Default Cover Image

2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)

June 26 2017 to June 29 2017

Shenzhen, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xii
Message from the General ChairsFreely available from IEEE.pp. xiii-xiii
Conference OrganizationFreely available from IEEE.pp. xiv-xiv
Program CommitteeFreely available from IEEE.pp. xv-xxii
ReviewersFreely available from IEEE.pp. xxiii-xxix
Zero-Determinant Strategy for Cooperation Enforcement in CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Multi-modal Hashing Learning Framework for Automatic Image AnnotationFull-text access may be available. Sign in or learn about subscription options.pp. 14-21
SDS2: Secure Data-Sharing Scheme for Crowd Owners in Public Cloud ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 22-29
On Study of Physical-Layer Attack Detection for Large Volumes of DataFull-text access may be available. Sign in or learn about subscription options.pp. 30-34
Spatio-temporal Distribution Pattern of Cable Car Passenger Flow in Panholidays: A Case Study of Huangshan Scenic AreaFull-text access may be available. Sign in or learn about subscription options.pp. 35-42
Mining Similarity-Aware Distinguishing Sequential Patterns from Biomedical SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 43-52
A Remote Data Integrity Checking Scheme for Big Data StorageFull-text access may be available. Sign in or learn about subscription options.pp. 53-59
Research on Classification Method of High-Dimensional Class-Imbalanced Data Sets Based on SVMFull-text access may be available. Sign in or learn about subscription options.pp. 60-67
An Approximate Approach to Frequent Itemset MiningFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
A Survey on Data Cleaning Methods in CyberspaceFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
A New Approach for Imbalanced Data Classification Based on Minimize Loss LearningFull-text access may be available. Sign in or learn about subscription options.pp. 82-87
Semi-Supervised Collective Matrix Factorization for Topic Detection and Document ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 88-97
Extracting Sift Keypoints in DCT DomainFull-text access may be available. Sign in or learn about subscription options.pp. 98-101
EMMBTT: A Novel Event Evolution Model Based on TFxIEF and TDC in Tracking News StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 102-107
Learning Automata Based Approach for Influence Maximization Problem on Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 108-117
A Personalized Next-Song Recommendation System Using Community Detection and Markov ModelFull-text access may be available. Sign in or learn about subscription options.pp. 118-123
Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 124-132
DPLK-Means: A Novel Differential Privacy K-Means MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 133-139
A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor NodesFull-text access may be available. Sign in or learn about subscription options.pp. 140-144
Adaptive Text Steganography by Exploring Statistical and Linguistical DistortionFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Predicting the Popularity of News Based on Competitive MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 151-155
A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNNFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
New Pseudorandom Number Generators from Block CiphersFull-text access may be available. Sign in or learn about subscription options.pp. 162-171
Attribute-Based Encryption with Multi-keyword SearchFull-text access may be available. Sign in or learn about subscription options.pp. 172-177
An Expressive Hidden Access Policy CP-ABEFull-text access may be available. Sign in or learn about subscription options.pp. 178-186
A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-SigncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 187-194
Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 195-204
A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym QueryFull-text access may be available. Sign in or learn about subscription options.pp. 223-231
SRAM: A State-Aware Risk Assessment Model for Intrusion ResponseFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSSFull-text access may be available. Sign in or learn about subscription options.pp. 238-241
A Framework to Construct Knowledge Base for Cyber SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 242-248
Building Endgame Data set to Improve Opponent Modeling ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 255-260
Cyberspace-Oriented Access Control: Model and PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 261-266
ISLUS: An Immediate and Safe Live Update System for C ProgramFull-text access may be available. Sign in or learn about subscription options.pp. 267-274
A Reputation-Based Resilient and Recoverable P2P BotnetFull-text access may be available. Sign in or learn about subscription options.pp. 275-282
Mining Users’ Important Locations and Semantics on Cellular Network DataFull-text access may be available. Sign in or learn about subscription options.pp. 283-291
ITM-LB: An Improved Traffic Matrix-Based Load Balancing Routing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
FgDetector: Fine-Grained Android Malware DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 311-318
Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call GraphFull-text access may be available. Sign in or learn about subscription options.pp. 319-327
Research on Online Learning of Radar Emitter Recognition Based on Hull VectorFull-text access may be available. Sign in or learn about subscription options.pp. 328-332
Cloud-Based Lightweight RFID Mutual Authentication ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 333-338
Interactive Network Clustering Layout Method Based on Implicit ConnectionFull-text access may be available. Sign in or learn about subscription options.pp. 339-342
Visualization Study of High-Dimensional Data Classification Based on PCA-SVMFull-text access may be available. Sign in or learn about subscription options.pp. 346-349
Auto-Encoder Based for High Spectral Dimensional Data Classification and VisualizationFull-text access may be available. Sign in or learn about subscription options.pp. 350-354
Research on Multi-resolution Isosurface Extraction Method for 3D Scalar FieldFull-text access may be available. Sign in or learn about subscription options.pp. 359-362
Two-Layer Network Visualization for Comprehensive AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 363-367
Tasks for Visual Analytics in Multilayer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 368-371
A Movie Summary Generation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 372-375
Temporal Multi-task Model Framework Using Multi-source Data for Bonds Credit AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 376-381
Social Network Construction of the Role Relation in Unstructured Data Based on Multi-viewFull-text access may be available. Sign in or learn about subscription options.pp. 382-388
Extracting Topics Based on Word2Vec and Improved Jaccard Similarity CoefficientFull-text access may be available. Sign in or learn about subscription options.pp. 389-397
Open Relation Extraction Based on Core Dependency Phrase ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 398-404
The CRFs-Based Chinese Open Entity Relation ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 405-411
An Arithmetic View on Generating NecklacesFull-text access may be available. Sign in or learn about subscription options.pp. 412-416
Mobile Device Management System Based on AOSP and SELinuxFull-text access may be available. Sign in or learn about subscription options.pp. 417-420
The Efficient Implementation of the Android Kernel with China Standard Cryptographic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 421-425
File-Based Encryption with SM4Full-text access may be available. Sign in or learn about subscription options.pp. 426-430
Anonymous Fair Exchange Protocol with a Semitrusted Third PartyFull-text access may be available. Sign in or learn about subscription options.pp. 431-440
Verifiable Attribute-Based Multi-keyword Search over Encrypted Cloud Data in Multi-owner SettingFull-text access may be available. Sign in or learn about subscription options.pp. 441-449
MSDB: A Massive Sensor Data Processing Middleware for HBaseFull-text access may be available. Sign in or learn about subscription options.pp. 450-456
Permutation-Based Tweakable On-line Cipher with Improved Security GuaranteesFull-text access may be available. Sign in or learn about subscription options.pp. 457-466
Time Series Discord Discovery Under Multi-party Privacy PreservingFull-text access may be available. Sign in or learn about subscription options.pp. 467-474
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access StructuresFull-text access may be available. Sign in or learn about subscription options.pp. 475-482
Design and Implementation of the Components of the Symmetric Cryptographic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 483-487
Privacy Preservation Strategy in Time-Sensitive LBSsFull-text access may be available. Sign in or learn about subscription options.pp. 488-493
Improving Database Storage Usability with the Cloud-Based ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 494-499
A Deep Recurrent Network for Web Server Performance PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 500-504
Joint Dictionary Learning for Person Re-identificationFull-text access may be available. Sign in or learn about subscription options.pp. 505-510
Review of iOS Malware AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 511-515
SpongeMPH: A New Multivariate Polynomial Hash Function based on the Sponge ConstructionFull-text access may be available. Sign in or learn about subscription options.pp. 516-520
An Adaptive Honeypot Deployment Algorithm Based on Learning AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 521-527
Big Data for Social Media Evaluation: A Case of Wechat Platform Rankings in ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 528-533
Formal Analysis of Security Properties of Cyber-Physical System Based on Timed AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 534-540
CPS Information Security Risk Evaluation System Based on Petri NetFull-text access may be available. Sign in or learn about subscription options.pp. 541-548
A Defense Mechanism Against Location Cheating Attack in Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 549-553
Evaluating Network Equipment Information Security Based on D-S Evidence Theory and Principal Components AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 554-560
Construction of High-Availability Bank System in Virtualized EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 561-568
Embedding-Based Feature Extraction Methods for Chinese Sentiment ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 569-577
Range Queries on Two Column DataFull-text access may be available. Sign in or learn about subscription options.pp. 578-584
CNFL: Categorical to Numerical Feature Learning for Clustering and ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 585-594
An Information Security Evaluation Method Based on Entropy Theory and Improved TOPSISFull-text access may be available. Sign in or learn about subscription options.pp. 595-600
Implementation and Evaluation of Different Parallel Designs of AES Using CUDAFull-text access may be available. Sign in or learn about subscription options.pp. 606-614
Detecting Congestion and Detour of Taxi Trip via GPS DataFull-text access may be available. Sign in or learn about subscription options.pp. 615-618
Framework of Probabilistic Risk Assessment for Security and ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 619-624
Fast Copy-Move Detection of Digital AudioFull-text access may be available. Sign in or learn about subscription options.pp. 625-629
Sentiment Lexical-Augmented Convolutional Neural Networks for Sentiment AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 630-635
A Trusted Power System Network in Electrical IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 636-643
Showing 100 out of 106