


default search action
3rd DSC 2018: Guangzhou, China
- Third IEEE International Conference on Data Science in Cyberspace, DSC 2018, Guangzhou, China, June 18-21, 2018. IEEE 2018, ISBN 978-1-5386-4210-8

- Yue Zhao, Zhouguo Chen, Hong Su, Enbo Sun, Yubin Guo, Jianwei Ding:

A Position-Based Secure Fast Handover Mechanism for High-Speed Trains. 1-6 - Fulian Yin, Yiming Ma, Congcong Zhang, Jinbao Song:

The Research about Public Sentiment Differences between the Belt and Road Countries on China's Hot Issues. 7-14 - Junhan Zhao

, Xiang Liu, Yanqun Kuang, Yingjie Victor Chen, Baijian Yang
:
Deep CNN-Based Methods to Evaluate Neighborhood-Scale Urban Valuation Through Street Scenes Perception. 20-27 - Xiaodong Yang, Likun Xiao, Yutong Li, Shudong Li, Jinli Wang, Chunlin Chen:

Identity-Based Blind Proxy Re-Signature Scheme for Data Security. 28-32 - Zhen Ding, Chifu Yang, Kai Xing, Xueyan Ma, Kai Yang, Hao Guo, Chunzhi Yi, Feng Jiang:

The Real Time Gait Phase Detection Based on Long Short-Term Memory. 33-38 - Yan Jia, Lu Deng, Bin Zhou, Binxing Fang, Weihong Han, Aiping Li, Qiang Liu, Yong Quan:

Topic Analysis Model for Online Social Network. 39-44 - Fang Zhang, Xiaochen Wang, Jingfei Han, Jie Tang, Shiyin Wang:

Fast Top-k Area Topics Extraction with Knowledge Base. 45-52 - Tiantian Ji

, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang:
The Coming Era of AlphaHacking?: A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques. 53-60 - Yan Jia, Qiang Liu, Binxing Fang, Bin Zhou, Lu Deng, Yong Quan:

Virtual Community Detection Model and Related Research in Online Social Networks. 61-68 - Bengong Yu, Qingtang Xu, Peihang Zhang:

Question Classification Based on MAC-LSTM. 69-75 - Zeshan Peng, Wenbo Wang

, Bitty Balducci
, Detelina Marinova
, Yi Shang:
Toward Predicting Communication Effectiveness. 76-83 - Xiaolong Yang, Mengce Zheng

, Honggang Hu:
Generic Generating Functions for the Counting Functions of Quadratic Functions with Prescribed Walsh Spectrum. 84-91 - Zhinming Ding, Fujie Ren, Zhi Cai, Yang Cao:

Urban Road Congestion Condition Discrimination Research Based on Vector Features. 92-98 - Hao Wang, Wentao Ouyang, Huawei Shen, Xueqi Cheng:

ULE: Learning User and Location Embeddings for POI Recommendation. 99-106 - Hanpin Wang, Zhao Jin, Lei Zhang, Yuxin Jing, Yongzhi Cao

:
Reasoning about Cloud Storage Systems. 107-114 - William Morrison, Luke M. Guerdan, Jayanth Kanugo, Timothy Trull, Yi Shang

:
TigerAware: An Innovative Mobile Survey and Sensor Data Collection and Analytics System. 115-122 - Geng Li, Yichen Qian, Lili Liu, Yang Richard Yang:

JMS: Joint Bandwidth Allocation and Flow Assignment for Transfers with Multiple Sources. 123-130 - Yichun Duan, Guopeng Zhou, Yuanxing Zhang

, Zhaoqian Lan, Chunhua Chi, Wei Yan:
Neural Network Based Clinical Treatment Decision Support System for Co-existing Medical Conditions. 131-138 - Dong Ye, Sheng Zhang, Hui Wang, Jiajun Cheng, Xin Zhang, Zhaoyun Ding, Pei Li:

Multi-level Composite Neural Networks for Medical Question Answer Matching. 139-145 - Kun Qin, Lei Sun

, Bo Liu, Yuan Fan, Kar-Ann Toh:
A Robust Change-Point Detection Method by Eliminating Sparse Noises from Time Series. 146-152 - Handong Cui, Delu Huang, Yong Fang

, Liang Liu, Cheng Huang:
Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm. 153-160 - Yifan Zhang, Kan Zhang, Xinyi Zou:

Structural Brain Network Mining Based on Core Theory. 161-168 - Yu Wu

, Li Pan:
Privacy-Aware Personal Information Propagation Management in Social Networks. 169-174 - Khouanetheva Pholsena, Li Pan:

Traffic Status Evaluation Based on Possibilistic Fuzzy C-Means Clustering Algorithm. 175-180 - Di Wu, Binxing Fang, Jie Yin, Fangjiao Zhang, Xiang Cui:

SLBot: A Serverless Botnet Based on Service Flux. 181-188 - Jingqiang Liu, Bin Li, Lizhang Chen, Meng Hou, Feiran Xiang, Peijun Wang:

A Data Storage Method Based on Blockchain for Decentralization DNS. 189-196 - Zhaopeng Jia, Xiang Cui, Qixu Liu, Xiaoxi Wang, Chaoge Liu:

Micro-Honeypot: Using Browser Fingerprinting to Track Attackers. 197-204 - Jiuhong Xiao

, Weiping Wang, Meiqi Wang:
Image Encryption Algorithm Based on Memristive BAM Neural Networks. 205-212 - Xiaoyun Li, Xiang Cui, Limin Shi, Chaoge Liu, Xiaoxi Wang:

Constructing Browser Fingerprint Tracking Chain Based on LSTM Model. 213-218 - Chaoge Liu, Xiang Cui, Zhi Wang

, Xiaoxi Wang, Yun Feng, Xiaoyun Li:
MaliceScript: A Novel Browser-Based Intranet Threat. 219-226 - Zihan Wang, Xu Wu, Chaoge Liu, Qixu Liu, Jialai Zhang:

RansomTracer: Exploiting Cyber Deception for Ransomware Tracing. 227-234 - Chaoyang Li, Zhengyang Song, Jie Tang:

User Tagging in MOOCs Through Network Embedding. 235-241 - Yan Li, Peiyi Han, Chuanyi Liu, Binxing Fang:

Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis. 242-249 - Tianshu Li, Zhaoquan Gu, Xiao Lin, Shudong Li, Qingfeng Tan:

Approximation Algorithms for Controller Placement Problems in Software Defined Networks. 250-257 - Dongxiang Zhang, Mingtao Lei, Xiang Zhu:

SAQP++: Bridging the Gap between Sampling-Based Approximate Query Processing and Aggregate Precomputation. 258-265 - Zhaoquan Gu, Yongcai Wang, Jing Qiu, Lihua Yin

, Zhihong Tian:
How to Control Target Nodes in Dynamic Networks. 266-273 - Fang Liu, Li Pan, Lihong Yao:

Evolutionary Game Based Analysis for User Privacy Protection Behaviors in Social Networks. 274-279 - Lihao Nan, Dacheng Tao

:
Bitcoin Mixing Detection Using Deep Autoencoder. 280-287 - Wen Diao, Yuanxin Wu, Weiming Zhang, Bin Liu, Nenghai Yu:

Robust Audio Watermarking Algorithm Based on Air Channel Characteristics. 288-293 - Yuanxing Zhang

, Kaigui Bian, Lin Chen, Shaoling Dong, Lingyang Song, Xiaoming Li:
Early Detection of Rumors in Heterogeneous Mobile Social Network. 294-301 - Zhongwen Zhao, Zhangyuan Li, Huanghuang Guo, Miaoben Yang:

Research on Vulnerability of Space Information Network Based on Interdependent Networks. 302-309 - Mingyuan Ma, Dongyang Zhao:

Stochastic Alternating Direction Method of Multipliers with Conjugate Gradient. 310-316 - Yang Liu, Peng Sun, Max R. Highsmith, Nickolas M. Wergeles, Joel Sartwell, Andy Raedeke, Mary Mitchell, Heath Hagy, Andrew D. Gilbert, Brian Lubinski, Yi Shang:

Performance Comparison of Deep Learning Techniques for Recognizing Birds in Aerial Images. 317-324 - Zhangkai Zhang, Zhoujun Li, Chunhe Xia, Jinhua Cui, Jinxin Ma:

H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices. 325-332 - Qing Miao, Yuanyuan Qiao, Jie Yang:

Research of Urban Land Use and Regional Functions Based on Mobile Data Traffic. 333-338 - Xiaochen Wang, Wenzheng Feng, Jie Tang, Qingyang Zhong:

Course Concept Extraction in MOOC via Explicit/Implicit Representation. 339-345 - Zhaoqian Lan, Guopeng Zhou, Yichun Duan, Wei Yan:

AI-Assisted Prediction on Potential Health Risks with Regular Physical Examination Records. 346-352 - Yejun Zhou, Lede Qiu, Hang Yu, Chunhui Sun:

Study on Security Technology of Internet of Things Based on Network Coding. 353-357 - Chen-Yi Lin, Yuan-Chen Wang, Wan-Tian Fu, Yun-Sheng Chen, Kuan-Chen Chien, Bing-Yi Lin:

Efficiently Preserving Privacy on Large Trajectory Datasets. 358-364 - Zhen Ju, Xiang Lin, Fangqi Li, Shilin Wang:

Lip Segmentation with Muti-scale Features Based on Fully Convolution Network. 365-370 - Lina Liu, Jiayin Qi:

Research on Discrete Emotion Classification of Chinese Online Product Reviews Based on OCC Model. 371-378 - Yuguang Xu, Hanpin Wang, Hongyu Wang:

Complete Graph Random Number Generator and Symmetrical Design Scheme. 379-385 - Xiaomeng Wang, Binxing Fang, Hongli Zhang, Shen Su:

Predicting the Popularity of Online Content Based on the Weak Ties Theory. 386-391 - Shang Li

, Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang:
Evaluating the Rationality of Judicial Decision with LSTM-Based Case Modeling. 392-397 - Mingxuan Xiong, Aiping Li, Zongsheng Xie, Yan Jia:

A Practical Approach to Answer Extraction for Constructing QA Solution. 398-404 - Shudong Li, Xiaobo Wu, Aiping Li, Bin Zhou, Zhihong Tian, Dawei Zhao:

Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks. 405-409
Big Data and Business Analytics (BDBA 2018)
- Xiaoyan Wang, Debao Hu, Hui Lu:

Will the Big Data Strategic Alliance be Workable for Intelligent Vehicles and New Energy Vehicles Industry? - Perspective of System Dynamics. 410-417 - Hao Xue, Zheng Huang, Huijuan Lian, Weidong Qiu, Jie Guo, Shen Wang, Zheng Gong:

Distributed Large Scale Privacy-Preserving Deep Mining. 418-422 - Man Bai, Xu Han, Haoran Jia, Cong Wang, Yawei Sun:

Transfer Pretrained Sentence Encoder to Sentiment Classification. 423-427 - Pin Ding, Qinliu Yang, Cong Wang, Xiaoyan Wei, Yi Zhou:

Application of Improved Grey Model GM(1, 1) in Prediction of Human Health Data. 428-432 - Yujing Huang, Haoran Jia, Dan Jiang, Jincui Yang:

Hybrid Recommendation Algorithm Based on Social Interaction and Tag Weight. 433-437 - Jianju Du, Lili Wang:

Ownership Concentration, Internal Control Quality and Real Earnings Management. 438-444 - Ming Liu, Xifen Xu:

Dockless Bike-Sharing Reallocation Based on Data Analysis: Solving Complex Problem with Simple Method. 445-450 - Yong Chen, Bin Zhou, Weina Zhang, Wenjie Gong, Guangfu Sun:

Sentiment Analysis Based on Deep Learning and Its Application in Screening for Perinatal Depression. 451-456 - Chuan Ai, Bin Chen, Liang Liu, Jian Dong, Lingnan He, Xiaogang Qiu:

Design and Implementation of Information Dissemination Simulation Algorithm in Large-Scale Complex Network Based on Spark. 457-464 - Yuanchun Jiang, Manli Lv, Jianshan Sun, Yezheng Liu:

A Bayesian Personalized Ranking Algorithm Based on Tag Preference. 465-471 - Yan Fang, Xinyue Xiao, Xiaoyu Wang, Huiqing Lan:

Customized Bundle Recommendation by Association Rules of Product Categories for Online Supermarkets. 472-475
Big Data Mining for Cyberspace (BDMC 2018)
- Xuebin Wang, Qingfeng Tan, Jinqiao Shi, Shen Su, Meiqi Wang:

Insider Threat Detection Using Characterizing User Behavior. 476-482 - Yunsheng Fu, Fang Lou, Fangzhi Meng, Zhihong Tian, Hua Zhang, Feng Jiang:

An Intelligent Network Attack Detection Method Based on RNN. 483-489 - Jingqiang Liu, Zihao Zhao, Xiang Cui, Zhi Wang

, Qixu Liu:
A Novel Approach for Detecting Browser-Based Silent Miner. 490-497 - Guangwei Yang, Haining Yu, Hongli Zhang, Xiangzhan Yu:

A Metadata-Based Representation Method of the Internet of Things. 498-505 - Isaac Amankona Obiri, Yong Wang, Raphael Elimeli Nuhoho, Erick Owiyo:

Authentication of Multiple-User Spatial Keywords Queries. 506-513 - Jinjing Zhao, Ling Pang:

Automated Fuzz Generators for High-Coverage Tests Based on Program Branch Predications. 514-520 - Zhenpeng Zheng, Li Pan, Khouanetheva Pholsena:

Mode Decomposition Based Hybrid Model for Traffic Flow Prediction. 521-526 - Ke Li, Rongliang Chen, Liang Gu, Chaoge Liu, Jie Yin:

A Method Based on Statistical Characteristics for Detection Malware Requests in Network Traffic. 527-532 - Jing Du, Yan Jie, Fujiang Ao, Ying Zhou:

An Improved Uniform Identity Authentication Method Based on SAML in Cloud Environment. 533-536 - Yuhang Wang

, Hongli Zhang, Shen Su, Zhihong Tian:
A Location Privacy-Aware Method for kNN Query in Location Based Services. 537-541 - Kai Xing, Zhen Ding, Shuai Jiang, Xueyan Ma, Kai Yang, Chifu Yang, Xiang Li, Feng Jiang:

Hand Gesture Recognition Based on Deep Learning Method. 542-546 - Chunzhi Yi, Ningling Ma, Chifu Yang, Hao Guo, Jiahong Han, Hefu Gao, Xiang Li, Feng Jiang:

A Novel Automatic Diagnosis Based Physical Therapy for Duchenne Muscular Dystrophy Children. 547-552 - Chenguang Li, Donghao Gu, Xueyan Ma, Kai Yang, Shaohui Liu, Feng Jiang:

Video Frame Interpolation Based on Multi-scale Convolutional Network and Adversarial Training. 553-560 - Yutao Zhang, Junwen Feng, Chenguang Li:

Analysis on the Influence Factors of the Medical Institutions' Medical Efficiency Change in China. 561-568
Data Intelligence and Security Analysis (DISA 2018)
- Jin Xu, Xu Wu, Xiaqing Xie:

Efficient Identity-Based Offline/Online Encryption Scheme for Lightweight Devices. 569-575 - Fanzhi Meng, Fang Lou, Yunsheng Fu, Zhihong Tian:

Deep Learning Based Attribute Classification Insider Threat Detection for Data Security. 576-581 - Chuan Qin

, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Ensemble Steganography. 582-587 - Rui Xu, Xiaojun Chen, Xingxing Wang, Jinqiao Shi:

An In-depth Study of Digits in Passwords for Chinese Websites. 588-595 - Yuhang Xing, Min Li, Litao Wang:

Chaotic-Map Image Encryption Scheme Based on AES Key Producing Schedule. 596-600 - Yu Tai

, Hui He, Weizhe Zhang, Yanguo Jia:
Automatic Generation of Review Content in Specific Domain of Social Network Based on RNN. 601-608 - Hailong Yao, Caifen Wang:

A Novel Blockchain-Based Authenticated Key Exchange Protocol and Its Applications. 609-614 - Guang Yang, Ping Zhang, Jiachen Ding, Honggang Hu:

Advanced Slide Attacks on the Even-Mansour Scheme. 615-621 - Yu Su, Kaiyue Qi, Chong Di, Yinghua Ma, Shenghong Li:

Learning Automata Based Feature Selection for Network Traffic Intrusion Detection. 622-627 - Yichen Li, Yinghua Ma, Mingda Guo, Shenghong Li:

Anomaly Detection for Power Grid Flow Patterns Based on the Multi-restricted Boltzmann Machines. 628-633 - Guanqun Wang, Yunxiao Sun, Qinggang He, Guodong Xin, Bailing Wang:

A Content Auditing Method of IPsec VPN. 634-639 - Jingzhe Zhang, Xuewei Feng, Dongxia Wang, Liang Ming:

Web Service Applying Moving Target Defense. 640-645 - Wei Sun, Jianguo Jiang, Majing Su:

A Passive-Measurement-Guided Tree Network Surveying and Mapping Model. 646-651 - Dayin Zhang, Xiaojun Chen, Dakui Wang, Jinqiao Shi:

A Survey on Collaborative Deep Learning and Privacy-Preserving. 652-658 - Pin Lv, Lingling Bai, Tingwen Liu

, Zhenhu Ning, Jinqiao Shi, Binxing Fang:
Detection of Malicious Domain Names Based on Hidden Markov Model. 659-664 - Erick Owiyo, Yong Wang, Eunice Asamoah, Domnic Kamenyi, Isaac Obiri:

Decentralized Privacy Preserving Reputation System. 665-672
Data Visualization (DV 2018)
- Ankang Li, Xiaoli Hu, Tong Li, Huibing Zhang:

Research on the Prediction Method of Power Battery SOC Based on Deep Learning. 673-679 - Chenxi Dong, Tengfei Xue, Cong Wang:

The Feature Representation Ability of Variational AutoEncoder. 680-684 - Dongzhe Wang, Kezhi Mao

:
Multimodal Object Classification Using Bidirectional Gated Recurrent Unit Networks. 685-690 - Zhuoyuan Zheng, Yunpeng Cai, Yujie Yang, Ye Li:

Sparse Weighted Naive Bayes Classifier for Efficient Classification of Categorical Data. 691-696 - Ruyao Cui, Lei Sun

, Jie Yang, Bo Liu, Yuan Fan:
A Categorically Reweighted Feature Extraction Method for Anomaly Detection. 697-704 - Dongyang Zhao, Jiuming Huang, Yu Luo, Yan Jia:

A Joint Decoding Algorithm for Named Entity Recognition. 705-709 - Liwen Yu

, Chaoli Wang, Shuqun Cheng, Lei Guo:
Establishment of Computer-Aided Diagnosis System for Liver Tumor CT Based on SVM. 710-715 - Jieyun Huang, Yunjia Zhang, Jialai Zhang, Xi Zhang:

A Tensor-Based Sub-Mode Coordinate Algorithm for Stock Prediction. 716-721 - Fang Lv, Junheng Huang, Wei Wang, Guodong Xin, Bailing Wang:

Detecting Pyramid Scheme Accounts with Time Series Financial Transactions. 722-728 - Zhong-min Pei, Ming-hui Xiong, Wei Xiong:

Visualization of Pairwise Data: An Overview. 729-734 - Xiaorui Song, Lingda Wu, Hongxing Hao:

Hyperspectral Image Denoising base on Adaptive Sparse Representation. 735-739 - Yougen Zhang, Yingchun Shi:

Tactical Wireless Network Visualization: Requirements and Representations. 740-743 - Chengxiang Liu, Wei Xiong:

Reasearch on Dynamic Evolution Model Visualization of Satellite Communication Network Based on Complex Network. 744-748 - Yingmei Wei, Xiaolei Du, Dalin Xu, Xianghan Wang:

A Speedup Spatial Rearrangement Algorithm for Dynamic Network Visualization. 749-753 - Fande Yang, Li Qiang:

Generation Framework for Situation Visualization Service from the Perspective of Cognition. 754-759 - Xitao Zhang, Lingda Wu, Zhonghua Yao, Shaobo Yu:

A Multi-layer Network Topology Visualization Layout Based on Louvain Community Detection. 760-763 - Hongxing Hao, Lingda Wu, Ronghuan Yu:

Research on the Technology of Electromagnetic Information Modeling and Visual Analysis. 764-767 - Jiang Zhu, Lingda Wu, Yi Lu, Jiao Jiao, Xiaorui Song:

Convolutional Neural Networks Based for High Spectral Dimensional Data Classification. 768-772
Intelligent System Security (ISS 2018)
- Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han:

A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding. 773-780 - XiaoXuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu:

Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training. 781-787 - Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen:

Intention-Aware Multi-channel Keyword Extension for Content Security. 788-794 - Hengxun Li, Wei Guo, Guoying Wu, Yanxia Li:

A RF-PSO Based Hybrid Feature Selection Model in Intrusion Detection System. 795-802 - Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang:

An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document. 803-810
Multi-source Network Fusion and Analysis (MSNFA 2018)
- Jinlin Wang

, Hongli Zhang, Binxing Fang, Xing Wang, Yuanxin Zhang:
Evaluation on Availability of Entity Information in Cyberspace. 811-818 - Hao Guo, Kai Yang, Xueyan Ma, Kai Xing, Xiaodong Xia, Chifu Yang, Chunzhi Yi, Feng Jiang:

Prediction of Twist Angle for Assistive Exoskeleton Based on EMG Signals. 819-823 - Qinliu Yang, Qunchao Fu, Cong Wang, Jincui Yang:

A Matrix-Based Apriori Algorithm Improvement. 824-828 - Sijia Feng, Hao Chen

, Chun Du, Jun Li, Ning Jing:
A Hierarchical Demand Prediction Method with Station Clustering for Bike Sharing System. 829-836 - Jing Qiu, Yaqi Si, Zhihong Tian:

Automatic Taxonomy Construction for Eye Colors Data without Using Context Information. 837-841 - Ping Wang, Zhongtian Jia, Bo Zhang, Chengbo Xu:

A Pricing Model for Self-Help Investigation Offline Based on Multivariate Linear Regression Analysis. 842-847 - Lingyun Li, Yawei Sun, Xu Han, Cong Wang:

Research on Improve Topic Representation over Short Text. 848-853 - Chunyuan Kang, Tianle Zhang:

Realistic Traffic Data Based Mobility Modeling and Simulation of Smart EV. 854-857 - Tengfei Xue, Yuyu Yuan, Cong Wang:

An Approach for Evaluating User Participation in Bitcoin. 858-864 - Nianwen Ning, Bin Wu, Chengcheng Peng:

Representation Learning Based on Influence of Node for Multiplex Network. 865-872 - Shuqi Yu, Bin Wu:

Exploiting Structured News Information to Improve Event Detection via Dual-Level Clustering. 873-880 - Renjun Chi, Bin Wu, Lin Wang:

Expert Identification Based on Dynamic LDA Topic Model. 881-888
Vulnerability Analysis and Adversarial Learning (VAAL 2018)
- Meiqi Wang, Qingfeng Tan, Xuebin Wang, Jinqiao Shi:

De-anonymizing Social Networks User via Profile Similarity. 889-895 - Wentong Wang, Ning Hu, Xin Liu:

BlockCAM: A Blockchain-Based Cross-Domain Authentication Model. 896-901 - Xiaolin Zhao, Meijing Wu, Qi Zhang, Jingfeng Xue, Yiman Zhang:

A Method of Fast Locating the Key Nodes Based on the Distribution Law of Node's Propagation Domain. 902-909 - Jian Zhang, Luxin Zheng, Liangyi Gong, Zhaojun Gu:

A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation. 910-916 - Ming Hou, Hongli Zhang, Yuhang Wang:

OFC: An Approach for Protecting Location Privacy from Location Provider in Location-Based Services. 917-922 - Liang Ming, Gang Zhao, Minhuan Huang, Ling Pang, Jin Li, Jingzhe Zhang, Dan Li, Shuaibing Lu:

Remote Protocol Vulnerability Discovery for Intelligent Transportation Systems (ITS). 923-929 - Dan Li, Hua Chen, Huayang Cao, Liang Ming:

Data-Driven Vulnerability Pattern Analysis for Fuzzing. 930-935 - Yi-mu Ji, Chen Chen, Shangdong Liu, Fei Wu, Zhiyu Chen, Qiang Bi, Na Wang, Zhipeng Jiao, Yede Qi, Xingwang Yang, Siyang Hou, Xiangyu Cao, Yichao Dong:

Research on Security of Key Algorithms in Intelligent Driving System. 936-942 - Honghao Yang, Dong Liang, Xiaohui Kuang, Changqiao Xu:

A Vulnerability Test Method for Speech Recognition Systems Based on Frequency Signal Processing. 943-947 - Meiqi Wang, Xuebin Wang, Jinqiao Shi, Qingfeng Tan, Yue Gao, Muqian Chen, Xiaoming Jiang:

Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes. 948-955 - Yulu Qi, Rong Jiang, Yan Jia, Aiping Li:

Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation. 956-962 - Rui Jin, Hongli Zhang, Yu Zhang:

The social negative mood index for social networks. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














