default search action
5th DSC 2020: Hong Kong
- 5th IEEE International Conference on Data Science in Cyberspace, DSC 2020, Hong Kong, July 27-30, 2020. IEEE 2020, ISBN 978-1-7281-9558-2
- Qing Li, M. Tamer Özsu, Hui Xiong:
Message from the General Chairs of DSC 2020. 1 - Yiting Qian, Li Pan, Peng Wu, Zhengmin Xia:
GeST: A Grid Embedding based Spatio-Temporal Correlation Model for Crime Prediction. 1-7 - Qingguang Liu, Jielong Wei, Sining Lei, Qingbao Huang, Mengqiao Zhang, Xiongbin Zhou:
Temperature Prediction Modeling and Control Parameter optimization Based on Data Driven. 8-14 - Changmeng Zheng, Qi Peng, Xuemiao Xu:
Heterogenous Multi-Source Fusion for Ship Trajectory Complement and Prediction with Sequence Modeling. 15-21 - Yuanyu Yang, Bin Wu, Kai Zhao, Wenying Guo:
Tweet Stance Detection: A Two-stage DC-BILSTM Model Based on Semantic Attention. 22-29 - Zhanming Guan, Bin Wu, Bai Wang, Hezi Liu:
Personality2vec: Network Representation Learning for Personality. 30-37 - Xiangyi Kong, Zhaoquan Gu, Lihua Yin:
A Unified Information Diffusion Model for Social Networks. 38-44 - Yang Zhao, Hongzhi Ye, Lingzi Li, Cheng Huang, Tao Zhang:
Detecting DNS Tunnels Using Session Behavior and Random Forest Method. 45-52 - Yunyi Zhang, Yuelong Wu, Shuyuan Jin:
Which DGA Family does A Malicious Domain Name Belong To. 53-60 - Yulu Qi, Rong Jiang, Yan Jia, Aiping Li:
An APT Attack Analysis Framework Based on Self-define Rules and Mapreduce. 61-66 - Kai Xing, Aiping Li, Rong Jiang, Yan Jia:
A Review of APT Attack Detection Methods and Defense Strategies. 67-70 - Shanqing Yu, Jun Zheng, Jinyin Chen, Qi Xuan, Qingpeng Zhang:
Unsupervised Euclidean Distance Attack on Network Embedding. 71-77 - Shihui Ma, Shilin Wang, Xiang Lin:
A Transformer-based Model for Sentence-Level Chinese Mandarin Lipreading. 78-81 - Changhai Wang, Aiping Li, Hongkui Tu, Ye Wang, Chenchen Li, Xiaojuan Zhao:
An Advanced BERT-Based Decomposition Method for Joint Extraction of Entities and Relations. 82-88 - Liqun Gao, Bin Zhou, Yan Jia, Hongkui Tu, Ye Wang, Chenguang Chen, Haiyang Wang, Hongwu Zhuang:
Deep Learning for Social Network Information Cascade Analysis: a survey. 89-97 - Wenyu Huang, Guohua Wang, Huakui Zhang, Feng Chen:
Incorporating Entity Type Information into Knowledge Representation Learning. 98-104 - Zuowei Zhang, Yan Tang:
Context-aware Event Type Identification Based on Context Fusion and Joint Learning. 105-112 - Zhongbai Jiang, Yanwei Sun, Lei Shi, Weihua Hu, Zhaohui Liu:
Secure Data Dissemination among Multiple Base Stations in High-Speed Railway Network. 113-119 - Peiru Fan, Chonghua Wang, Jun Li, Bo Zhao, Zhaoxu Ji:
StateConsisIV: A Privacy-preserving Integrity Verification Method for Cloud Components Based on a Novel State Consistency Feature. 120-126 - Peiyi Han, Chaozheng Wang, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Pengshuai Luo:
SecureMLDebugger: A Privacy-Preserving Machine Learning Debugging Tool. 127-134 - Yang Liu, Jie Jiang, Jiahao Sun, Liang Bai, Qi Wang:
A Survey of Depth Estimation Based on Computer Vision. 135-141 - Yingzi Ou, Xin Li, Zhenyu Guo, Yizhuo Wang:
Anobeat: Anomaly Detection for Electrocardiography Beat Signals. 142-149 - Xiongbo Huang, Yongjian Hu, Yufei Wang, Beibei Liu, Shuowei Liu:
Deep Learning-based Quantitative Steganalysis to Detect Motion Vector Embedding of HEVC Videos. 150-155 - Ying Yang, Bin Wu, Lianwei Li, Shuyang Wang:
A Joint Model for Aspect-Category Sentiment Analysis with TextGCN and Bi-GRU. 156-163 - Haoliang Zhang, Hongbo Xu, Jinqiao Shi, Tingwen Liu, Chun Liao:
Word Level Domain-Diversity Attention Based LSTM Model for Sentiment Classification. 164-170 - Zhou Wang, Jing Cao:
Multi-Task Learning Network for Document-level and Multi-aspect Sentiment Classification. 171-177 - Bingxu Piao, Xu Wu, Jingchen Wu, Xiaqing Xie:
Real-time Event Detection and Tracking in Microblog via Text Chain and Sentiment time series. 178-185 - Qian Ji, Xiang Lin, Yinghua Ma, Gongshen Liu, Shilin Wang:
A Unified Labeling Model for Open-Domain Aspect-Based Sentiment Analysis. 186-189 - Yongming Liang, Tian Tian, Kaifu Jin, Xiaoyu Yang, Yuefei Lv, Xi Zhang:
Robust Text Clustering with Graph and Textual Adversarial Learning. 190-197 - Yibing Guo, Yutao Huang, Ye Ding, Shuhan Qi, Xuan Wang, Qing Liao:
GPU-BTM: A Topic Model for Short Text using Auxiliary Information. 198-205 - Mohammad Al Boni, Trishala Neeraj:
Longitudinal Analysis of Cyber-Related Articles. 206-213 - Xiang Wang, Yunfan Liao, Junxing Zhu, Bin Zhou, Yan Jia:
A Low-Dimensional Representation Learning Method for Text Classification and Clustering. 214-217 - Ze Hu, Jielong Wei, Qingbao Huang, Hanyu Liang, Xingmao Zhang, Qingguang Liu:
Graph Convolutional Network for Visual Question Answering Based on Fine-grained Question Representation. 218-224 - Hailiang Chen, Bin Chen, Chuan Ai, Mengna Zhu, Kaisheng Lai, Lingnan He:
Research on Rumor Propagation Simulation Based on Behavior-Attribute. 225-231 - Xinwen Wang, Xin Li, Linjing Lai:
On Improving the Learning of Long-Term historical Information for Tasks with Partial Observability. 232-237 - Yushun Xie, Zhaoquan Gu, Bin Zhu, Le Wang, Weihong Han, Lihua Yin:
Adversarial Examples for Chinese Text Classification. 238-245 - Jia Guo, Bin Wu, Pengpeng Zhou:
BLHNN: A Novel Charge Prediction Model Based on Bi-Attention LSTM-CNN Hybrid Neural Network. 246-252 - Tianpeng Ye, Yinghua Ma, Xiang Lin, Jianhua Li:
A Token Level Multi-target Stance Detection Dataset. 253-256 - Kui Zhu, Bin Wu, Bai Wang:
Deepfake Detection with Clustering-based Embedding Regularization. 257-264 - Tianyu Xing, Bin Wu, Bai Wang:
An Efficient Parallel Stochastic Gradient Descent for Matrix Factorization On GPUS. 265-270 - Yanjie He, Wei Li:
Image-based Encrypted Traffic Classification with Convolution Neural Networks. 271-278 - Zhengqiao Wang, Yufan Zeng, Yue Yuan, Yibo Guo:
Refining Co-operative Competition of Robocup Soccer with Reinforcement Learning. 279-283 - Yu Han, Yifei Li, Qingshun Wu, Ji Wan, Yafei Li:
Join-based Social Ridesharing. 284-289 - Guobao Zhang:
A data traceability method to improve data quality in a big data environment. 290-294 - Huchen Zhou, Mohan Li, Zhaoquan Gu:
Knowledge Fusion and Spatiotemporal Data Cleaning: A Review. 295-301 - Yunyi Tang, Wang Le, Xiaolong Chen, Zhaoquan Gu, Lihua Yin, Xin Yi:
Automatic Classification of Matching Rules in Pattern Matching. 302-306 - Ziheng Cheng, Xu Wu, Xiaqing Xie, Jingchen Wu:
Chinese Open Relation Extraction with Pointer-Generator Networks. 307-311 - Chenchen Li, Aiping Li, Ye Wang, Hongkui Tu, Yichen Song:
A Survey on Approaches and Applications of Knowledge Representation Learning. 312-319 - Haiyang Wang, Bin Zhou, Zhipin Gu, Yan Jia:
Contextual Gated Graph Convolutional Networks for Social Unrest Events Prediction. 320-325 - Chenchen Li, Aiping Li, Hongkui Tu, Ye Wang, Changhai Wang:
A Knowledge Graph Embedding Method Based on Neural Network. 326-332 - Xiaolong Chen, Le Wang, Yunyi Tang, Weihong Han, Zhaoquan Gu:
Seeds Optimization for Entity Alignment in Knowledge Graph Embedding. 333-338 - Xingyu Lv, Ye Zhong, Qingfeng Tan:
A Study of Bitcoin De-Anonymization: Graph and Multidimensional Data Analysis. 339-345 - Wenying Guo, Bin Wu, Bai Wang, Yuanyu Yang:
Two-stage encoding Extractive Summarization. 346-350 - Fengcai Qiao, Yuanfa Zhang, Jinsheng Deng, Zhaoyun Ding, Aiping Li:
A Parallel Algorithm for Graph Transaction Based Frequent Subgraph Mining. 351-355 - Jiangwen Wang, Zhijie Ban:
Sampling Topic Representative Users by Integrating Node Degree and Edge Weight. 356-361 - Lanlan Pan, Zhaojun Gu, Yitong Ren, Chunbo Liu, Zhi Wang:
An Anomaly Detection Method for System Logs Using Venn-Abers Predictors. 362-368 - Yitong Ren, Zhaojun Gu, Lanlan Pan, Chunbo Liu:
The Class Overlap Model for System Log Anomaly Detection Based on Ensemble Learning. 369-374 - Xinzhong Chai, Yasen Wang, Chuanxu Yan, Yuan Zhao, Wenlong Chen, Xiaolei Wang:
DQ-MOTAG: Deep Reinforcement Learning-based Moving Target Defense Against DDoS Attacks. 375-379 - Xiang Li, Kefan Qiu, Cheng Qian, Gang Zhao:
An Adversarial Machine Learning Method Based on OpCode N-grams Feature in Malware Detection. 380-387 - Jinjing Zhao, Ling Pang, Hongiian Li, Zibin Wang:
A Safety-Enhanced Dijkstra Routing Algorithm via SDN Framework. 388-393 - Zhongru Wang, Peixin Cong, Weiqiang Yu:
Malicious Code Detection Technology Based on Metadata Machine Learning. 394-399 - Wenhao Wang, BenFu Tang, Cheng Zhu, Bin Liu, Aiping Li, Zhaoyun Ding:
Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.