default search action
7th DSC 2022: Guilin, China
- 7th IEEE International Conference on Data Science in Cyberspace, DSC 2022, Guilin, China, July 11-13, 2022. IEEE 2022, ISBN 978-1-6654-7480-1
- Ju Yang, Liang Zhou, Le Wang, Shudong Li, Ziqing Lin, Zhaoquan Gu:
A Multi-step Attack Detection Framework for the Power System Network. 1-8 - Kai Chen, Jingxian Zhu, Lansheng Han, Shenghui Li, Pengyi Gao:
A Novel Network Security Situation Awareness Model for Advanced Persistent Threat. 9-16 - Jun-Zheng Yang, Feng Liu, Yuan-Jie Zhao, Lu-Lu Liang, Jia-Yin Qi:
NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model. 17-23 - Quan Hong, Yang Zhao, Jian Chang, Yuxin Du, Jun Li, Lidong Zhai:
Shock Trap: An active defense architecture based on trap vulnerabilities. 24-31 - Jiajia Yi, Meng Li, Kun Xiao, Lirong Chen, Lei Luo, Rui Xu:
Capability-based Component Security Mechanism for Microkernel OS. 32-39 - Runsheng Guo, Qichao Liu, Man Zhang, Ning Hu, Hui Lu:
A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection. 40-47 - Jiaxin Fan, Qi Yan, Mohan Li, Guanqun Qu, Yang Xiao:
A Survey on Data Poisoning Attacks and Defenses. 48-55 - Qian Ke, Chunlu Wang, Haixia Wang, Yongqiang Lyu, Zihan Xu, Dongsheng Wang:
Model Checking for Microarchitectural Data Sampling Security. 56-63 - Yu Zhang, Qingzhong Liu, Yuanquan Shi:
MANAGE: A Novel Malware Evolution Model based on Digital Genes. 64-70 - Zhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang:
Automated Crash Analysis and Exploit Generation with Extendable Exploit Model. 71-78 - Lei Feng, Yuanfei Zhang, Zhiqiang Hao, Chonghua Wang:
WREP: A lightweight event real-time processing engine for IoT. 79-85 - Lingzi Kong, Daoqi Han, Junmei Ding, Mingrui Fan, Yueming Lu:
A Hierarchical Terminal Recognition Approach based on Network Traffic Analysis. 86-93 - Yuqiang Zhang, Zhiqiang Hao, Ning Hu, Jiawei Luo, Chonghua Wang:
A virtualization-based security architecture for industrial control systems. 94-101 - Haitao Zhang, Lei Luo, Ruikun Li, Jiajia Yi, Yun Li, Lirong Chen:
Research and Application of Intelligent Vehicle Cybersecurity Threat Model. 102-109 - Jincai Zou, Zhihan Tan, Yaya Huang, Yixing Chen, Yuqiang Zhang, Ning Hu:
SMRT: An Effective Malicious Node Resistance Design for Mixnets. 110-117 - Yixing Chen, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Yaya Huang, Ning Hu:
Stealth: A Heterogeneous Covert Access Channel for Mix-net. 118-125 - Fashan Dong, Binyue Deng, Haiyang Yu, Wenrong Xie, Huawei Xu, Zhaoquan Gu:
An Asterisk-shaped Patch Attack for Object Detection. 126-133 - Haitian Liu, Rong Jiang, Bin Zhou, Xing Rong, Juan Li, Aiping Li:
Multiple Sequential Network Attacks Detection Based on DTW-HMM. 134-141 - Jinlei Liu, Wenchao Dan, Nuo Cheng, Wenjing Lian, Peirong Qu, Hui Zhang, Yueling Zhang, Jie Wang:
Knowledge Graph of Artificial Intelligence in Medicine: A Scientometric Analysis. 142-153 - Depeng Wang, Yibo Sun, Chen Hong:
End-to-end training image-text matching network. 154-159 - Wei Liu, Yutao Huang, Yibing Guo, Ye Wang, Binxing Fang, Qing Liao:
Topic Modeling for Short Texts Via Dual View Collaborate optimization. 160-166 - Junjian Zhang, Hao Tan, Binyue Deng, Jiacen Hu, Dong Zhu, Linyi Huang, Zhaoquan Gu:
NMI-FGSM-Tri: An Efficient and Targeted Method for Generating Adversarial Examples for Speaker Recognition. 167-174 - Yaya Huang, Yixing Chen, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Ning Hu:
TFHM: A Traffic Feature Hiding Scheme Based on Generative Adversarial Networks. 175-182 - Yixiang Chen, Linhao Ye, Yufeng Ye, Peng Zhang, Qinfeng Tan:
Anomaly Detection from Log Data Sequences with Perturbations. 183-190 - Ruiling Gan, Jiawen Diao, Xiang Cui, Shouyou Song:
A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples. 191-198 - Cheng Fang, Wenjie Mi, Ping Han, Lidong Zhai:
A method of network traffic anomaly detection based on Packet Window Transformer. 199-205 - Shangbin Han, Qianhong Wu, Han Zhang, Bo Qin:
Light-weight Unsupervised Anomaly Detection for Encrypted Malware Traffic. 206-213 - Xiao Gong, Mengwei Li, Zhengbin Zhao, Dengqi Cui:
Research on industrial Robot system security based on Industrial Internet Platform. 214-218 - Yundan Yang, Fenghui Duan, Maosheng Zhang, JunJie Liu, Jin Li, Yueming Lu:
Privacy Protection Management Model for Internet of Things Data. 219-226 - Jinhai Chen, Zheng Gong, Yufeng Tang, Yupeng Zhang, Bin Li:
optimizing Diffusion Layer with AVX Shuffling: A Study on SKINNY. 227-233 - Tong Liu, Zhongru Wang, Yuntao Zhang, Zhehui Liu, Binxing Fang, Zhengyuan Pang:
Automated Vulnerability Discovery System Based on Hybrid Execution. 234-241 - Lang Liu, Yuejiao Wu, Lujun Yin, Junxiang Ren, Ruiling Song, Guoqiang Xu:
A Method Combining Text Classification and Keyword Recognition to Improve Long Text Information Mining. 242-248 - Ziqi Zhu, Bin Zhu, Huan Zhang, Yu Geng, Le Wang, Denghui Zhang, Zhaoquan Gu:
Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise. 249-256 - Hongshun He, Zhipeng Zhang, Lei Yang, Yang Li, Jiakang Shi:
A novel Tri-training algorithm based on Evidence Theory. 257-261 - Hongshun He, Wei Yu, Lei Yang, Yang Li, Luyu Sun:
Anchor graph semi-supervised learning method based on Evidence Theory. 262-267 - Xiaonian Wu, Nian Tong, Ruanlian Zhang, Yongzhuang Wei:
The Power Analysis Based on Mean-Ridge Regression. 268-274 - Jiashun Zhou, Na Wang, Aodi Liu, Xuehui Du:
FAVT: A Feature-Anchored Video Data Trading Mechanism. 275-282 - Zhihan Tan, Yaya Huang, Yixing Chen, Yuqiang Zhang, Jincai Zou, Ning Hu:
A Data Encoding Method for Multipath Anonymous Transmission. 283-290 - Yuanpeng Yang, Hongbo Wang, Xiaofeng Wang, Yuan Liu:
Research on One-way Data Transmission Technology Based on RDMA. 291-298 - Jun Sun, Dong Liu, Yang Liu, Chuang Li, Yumeng Ma:
Research on the Characteristics and Security Risks of the Internet of Vehicles Data. 299-305 - Weiyou Liang, Yujue Wang, Yong Ding, Haibin Zheng, Hai Liang, Huiyong Wang:
An efficient anonymous authentication and supervision system based on blockchain. 306-313 - Kai Chen, Jietong Su, Lansheng Han, Shenghui Li, Pengyi Gao:
Hybrid butterfly optimization algorithm-based support vector machine for botnet command-and-control channel detection. 314-321 - Jun Sun, Yang Li, Ge Zhang, Liangyu Dong, Zitao Yang, Mufeng Wang, Jiahe Cai:
Data traceability scheme of industrial control system based on digital watermark. 322-325 - Tao Liu, Honghao Liang, Xiaowei Chen, Zimeng Li, Lingzi Kong, Jin Li, Yueming Lu:
Design and Implementation of Network Traffic Analysis System for Power Grid Metering System. 326-332 - Chen Guo, Tianxiu Wang, Yang Lin, Hao Chen, Haiyang Yu, Chengwei Zhu, Jing Qiu:
Modeling Unseen Entities from a Semantic Evidence View in Temporal Knowledge Graphs. 333-339 - Lei Chen, Rong Jiang, Changjian Lin, Aiping Li:
A Survey on Threat Hunting: Approaches and Applications. 340-344 - Yu Hu, Ran Li, Simin Wang, Fuqiang Tao, Zhe Sun:
SpeechHide: A Hybrid Privacy-preserving Mechanism for Speech Content and Voiceprint in Speech Data Sharing. 345-352 - Huanyu Chi, Zekun Fei, Peinuo Li, Boyu Yang, Zhi Wang, Li Gu:
LISP-TBCNN: An AutoCAD Malware Detection Approach. 353-359 - Zian Jia, Xiaosu Wang, Yun Xiong, Yao Zhang, Jinjing Zhao:
AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat. 360-366 - Yabin Li, Yuanping Nie, Xiaohui Kuang:
Fuzzing DBMS via NNLM. 367-374 - Qian Yan, Minhuan Huang, Huayang Cao:
A Survey of Human-machine Collaboration in Fuzzing. 375-382 - Hanwen Sun, Yuanping Nie, Xiang Li, Minhuan Huang, Jianwen Tian, Wei Kong:
An Automatic Code Generation Method Based on Sequence Generative Adversarial Network. 383-390 - Ke Yan, Bo Yu, Yong Tang, Xiangdong Kong, Chen Chen, Jin Lei:
NAFuzzer: Augmenting Network Protocol Fuzzers via Automatic Template and Seed Generation. 391-398 - Jiawei Wu, Senyi Li, Junqiang Li, Long Luo, Hongfang Yu, Gang Sun:
DeepCov: Coverage Guided Deep Learning Framework Fuzzing. 399-404 - Feng Li, Fei Shu, Mingxuan Li, Bin Wang:
Network Security Intrusion Detection and Mass Alarms Under Cluster Computing Platform. 405-412 - Weidong Xiao, Xu Zhang, Dongbin Wang:
Cross-Security Domain Dynamic Orchestration Algorithm of Network Security Functions. 413-419 - You Zhai, Hao Dong, Zhoujun Li, Liqun Yang, Longtao He:
AGDB: A Dictionary-based Malicious Domain Detection Method based on Representation Fusion. 420-425 - Kun Guo, Yibo Gao, Dongbin Wang, Hui Zhi, Tao Zhang, Yueming Lu:
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense. 426-431 - Bing Chen, Yaping Liu, Shuo Zhang, Jie Chen, Zhiyu Han:
FLYFDetect: A Smart Home Privacy Protection Framework via Federated Learning. 432-439 - Jiahao Qi, Ziyu Guo, Yueming Lu, Jiaqi Gao, Yihong Guo, Fanyao Meng:
Security Evaluation Model of Blockchain System Based on Combination Weighting and Grey Clustering. 440-447 - Ling Liu, Xin Liu, Yue Zhao, Ning Hu:
TLD-WF: Surfing Freely Under Website Fingerprinting Attacks. 448-454 - Xiaohan Yin, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu:
MASCA: A Multimodal Abstractive Summarization Model Based on Core Words Fusion Attention. 455-461 - Dongye He, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu:
TAFM: Topic-Attention FM-encoder for Text Generation. 462-469 - Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu:
Adversarial Example Attacks against ASR Systems: An Overview. 470-477 - Liang Li, Liqun Gao, Feng Xie, Bin Zhou:
Prediction of Real Popularity based on Sample Debias. 478-482 - Tuwen Guo, Xi Zhang, Lirong Qiu:
Leveraging Multi-aspect Semantics for Conversation Structure Modeling. 483-490 - Yunfan Tian, Dongxin Liu, Laifu Wang, Bowen Hu:
A combined-CNN model of TLS Traffic Recognition and Classification. 491-497 - Yang Lv, Shaona Qin, Zifeng Zhu, Zhuocheng Yu, Shudong Li, Weihong Han:
A Review of Provenance Graph based APT Attack Detection: Applications and Developments. 498-505 - Haitao Zhang, Lei Luo, Yun Li, Lirong Chen, Xiaobo Wu:
A Novel Framework For Malicious Encrypted Traffic Classification At Host Level And Flow Level. 506-511 - Yangyang Mei, Weihong Han, Shudong Li, Xiaobo Wu, Kaihan Lin, Yulu Qi:
A Review of Attribution Technical for APT Attacks. 512-518 - Jiahui Zheng, Junjian Li, Chao Li, Ran Li:
A SQL Blind Injection Method Based on Gated Recurrent Neural Network. 519-525 - Jie Lu, Yong Ding, Zhenyu Li, Chunhui Wang:
A timestamp-based covert data transmission method in Industrial Control System. 526-532 - Maosheng Zhang, Ruohan Cao, Fenghui Duan, Yundan Yang, Yueming Lu, Man Zhang, Xu Lu:
Research on Lightweight Blockchain Technology Based on Edge Computing. 533-539 - Fenghui Duan, Yundan Yang, Maosheng Zhang, Songqi Wu, Yueming Lu, Man Zhang, Xu Lu:
Access Control Mechanism for Edge Nodes. 540-547 - Jun Li, Xueying Qiu, Lingchen Li, Chenghui Zhu, Xiaonian Wu:
New Integral distinguishers for I - Present™, TANGRAM and CHAM. 548-555 - Jun-Zhu Zhang, Yu-Gao Zheng:
Display Design Based on Virtual Reality Technology VR-Platform Platform. 556-563 - Haoran Ma, Zhaoyun Ding:
Research on Multi-Model Fusion for Named Entity Recognition Based on Loop Parameter Sharing Transfer Learning. 564-569 - Zhang Ying:
Classification of Diabetic Retinopathy Based on B-ResNet. 570-575 - Qi Yan, Jiaxin Fan, Mohan Li, Guanqun Qu, Yang Xiao:
A Survey on Knowledge Graph Embedding. 576-583 - Feng Ye:
Image Art Innovation based on Extended Reality Technology. 584-587 - Ling Zou, Jing Li:
Application of Virtual Simulation in Digital Exhibition and Performance. 588-591 - Quanzhong Mao, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu:
SATMask: Spatial Attention Transform Mask for Dense Instance Segmentation. 592-598 - Qian Zhou, Hua Dai, Liang Liu, Kai Shi, Jie Chen, Hong Jiang:
The final security problem in IOT: Don't count on the canary! 599-604 - Yunjie Tang, Kai Sun, Danhuai Zhao, Yan Lu, Jiaju Jiang, Hong Chen:
Industrial Defect Detection Through Computer Vision: A Survey. 605-610 - Yichuan Wu, Meng Guo, Lei Yang, Wei Yu:
VCFN-Video Computing Force Network. 611-615 - Ge Zhang, Zheyu Zhang, Jun Sun, Zun Wang, Rui Wang, Shirui Wang, Chengyun Xie:
10 Gigabit industrial thermal data acquisition and storage solution based on software-defined network. 616-619 - Yuewu Lian, Haitao Zhan, Peiheng Zhang, Mingwu Zhang:
Time-Lock Encryption for Multiple Consecutive Periods and its Application. 620-626 - Meng Zhao, Yong Ding, Tong Zhang, Xiaochun Zhou:
Secure outsourced VANET data in clouds with designated supervisor. 627-632 - Riming Wu, Yiliang Han, Kaiyang Guo, Kai Liu:
Information dissemination model of recommendation platform based on network community. 633-641 - Yichuan Wu, Jianping Zheng, Meng Guo:
A Novel Mobile Instant Messaging System. 642-645 - Jie Chen, Yaping Liu, Shuo Zhang, Zebin Guo, Bing Chen, Zhiyu Han:
DESEND: A Fast Device Event Signature Extraction And Detection Method for Smart Home. 646-652
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.