Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DSC
DSC 2017
Generate Citations
2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)
June 26 2017 to June 29 2017
Shenzhen, China
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xii
Message from the General Chairs
Freely available from IEEE.
pp. xiii-xiii
Conference Organization
Freely available from IEEE.
pp. xiv-xiv
Program Committee
Freely available from IEEE.
pp. xv-xxii
Reviewers
Freely available from IEEE.
pp. xxiii-xxix
Zero-Determinant Strategy for Cooperation Enforcement in Crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yue Miao
,
Changbing Tang
,
Jianfeng Lu
,
Xiang Li
Saving Energy on Processor Micro-Architecture Level for Big Data Stream Mobile Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-13
by
Zhiguo Liu
,
Ni Zhang
,
Qiu Tang
,
Ningning Song
,
Zengming Yu
,
Hongbin Zhang
A Multi-modal Hashing Learning Framework for Automatic Image Annotation
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-21
by
Jiale Wang
,
Guohui Li
SDS2: Secure Data-Sharing Scheme for Crowd Owners in Public Cloud Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-29
by
You Zhou
,
Liang-Min Wang
On Study of Physical-Layer Attack Detection for Large Volumes of Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-34
by
Ruohan Cao
,
Yueming Lu
Spatio-temporal Distribution Pattern of Cable Car Passenger Flow in Panholidays: A Case Study of Huangshan Scenic Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-42
by
Wenxing Lu
,
Xiao Wei
Mining Similarity-Aware Distinguishing Sequential Patterns from Biomedical Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-52
by
Tinghai Pang
,
Lei Duan
,
Jesse Li-Ling
,
Guozhu Dong
A Remote Data Integrity Checking Scheme for Big Data Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-59
by
Xingyue Chen
,
Tao Shang
,
Ilryong Kim
,
Jianwei Liu
Research on Classification Method of High-Dimensional Class-Imbalanced Data Sets Based on SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-67
by
Chunkai Zhang
,
Jianwei Guo
,
Junru Lu
An Approximate Approach to Frequent Itemset Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-73
by
Chunkai Zhang
,
Xudong Zhang
,
Panbo Tian
A Survey on Data Cleaning Methods in Cyberspace
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-81
by
Jinlin Wang
,
Hongli Zhang
,
Binxing Fang
,
Xing Wang
,
Lin Ye
A New Approach for Imbalanced Data Classification Based on Minimize Loss Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-87
by
Chunkai Zhang
,
Guoquan Wang
,
Ying Zhou
,
Jiayao Jiang
Semi-Supervised Collective Matrix Factorization for Topic Detection and Document Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-97
by
Ye Wang
,
Yanchun Zhang
,
Bin Zhou
,
Yan Jia
Extracting Sift Keypoints in DCT Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-101
by
Chi Fei
,
Bin Liu
,
Nenghai Yu
EMMBTT: A Novel Event Evolution Model Based on TFxIEF and TDC in Tracking News Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-107
by
Pengpeng Zhou
,
Bin Wu
,
Zhen Cao
Learning Automata Based Approach for Influence Maximization Problem on Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-117
by
Hao Ge
,
Jinchao Huang
,
Chong Di
,
Jianhua Li
,
Shenghong Li
A Personalized Next-Song Recommendation System Using Community Detection and Markov Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-123
by
Kan Zhang
,
Zichao Zhang
,
Kaigui Bian
,
Jin Xu
,
Jie Gao
Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-132
by
Ye Li
,
Zoe L. Jiang
,
Xuan Wang
,
S.M. Yiu
,
Qing Liao
DPLK-Means: A Novel Differential Privacy K-Means Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-139
by
Jun Ren
,
Jinbo Xiong
,
Zhiqiang Yao
,
Rong Ma
,
Mingwei Lin
A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-144
by
Fan Zhao
,
Jingning Chen
,
Dengpan Ye
,
Xiangyang Luo
Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-150
by
Hu Huanhuan
,
Zuo Xin
,
Zhang Weiming
,
Yu Nenghai
Predicting the Popularity of News Based on Competitive Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-155
by
Xiaomeng Wang
,
Binxing Fang
,
Hongli Zhang
,
XuanYu
A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Shudong Li
,
Zhou Yan
,
Xiaobo Wu
,
Aiping Li
,
Bin Zhou
New Pseudorandom Number Generators from Block Ciphers
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-171
by
Ping Zhang
,
Honggang Hu
,
Xianjun Hu
,
Xiaolong Yang
Attribute-Based Encryption with Multi-keyword Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-177
by
Runhe Li
,
Dong Zheng
,
Yinghui Zhang
,
Haonan Su
,
Menglei Yang
,
Pengzhen Lang
An Expressive Hidden Access Policy CP-ABE
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-186
by
Fawad Khan
,
Hui Li
,
Liangxuan Zhang
,
Jian Shen
A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-194
by
Tao Feng
,
Ningning Liu
Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-204
by
Maoxu Lyu
,
Xuejun Li
,
Hui Li
Multi-authority Attribute-Based Encryption Access Control Scheme with Hidden Policy and Constant Length Ciphertext for Cloud Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-212
by
Fan Yundong
,
Wu Xiaoping
,
Wang Jiasheng
A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-222
by
Liehuang Zhu
,
Cong Guo
,
Zijian Zhang
,
Wei Fu
,
Rixin Xu
A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-231
by
Yaqian Kang
,
Zhenhua Liu
SRAM: A State-Aware Risk Assessment Model for Intrusion Response
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-237
by
Fenghua Li
,
Fangxin Xiong
,
Chao Li
,
Lihua Yin
,
Guozhen Shi
,
Boxiu Tian
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-241
by
Hua Zhang
,
Fang Lou
,
Yunsheng Fu
,
Zhihong Tian
A Framework to Construct Knowledge Base for Cyber Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-248
by
Huaijun Shang
,
Rong Jiang
,
Aiping Li
,
Wei Wang
Building Endgame Data set to Improve Opponent Modeling Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-260
by
Zhang Jiajia
,
Liu Hong
Cyberspace-Oriented Access Control: Model and Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-266
by
Fenghua Li
,
Zifu Li
,
Weili Han
,
Ting Wu
,
Lihua Chen
,
Yunchuan Guo
ISLUS: An Immediate and Safe Live Update System for C Program
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-274
by
Zhikun Chen
,
Weizhong Qiang
A Reputation-Based Resilient and Recoverable P2P Botnet
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-282
by
Jie Yin
,
Xiang Cui
,
Ke Li
Mining Users’ Important Locations and Semantics on Cellular Network Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-291
by
Yupeng Tuo
,
Xiaochun Yun
,
Yongzheng Zhang
ITM-LB: An Improved Traffic Matrix-Based Load Balancing Routing Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-303
by
Weidong Lin
,
Chi Zhang
FgDetector: Fine-Grained Android Malware Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-318
by
Dongfang Li
,
Zhaoguo Wang
,
Lixin Li
,
Zhihua Wang
,
Yucheng Wang
,
Yibo Xue
Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-327
by
Hao Zhou
,
Wei Zhang
,
Fengqiong Wei
,
Yunfang Chen
Research on Online Learning of Radar Emitter Recognition Based on Hull Vector
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-332
by
Weigang Zhu
,
Meng Li
,
Chuangzhan Zeng
Cloud-Based Lightweight RFID Mutual Authentication Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-338
by
Kai Fan
,
Qi Luo
,
Hui Li
,
Yintang Yang
Interactive Network Clustering Layout Method Based on Implicit Connection
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-342
by
Huaquan Hu
,
Lingda Wu
,
Ronghuan Yu
Visualization Study of High-Dimensional Data Classification Based on PCA-SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-349
by
Zhao Zhongwen
,
Guo Huanghuang
Auto-Encoder Based for High Spectral Dimensional Data Classification and Visualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-354
by
Jiang Zhu
,
Lingda Wu
,
Hongxing Hao
,
Xiaorui Song
,
Yi Lu
Research on the Space-Based Integrated Information Network Evolution Model Visualization Methods Based on the Super Network Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-358
by
Chengxiang Liu
,
Wei Xiong
Research on Multi-resolution Isosurface Extraction Method for 3D Scalar Field
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-362
by
Yu Ronghuan
,
Xie Wei
,
Wu Lingda
,
Hao Hongxing
Two-Layer Network Visualization for Comprehensive Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-367
by
Yingmei Wei
,
Xiaolei Du
Tasks for Visual Analytics in Multilayer Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-371
by
Zhang Xitao
,
Wu Lingda
,
Hu Huaquan
,
Yu Shaobo
A Movie Summary Generation System
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-375
by
Yuxiang Xie
,
Xidao Luan
,
Jingmeng He
,
Lili Zhang
,
Xin Zhang
,
Chen Li
Temporal Multi-task Model Framework Using Multi-source Data for Bonds Credit Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-381
by
Jiawei Shi
,
Xi Zhang
Social Network Construction of the Role Relation in Unstructured Data Based on Multi-view
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-388
by
Lili Zhou
,
Jinna Lv
,
Bin Wu
Extracting Topics Based on Word2Vec and Improved Jaccard Similarity Coefficient
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-397
by
Chunzi Wu
,
Bai Wang
Open Relation Extraction Based on Core Dependency Phrase Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-404
by
Chengsen Ru
,
Shasha Li
,
Jintao Tang
,
Yi Gao
,
Ting Wang
The CRFs-Based Chinese Open Entity Relation Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-411
by
Xiaoyang Wu
,
Bin Wu
An Arithmetic View on Generating Necklaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-416
by
Jiantao Wang
Mobile Device Management System Based on AOSP and SELinux
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-420
by
Xin-long Song
,
Chung-Huang Yang
The Efficient Implementation of the Android Kernel with China Standard Cryptographic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-425
by
Yu Shi
,
Dong Zheng
,
Chung-Huang Yang
File-Based Encryption with SM4
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-430
by
Chan Gao
,
Chung-Huang Yang
Anonymous Fair Exchange Protocol with a Semitrusted Third Party
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-440
by
Lijuan Guo
,
Xuelian Li
,
Xiaolin Lv
,
Juntao Gao
Verifiable Attribute-Based Multi-keyword Search over Encrypted Cloud Data in Multi-owner Setting
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-449
by
Yaqing Fan
,
Zhenhua Liu
MSDB: A Massive Sensor Data Processing Middleware for HBase
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-456
by
Bowei Liu
,
Ruizhang Huang
,
Ting Huang
,
Yingying Yan
Permutation-Based Tweakable On-line Cipher with Improved Security Guarantees
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-466
by
Ping Zhang
,
Honggang Hu
Time Series Discord Discovery Under Multi-party Privacy Preserving
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-474
by
Chunkai Zhang
,
Haodong Liu
,
Ye Li
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 475-482
by
Liangxuan Zhang
,
Hui Li
,
Yinghui Zhang
,
Fawad Khan
Design and Implementation of the Components of the Symmetric Cryptographic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-487
by
Yunfei Ci
,
Guozhen Shi
,
Feng Yang
,
Jiawen Diao
,
Cuijie Liu
,
Weihua Mao
Privacy Preservation Strategy in Time-Sensitive LBSs
Full-text access may be available. Sign in or learn about subscription options.
pp. 488-493
by
Weihao Li
,
Ben Niu
,
Hui Li
Improving Database Storage Usability with the Cloud-Based Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-499
by
Cuicui Su
,
Yongzhi Wang
,
Yulong Shen
,
Ke Cheng
,
Jiawen Ma
A Deep Recurrent Network for Web Server Performance Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 500-504
by
Jiajun Peng
,
Zheng Huang
,
Jie Cheng
Joint Dictionary Learning for Person Re-identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-510
by
Yunlu Xu
,
Jie Guo
,
Zheng Huang
Review of iOS Malware Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-515
by
Zhu Yixiang
,
Zhang Kang
SpongeMPH: A New Multivariate Polynomial Hash Function based on the Sponge Construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-520
by
Weijie Li
,
Guohong Liao
,
Yamin Wen
,
Zheng Gong
An Adaptive Honeypot Deployment Algorithm Based on Learning Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 521-527
by
Yan Zhang
,
Chong Di
,
Zhuoran Han
,
Yichen Li
,
Shenghong Li
Big Data for Social Media Evaluation: A Case of Wechat Platform Rankings in China
Full-text access may be available. Sign in or learn about subscription options.
pp. 528-533
by
Qian Liu
,
Jingsi Ni
,
Jing Huang
,
Xiaochuan Shi
Formal Analysis of Security Properties of Cyber-Physical System Based on Timed Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 534-540
by
Ting Wang
,
Qi Su
,
Tieming Chen
CPS Information Security Risk Evaluation System Based on Petri Net
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-548
by
Yonggui Fu
,
Jianming Zhu
,
Sheng Gao
A Defense Mechanism Against Location Cheating Attack in Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 549-553
by
Qing Li
,
Ayong Ye
,
Li Xu
Evaluating Network Equipment Information Security Based on D-S Evidence Theory and Principal Components Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 554-560
by
Chao Yuan
,
Yueming Lu
,
Jiefu Gan
Construction of High-Availability Bank System in Virtualized Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 561-568
by
Huang Neng
Embedding-Based Feature Extraction Methods for Chinese Sentiment Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 569-577
by
Sheng Zhang
,
Hui Wang
,
Xin Zhang
,
Jiajun Cheng
,
Pei Li
,
Zhaoyun Ding
Range Queries on Two Column Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 578-584
by
Ce Yang
,
Weiming Zhang
,
Nenghai Yu
CNFL: Categorical to Numerical Feature Learning for Clustering and Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 585-594
by
Eric Golinko
,
Thomas Sonderman
,
Xingquan Zhu
An Information Security Evaluation Method Based on Entropy Theory and Improved TOPSIS
Full-text access may be available. Sign in or learn about subscription options.
pp. 595-600
by
Dongqing Wang
,
Yueming Lu
,
Jiefu Gan
Analysis of Network Attack and Defense Game with the Average Recovery Time as the Quantitative Indicators of the Payment Function
Full-text access may be available. Sign in or learn about subscription options.
pp. 601-605
by
Sun Yang
,
Xioing Wei
Implementation and Evaluation of Different Parallel Designs of AES Using CUDA
Full-text access may be available. Sign in or learn about subscription options.
pp. 606-614
by
Jianwei Ma
,
Xiaojun Chen
,
Rui Xu
,
Jinqiao Shi
Detecting Congestion and Detour of Taxi Trip via GPS Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 615-618
by
Junfeng Tu
,
Yucong Duan
Framework of Probabilistic Risk Assessment for Security and Reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 619-624
by
Qisi Liu
,
Liudong Xing
,
Chaonan Wang
Fast Copy-Move Detection of Digital Audio
Full-text access may be available. Sign in or learn about subscription options.
pp. 625-629
by
Zihan Liu
,
Wei Lu
Sentiment Lexical-Augmented Convolutional Neural Networks for Sentiment Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 630-635
by
Rongchao Yin
,
Peng Li
,
Bin Wang
A Trusted Power System Network in Electrical Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 636-643
by
Yuan Mengying
,
Chen Xiangzhou
,
Wang Yang
,
Ding Huixia
Showing 100 out of 106
Load More
Load All