving Machine Learning Debugging Tool. 127-134 - Yang Liu, Jie Jiang

, Jiahao Sun, Liang Bai, Qi Wang:
A Survey of Depth Estimation Based on Computer Vision. 135-141 - Yingzi Ou, Xin Li, Zhenyu Guo, Yizhuo Wang:

Anobeat: Anomaly Detection for Electrocardiography Beat Signals. 142-149 - Xiongbo Huang, Yongjian Hu, Yufei Wang, Beibei Liu, Shuowei Liu

:
Deep Learning-based Quantitative Steganalysis to Detect Motion Vector Embedding of HEVC Videos. 150-155 - Ying Yang, Bin Wu, Lianwei Li, Shuyang Wang:

A Joint Model for Aspect-Category Sentiment Analysis with TextGCN and Bi-GRU. 156-163 - Haoliang Zhang, Hongbo Xu, Jinqiao Shi, Tingwen Liu

, Chun Liao:
Word Level Domain-Diversity Attention Based LSTM Model for Sentiment Classification. 164-170 - Zhou Wang, Jing Cao:

Multi-Task Learning Network for Document-level and Multi-aspect Sentiment Classification. 171-177 - Bingxu Piao, Xu Wu, Jingchen Wu, Xiaqing Xie:

Real-time Event Detection and Tracking in Microblog via Text Chain and Sentiment time series. 178-185 - Qian Ji, Xiang Lin, Yinghua Ma, Gongshen Liu, Shilin Wang:

A Unified Labeling Model for Open-Domain Aspect-Based Sentiment Analysis. 186-189 - Yongming Liang, Tian Tian, Kaifu Jin, Xiaoyu Yang, Yuefei Lv, Xi Zhang:

Robust Text Clustering with Graph and Textual Adversarial Learning. 190-197 - Yibing Guo, Yutao Huang, Ye Ding, Shuhan Qi, Xuan Wang, Qing Liao:

GPU-BTM: A Topic Model for Short Text using Auxiliary Information. 198-205 - Mohammad Al Boni, Trishala Neeraj:

Longitudinal Analysis of Cyber-Related Articles. 206-213 - Xiang Wang, Yunfan Liao, Junxing Zhu, Bin Zhou, Yan Jia:

A Low-Dimensional Representation Learning Method for Text Classification and Clustering. 214-217 - Ze Hu, Jielong Wei, Qingbao Huang, Hanyu Liang, Xingmao Zhang, Qingguang Liu:

Graph Convolutional Network for Visual Question Answering Based on Fine-grained Question Representation. 218-224 - Hailiang Chen, Bin Chen, Chuan Ai, Mengna Zhu

, Kaisheng Lai, Lingnan He:
Research on Rumor Propagation Simulation Based on Behavior-Attribute. 225-231 - Xinwen Wang, Xin Li, Linjing Lai:

On Improving the Learning of Long-Term historical Information for Tasks with Partial Observability. 232-237 - Yushun Xie, Zhaoquan Gu, Bin Zhu

, Le Wang, Weihong Han, Lihua Yin
:
Adversarial Examples for Chinese Text Classification. 238-245 - Jia Guo, Bin Wu, Pengpeng Zhou:

BLHNN: A Novel Charge Prediction Model Based on Bi-Attention LSTM-CNN Hybrid Neural Network. 246-252 - Tianpeng Ye, Yinghua Ma, Xiang Lin, Jianhua Li:

A Token Level Multi-target Stance Detection Dataset. 253-256 - Kui Zhu, Bin Wu, Bai Wang:

Deepfake Detection with Clustering-based Embedding Regularization. 257-264 - Tianyu Xing, Bin Wu, Bai Wang:

An Efficient Parallel Stochastic Gradient Descent for Matrix Factorization On GPUS. 265-270 - Yanjie He, Wei Li:

Image-based Encrypted Traffic Classification with Convolution Neural Networks. 271-278 - Zhengqiao Wang

, Yufan Zeng, Yue Yuan, Yibo Guo:
Refining Co-operative Competition of Robocup Soccer with Reinforcement Learning. 279-283 - Yu Han, Yifei Li

, Qingshun Wu, Ji Wan, Yafei Li:
Join-based Social Ridesharing. 284-289 - Guobao Zhang:

A data traceability method to improve data quality in a big data environment. 290-294 - Huchen Zhou, Mohan Li, Zhaoquan Gu:

Knowledge Fusion and Spatiotemporal Data Cleaning: A Review. 295-301 - Yunyi Tang, Wang Le, Xiaolong Chen, Zhaoquan Gu, Lihua Yin

, Xin Yi:
Automatic Classification of Matching Rules in Pattern Matching. 302-306 - Ziheng Cheng, Xu Wu, Xiaqing Xie, Jingchen Wu:

Chinese Open Relation Extraction with Pointer-Generator Networks. 307-311 - Chenchen Li, Aiping Li, Ye Wang, Hongkui Tu, Yichen Song:

A Survey on Approaches and Applications of Knowledge Representation Learning. 312-319 - Haiyang Wang, Bin Zhou, Zhipin Gu

, Yan Jia:
Contextual Gated Graph Convolutional Networks for Social Unrest Events Prediction. 320-325 - Chenchen Li, Aiping Li, Hongkui Tu, Ye Wang, Changhai Wang:

A Knowledge Graph Embedding Method Based on Neural Network. 326-332 - Xiaolong Chen, Le Wang, Yunyi Tang, Weihong Han, Zhaoquan Gu:

Seeds Optimization for Entity Alignment in Knowledge Graph Embedding. 333-338 - Xingyu Lv, Ye Zhong, Qingfeng Tan:

A Study of Bitcoin De-Anonymization: Graph and Multidimensional Data Analysis. 339-345 - Wenying Guo, Bin Wu, Bai Wang, Yuanyu Yang:

Two-stage encoding Extractive Summarization. 346-350 - Fengcai Qiao, Yuanfa Zhang, Jinsheng Deng, Zhaoyun Ding, Aiping Li:

A Parallel Algorithm for Graph Transaction Based Frequent Subgraph Mining. 351-355 - Jiangwen Wang, Zhijie Ban:

Sampling Topic Representative Users by Integrating Node Degree and Edge Weight. 356-361 - Lanlan Pan, Zhaojun Gu, Yitong Ren, Chunbo Liu, Zhi Wang:

An Anomaly Detection Method for System Logs Using Venn-Abers Predictors. 362-368 - Yitong Ren, Zhaojun Gu, Lanlan Pan, Chunbo Liu:

The Class Overlap Model for System Log Anomaly Detection Based on Ensemble Learning. 369-374 - Xinzhong Chai, Yasen Wang, Chuanxu Yan, Yuan Zhao, Wenlong Chen, Xiaolei Wang:

DQ-MOTAG: Deep Reinforcement Learning-based Moving Target Defense Against DDoS Attacks. 375-379 - Xiang Li, Kefan Qiu, Cheng Qian, Gang Zhao:

An Adversarial Machine Learning Method Based on OpCode N-grams Feature in Malware Detection. 380-387 - Jinjing Zhao, Ling Pang, Hongiian Li, Zibin Wang:

A Safety-Enhanced Dijkstra Routing Algorithm via SDN Framework. 388-393 - Zhongru Wang, Peixin Cong, Weiqiang Yu:

Malicious Code Detection Technology Based on Metadata Machine Learning. 394-399 - Wenhao Wang, BenFu Tang, Cheng Zhu, Bin Liu, Aiping Li, Zhaoyun Ding:

Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














