default search action
9th DSC 2024: Jinan, China
- 9th IEEE International Conference on Data Science in Cyberspace, DSC 2024, Jinan, China, August 23-26, 2024. IEEE 2024, ISBN 979-8-3503-9136-7
- Hua Huang, Hua Sheng, Xingwang Han, Wenbin Zhang, Zilin Zhao:
Visual malware classification and detection method based on convolutional neural network. 1-8 - Gaolei Du, Yunge Sun, Junpeng Qu, Yong Fu:
An automated construction method for symmetric encryption round function models based on dynamic analysis. 1-6 - Yunge Sun, Gaolei Du, Junpeng Qu, Yong Fu:
An Encryption Algorithm Cycle Identification Method Based on Bit Execution. 7-12 - Huynh Thanh Thien Pham, Frank Jiang, Alessio Bonti, Lei Pan, Junyu Lu, Mohamed Almorsy Abdelrazek:
Towards Blockchain Services Marketplace for More Efficient Blockchain Development. 13-23 - Caiyan Tang, Qi Cai, Chengzu Dong, Qin Wang, Shiping Chen, Mingyue Jiang:
An Empirical Case Study of Meta-IP Chain DAO: The Pioneer Tokenless DAO. 24-31 - Junpeng Qu, Gaolei Du, Yunge Sun, Yong Fu:
Dynamic detection technology of encryption algorithm based on Pin. 32-37 - Yong Ding, Enchang Yuan, Changsong Yang, Hai Liang, Huiyong Wang, Xinyong Peng:
An Efficient and Privacy-Preserving Load Monitoring and Billing Scheme in Smart Grid. 38-45 - Changsong Yang, Sirui Huang, Yong Ding, Hai Liang, Siyuan Jia, Xinyong Peng:
A Perturbation-Based Privacy Leakage Defense Method for Federal Learning. 46-52 - Haibo Cheng, Wenjian Liu, Youyang Qu, Kexue Fu, Qinyuan Wang:
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges. 53-60 - Hui Xiang, Yifan Wu, Xuebin Wang, Jinqiao Shi, Can Zhao, Jiapeng Zhao:
Identifying Data Breaches in Dark Web through Prompt Active Learning. 61-68 - Changjian Li, Kai Chen, Han Yu, Yinxuan Huang, Xuechen Zhao, Jianfeng Zhang, Aiping Li:
Learning to Distinguish Entities Overlapping for Open Relation Extraction*. 69-76 - Wenbo Zhang, Lei He, Tao Shi, Shuang Gao, Yichen Zhao, Xing Wang, Lumin Xing, Yongmeng Li:
Research on Key Technologies of Intelligent Management Platform for Medical Care Objects Based on Internet of Things and Digital Twins. 77-84 - Zilong Chen, Li Xu, Mohan Li, Yanbin Sun:
Smart Grid Attack Region Partitioning Strategy Based on Node Importance. 85-92 - Jie Yao, Funing Xiang, Xuemei Wei, Kun Yuan:
NEF-GGCN: Node-Edge Fusion Gated Graph Convolutional Networks For Skeleton-based Medical Action Recognition. 93-100 - Liancheng Xu, Xiaoqi Wu, Xiaoxiang Wang, Xinhua Wang:
Causal Attention Group Recommendation Integrating Social Information. 101-108 - Jinchen Shi, Yang Fang, Zhen Tan, Hui Yang, Xiang Zhao:
Community partition based source localization in early time. 109-115 - Zhitong Liu, Zhiqiang Zhang, Mengqing Cheng, Haonan Tan, Xinyao Tan, Le Wang:
SLX: A Multi-class Network Intrusion Detection Method on Stacking Boosting Algorithm. 116-121 - Chenyun Duan, Lei Du, Liyi Zeng, Zhaoquan Gu:
Vehicle Network Intrusion Detection Based on K-nearest Neighbor Variational Autoencoder Using Contrastive Learning. 122-129 - Xinyu Zhang, Junmei Ding, Yueming Lu:
Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis. 130-137 - Chengyi Wang, Jinyin Chen, Haibin Zheng, Xuhua Pan:
SEAD: Self-aware Adversarial Detection for Black-box Reinforcement Learning. 138-145 - Yuting Zhou, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu:
An Abnormal Behavior Detection Method Based on User Behavior Correlation Feature Sequence Modeling. 146-153 - Chengyue Wang, Yang Liu, Yaojun Qiao, Daoqi Han, Yueming Lu:
Optimization Design of Network Attack and Defense Scenarios in Intelligent Clusters. 154-161 - Dong Liu, Zhicheng Liu, Yang Liu, Biqing Qiu, Shirui Wang:
Research on automobile data security risk analysis based on TARA method. 162-170 - Junzhe Dong, Shuo Geng, Xiong Zhang:
An Intelligent Retrieval System for Similar Information System Vulnerabilities Based on Knowledge Graph. 171-176 - Hanjin Tong, Tianqing Zhu, Faqian Guan, Wanlei Zhou:
Defense Against Graph Injection Attack in Graph Neural Networks. 177-187 - Xing Zou, Ning Hu:
Cyber-Range: the Scientific Infrastructure for Cyberspace Security Research. 188-195 - Lai Jiang, Conghui Zheng, Xiaohan Zhang, Fuhui Sun, Xiaoyan Wang, Pan Li:
Leveraging LLM based Retrieval-Augmented Generation for Legal Knowledge Graph Completion. 196-203 - Yibin Fu, Zhaoyun Ding, Xiaojie Xu:
LLM & Bagging for 1-shot Joint IE. 204-208 - Jiaqi Si, Xiaoye Ouyang, Xiaoling Zhu, Yi Zhang:
A Relation Semantic Enhancement Method for Large Language Model Based Knowledge Graph Completion. 209-215 - Lu Ou, Xiaoya Ni, Wei Wu, Zhihong Tian:
CyGPT: Knowledge Graph-Based Enhancement Techniques for Large Language Models in Cybersecurity. 216-223 - Hongfan Chen, Yigang Diao, Hui Xiang, Yixuan Huo, Xiaqing Xie, Jiapeng Zhao, Xuebin Wang, Yanwei Sun, Jinqiao Shi:
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web. 224-231 - Zilong Chen, Peng Zhang, Mingyang Xu, Xingjian Gao, Dan Liu, Xuebing Luo, Rencheng Huang, Tao Zhang:
LocatingGPT: A multi-modal document retrieval method based on retrieval-augmented generation. 232-239 - Xu Yang, Lijuan Sun, Yutong Gao, Sanchuan Guo, Xu Wu:
A Method for Generating Medical Text Data by Integrating Spatiotemporal Attributes and Implicit State Transitions. 240-246 - Haoyuan Zeng, Bo Qiao, Ye Wang, Bin Zhou:
Hate Speech Detection in Network Perception Constrained Scenarios. 247-254 - Yuliang Wei, Qi Li, Yang Liu, Chang Sun, Yongzheng Zhang:
StanceDigger: Achieving Efficient Text Stance Detection with Collaborative Attention and Consistent Learning. 255-262 - Yashen Wang, Xiaoling Zhu, Tianzhu Chen, Yi Zhang:
An Aggregation Procedure Optimization Method by Leveraging Neighboring Prompt for GCN-based Knowledge Graph Completion Model. 263-270 - Yao Lin, Dong Zhu, Chenhui Zhang, Zhiqiang Zhang, Le Wang:
Spherical Hierarchical Knowledge Graph Embeddings for Cybersecurity Knowledge Graph Completion. 271-278 - Cui Luo, Haiyan Wang, Huaping Yuan, Zhaoqian Gu, Ning Hu:
A novel method of cybersecurity knowledge graph construction and storage optimization based on cyber range. 279-286 - Lei He, Wenbo Zhang, Tao Shi, Yichen Zhao, Xing Wang, Lumin Xing, Yongmeng Li:
Knowledge Graph Construction in the Context of Traditional Chinese Medicine: A review. 287-293 - Weijie Deng, Zhaoyun Ding, Junqi Chen, Yi Wang:
Research on entity extraction method for rehabilitation medicine knowledge management. 294-299 - Jiarui Li, Lei Du, Yilu Chen, Liyi Zeng, Hao Li, Zhaoquan Gu:
CIL4EMTD: A Novel Class Incremental Learning Method for Encrypted Malware Traffic Detection. 300-307 - Jianbo Qin, Yi Wang, Zhaoyun Ding:
Weapon Target Assignment Based on Deep Q-learning. 308-313 - Weixuan Sun, Jiuyang Tang, Yang Fang, Jinqiu Hong, Hao Xu, Mao Wang:
Multi-Behavior Hypergraph Contrastive-Enhanced Transformer for Recommender Systems. 314-321 - Yinghui Xu, Haonan Tan, Jianyu Deng, Le Wang:
Node Fragility Reward Shaping Based on Reinforcement Learning in Intranet Penetration Scenario. 322-328 - Yidong Chai, Yi Liu, Mohammadreza Ebrahimi, Weifeng Li, Balaji Padmanabhan, Yuanchun Jiang, Yezheng Liu:
Enhancing Adversarial Robustness: A Novel Bayesian Uncertainty-Based Ensemble Learning Method. 329-336 - Yuankun Liu, Lumin Xing, Di Wang, Xin Nie, Xueyan Zhang, Di Wu, Wenjian Liu:
An Early Detection Model of Prostate Cancer Based on MRI. 337-344 - Hongpeng Wang, Duanfa Wang, Zhiqin Wang, Chenglong Li:
Enhancing CLAHE with Interval-Valued Fermatean Fuzziness for Robust Low-Light Image Enhancement. 345-353 - Chenqing Guo, Jinxin Zuo, Yueming Lu, Weixuan Xie:
Reliability Measurement Of Vehicle Sensor Data Based On Historical Perception. 354-361 - Feixiang Shu, Lai Jiang, Conghui Zheng, Fuhui Sun, Xiaoyan Wang, Pan Li:
ST-LadderNet: Spatial-Temporal Correlation Stepply Enhanced Deep Learning Model for Urban Traffic Predicting. 362-369 - Y. Neil Qu, Zonghao Ji, Lei Cui, Chong Zhang, Lei Liu, Zhiyi Tian:
Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial Testing. 370-377 - Xingyu Liu, Xiaozhen Liu, Kegang Hao, Ke Wang, Xinglong Chen, Weina Niu:
HGNNDroid: Android Malware Detection Based on Heterogeneous Graph Neural Network. 378-384 - Sijun Li, Jianqi Wang, Eric Li, Daren Liu, Yi Li:
The Ecological and Financial Impact Study of Electric Bus Transition. 385-391 - Biqing Qiu, Dong Liu, Shunchao Cao, Chunxu Mu, Shen Yan, Yang Liu:
Risk Analysis and Protection Suggestions for Artificial Intelligence Data Security. 392-398 - Dongzhi Ge, Lidong He, Zhengguo Bian:
Multi-agent Assignment via Growth Assignment Algorithm. 399-405 - Fei Shang, Weixiang Zhao, Jingyang Wen, Xiangui Kang, Z. Jane Wang:
INN-based Robust JPEG Steganography Through Cover Coefficient Selection. 406-413 - Sizheng Wu, Jun Li, Chao Li, Yawei Ren, Liyan Shen:
A Universal Semantic-Based Method for Backdoor Attack. 414-420 - Yuecheng Wen, Xiaotong Li, Haiqing Lv, Menglu Wang, Wenbo Zuo:
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression. 421-427 - Xinxu Weng, Yuqing Wang, Shijing Weng, Juan Xiong, Lei Weng:
Bibliometric Analysis of Large Language Model Artificial Intelligence Based on Knowledge Graph. 428-434 - Yanan Du, Xiaoli Zha, Min Li, Yueli Song:
Online Health Information Adoption Behavior of Chronic Disease Patients. 435-440 - Lei Chen, Yilu Chen, Chenwei Liu, Wenying Feng:
An Encrypted Malicious Traffic Detection Method Based on Deeper Protocol Features. 441-445 - Songming Han, Ying Ling, Ming Xie, Shaofeng Ming, Fuchuan Tang:
A Data Dimensionality Reduction Method Based on Stacked Auto-Encoders with Self-Attention. 446-451 - Yuanyuan Guo, Xianqiang Zhu, Qianzhen Zhang, Bin Liu:
A Time-tightly Coupled UAV Control Scheduling Scheme. 452-456 - Zelin Wei, Qiwei Chen, Rui Weng:
Building an autonomous driving platform based on ROS and its safety analysis. 457-463 - Niuniu Zhang, Guohe Feng:
Analysis of Big Data Research Hotspots Based on Keyword Co-occurrence. 464-471 - Fangliao Yang, Shi Zhu, Mingguang Li, Lailong Luo, Bangbang Ren, Yuhui Cai:
Intelligent Recognition Model for IoT Terminal Devices Based on Message Business Logic Features. 472-478 - Tianfu Xu, Tianzhe Li, Qun He, Zhiyuan Luo, Naqin Zhou, Haoqin Chen, Rixuan Qiu:
Trapping resource orchestration scheme based on electric power environment. 479-486 - Songming Han, Ying Ling, Ming Xie, Shaofeng Ming:
Automatic Classification Based on the LSTM-SiTGRU Model for Plaintext and Ciphertext. 487-494 - Xuhua Ai, Yiting Huang, Yuan Yin, Yun Dong, Qi Meng, Denghao Tu, Liyuan Zhang:
Anonymous Smart Grid System Based on Revocable Ring Signatures. 495-500 - Jiahan Dong, Tong Jin, Xiaohu Wang, Guangxin Guo, Qihang Zhou:
Research on fault early warning of industrial control system based on TCN-MKELM. 501-506 - Honglei Yao, Donglan Liu, Yingxian Chang, Xin Liu, Chaofan Tang:
Time Series Anomaly Detection Based on Normalized Flow and Bayesian Networks. 515-522 - Yukun Zhang, Xiaoli Qin, Yanzhao Tian, Shenjian Xiao:
Research on Classification and Grading of Cross-Border Data in Free Trade Port Construction. 533-540 - Lei Li, Shichao Zhang, Xin Liu, Donglan Liu, Rui Wang, Fangzhe Zhang, Fuhui Zhao, Shanjie Xu:
Knowledge Base-Guided Modeling of ICS Device Behavior for Status Prediction. 541-548 - Ting Wang, Qian Zhao, Sen Wang, Changqiang Jing:
Research on Stochastic Feature Selection Optimization Algorithm Fusing Symmetric Uncertainty. 549-554 - Mingqian Yang, Wei Peng, Xiaowei Song, Xiting Ma, Ling Liu, Ning Hu:
SDCRT: An Anonymous Communication Network Routing Algorithm Based on SDN Architecture. 555-562 - Shuang Zhou, Zhigang Liu, Jian Liu, Han Jiang:
Secure Two-party Newton Interpolation. 563-566 - Rui Liang, Hanchong Zhang, Fuqiang Liu, Jinyun Zhang, Zhe Sun, Yanfei Song, Chao Li, Liang Zhang:
Encrypted Malicious Traffic Detection Based on Sample Selection Optimization and Data Augmentation. 567-574 - Xiaowei Song, Mingqian Yang, Wei Peng, Mengen Liang, Ling Liu, Ning Hu:
CloudNet: Building a Data-Plane for Anonymous Communication Network Based on Cloud Service. 575-582 - Wei Peng, Xiaowei Song, Mingqian Yang, Mengen Liang, Rui Wu, Ning Hu:
Conduit: An IPFS-based Hidden Access Channel for Mix-net. 583-590 - Lianhai Wang, Tianrui Liu, Yingxiaochun Wang, Xinlei Wang, Qi Li:
Reputation based Adaptive Federated Learning in Medical Scenarios. 591-598 - Yunhao Xu, Chao Li, Daiqi Gu, Zhewei Zhang, Zhe Sun, Yanfei Song:
A Novel Method for Honeypot Anti-Identification against Modbus Fuzz Testing in Industrial Control Systems. 599-606 - Lianhai Wang, Xinlei Wang, Tianrui Liu, Yingxiaochun Wang, Qi Li:
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction. 607-614 - Haozhan Gu, Hangwei Tian, Jingchun Wang, Yumei Li:
A Short-Term Electric Load Forecasting Method Based on the Fusion of Global and Local Features. 615-620 - Kuan Liu, Yumei Li, Yuanhua Qi, Ning Qi, Mengran Zhai:
Text Information Mining in Cyberspace: An Information Extraction Method Based on T5 and KeyBERT. 621-628 - Wenqi Zheng, Hao Ren, Siqi Yang, Zhi Chen, Jiajun Xie, Wenqiang Pan:
Networked Vehicle Practices Based on Networked Firing Ranges. 629-634 - Zhitao Yu, Peng Sun, Mingle Zhou, Qianlong Liu, Shilong Zhao:
Research on liquid crystal display technology based on regional dynamic dimming algorithm. 635-640 - Wei Li, Can He, MingLe Zhou, Hengyu Zhang, Wenlong Liu:
Ultra-high definition video quality assessment method based on deep learning. 641-646 - Wang Li, Hengyu Zhang, Hongze Xie, Xikai Ding, Qianlong Liu:
Incorporate Data Elements into the Digital Evaluation System of the NewEra. 647-651 - Jinyang Sun, Dongdong Peng, Zhe Lu, Mengran Zhai, Ning Qi, Yuanhua Qi:
Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization - - Taking Standardization Practice in Shandong Province as an Example. 652-659 - Yihong Li:
Security and Privacy of Artificial Intelligence with Ethical Concerns. 660-667 - Mingxi Ji, Xueping Gu, Qinghong Guo, Xikai Ding:
Research on Government Data Governance in the Era of Large Language Model. 668-671 - Zirui Xu, Jinyang Sun, Zhe Lu, Delong Han:
Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government. 672-676 - Min Li, Delong Han, Rui Shao, Jinghui He:
Feature Aggregation Network for Memory-Based Industrial Anomaly Detection. 677-683 - Yonghao Yu, Yongde Guo, Dawei Zhao, Kexue Fu, Yongwei Tang, Qinyuan Wang:
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding. 684-690 - Xia Wu, Zehan Li, Zijun Hu, Qing Zhao, Hangyu Hu:
Aligning Users Across Social Networks Based on Hypergraph Embedding. 691-698 - Xin Li, Zhaoyang Qu, Tong Yu, Ming Xie, Fu Yu, Wei Ding:
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex Networks. 699-705 - Qinyuan Wang, Bruce Gu, He Zhang, Yunfeng Li:
Fairness of Large Music Models: From a Culturally Diverse Perspective. 706-712 - Hao Ren, Zeyu Luo, Fengshi Jing, Xinyue Zhang, Han He, Yonghao Yu, Dawei Zhao:
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNet. 713-719 - Xiaodong Wang, Sazia Parvin, Sitalakshmi Venkatraman, Kiran Fahd, Amjad Gawanmeh:
Scalable and Feasible Honeypot Solution for SMEs in Cloud Environments. 720-725 - Thang V. Q. Le, Dinh-Hong Vu, Van Huy Pham, Anh-Cuong Le, Nguyen P. Nguyen:
A Framework for Vietnamese Question-Answering in Law Domain. 726-731 - Ling Wang, Haoyu Hao, Xue Yan, Xiwei Wang, Tie Hua Zhou, Keun Ho Ryu:
Multiple Knowledge Graphs Semantic Interaction based on Graph Embedding and Matching Processing. 732-737 - Tie Hua Zhou, Xiuting Jia, Xirao Xun, Tianshuo Bi, Ling Wang:
Knowledge Points Semantic Classification Method based on Graph Embedding over Co-word Networks. 738-743 - Huilin Zheng, Yingyi Liang, Daming Zhang, Kai Shi, Luxi Dong, Xiaolan Xie:
Deep Learning-based Mortality Prediction of COVID-19 Patients with Cardiovascular Disease. 744-749 - Battogtokh Azzaya, Sambuu Uyanga, Namsrai Oyunerdene:
Solution for prediction of customer behavior in call center systems. 750-753 - Delgermaa Gankhuyag, Uyanga Sambuu, Enkhtuul Bukhsuren, Buyankhishig Bold:
A Model for Evaluating a Digital Transformation of Rural Areas of Mongolia. 754-761 - Lidi Wu, Yang Liu, Jiale Yang, Yongjun Piao:
A prognostic model based on five characteristic genes to predict the prognosis of patients with hepatocellular carcinoma. 762-769 - Yan Yan, Yukun Wang, Yiru Da, Yongjun Piao:
Single-cell RNA sequencing analysis reveals transcriptional dynamics of immune cells during ovarian cancer metastasis. 770-777 - Ha Ye Jin Kang, Min Sam Ko, Kwang Sun Ryu:
Generation of Synthetic Data for Sharing and Utilization in Healthcare Data. 778-781 - Junwei Hu, Yule Zhang, Yongjun Piao:
Deciphering Myopia: Insights From Single-Cell Data and Machine Learning Approaches. 782-788 - Javkhlan Rentsendorj, Lkhamrolom Tsoodol, Munkhtsetseg Namsraidorj, Oyun-Erdene Namsrai:
Digital Contracts: A Sustainable and Secure Solution for Modern Businesses -A Case Study of E-Geree.mn in Mongolia. 789-792 - Yu Wang, Meijing Li, Runqing Huang:
Data Augmentation Based on Word Importance and Deep Back-Translation for Low-Resource Biomedical Named Entity Recognition. 793-797 - Sumiyakhand Dagdanpurev, Darkhijav Davaasuren, Adiyabat Enkhjargal, Amartuvshin Renchin-Ochir:
A new approach for non-contact, automated measurement of respiration rate using structured light. 798-801 - Xueying Zhai, Yunfeng Peng, Xiuping Guo, Liang Zhang, Wei Zhang:
Demand Response Scheme: Achieving Sustainability in Distributed Data Processing. 802-809 - Trung-Phien Nguyen, Van-Dung Hoang, Minh-Luan Su, Thi-Nhat-Vy Nguyen, Trong-Tri Bui, Ba-Duy Nguyen:
Improving Skin Lesion Classification based on Fusion Multi-Learning Models. 810-817 - Baatarbileg Altangerel, Tulgaa Purevsuren, Oyun-Erdene Namsrai:
Managing concurrent course selection requests in a web-based university management system. 818-820 - Lkhamrolom Tsoodol, Munkhnasan Tuvdendorj, Javkhlan Rentsendorj, Oyun-Erdene Namsrai:
Implementing Unified Identity and Access Management System: Case Study for the National University of Mongolia. 821-824 - Oyundolgor Khorloo, Enkhbayar Altantsetseg:
Cultural Heritage Education in the Metaverse. 825-831
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.