default search action
3rd DSC 2018: Guangzhou, China
- Third IEEE International Conference on Data Science in Cyberspace, DSC 2018, Guangzhou, China, June 18-21, 2018. IEEE 2018, ISBN 978-1-5386-4210-8
- Yue Zhao, Zhouguo Chen, Hong Su, Enbo Sun, Yubin Guo, Jianwei Ding:
A Position-Based Secure Fast Handover Mechanism for High-Speed Trains. 1-6 - Fulian Yin, Yiming Ma, Congcong Zhang, Jinbao Song:
The Research about Public Sentiment Differences between the Belt and Road Countries on China's Hot Issues. 7-14 - Junhan Zhao, Xiang Liu, Yanqun Kuang, Yingjie Victor Chen, Baijian Yang:
Deep CNN-Based Methods to Evaluate Neighborhood-Scale Urban Valuation Through Street Scenes Perception. 20-27 - Xiaodong Yang, Likun Xiao, Yutong Li, Shudong Li, Jinli Wang, Chunlin Chen:
Identity-Based Blind Proxy Re-Signature Scheme for Data Security. 28-32 - Zhen Ding, Chifu Yang, Kai Xing, Xueyan Ma, Kai Yang, Hao Guo, Chunzhi Yi, Feng Jiang:
The Real Time Gait Phase Detection Based on Long Short-Term Memory. 33-38 - Yan Jia, Lu Deng, Bin Zhou, Binxing Fang, Weihong Han, Aiping Li, Qiang Liu, Yong Quan:
Topic Analysis Model for Online Social Network. 39-44 - Fang Zhang, Xiaochen Wang, Jingfei Han, Jie Tang, Shiyin Wang:
Fast Top-k Area Topics Extraction with Knowledge Base. 45-52 - Tiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang:
The Coming Era of AlphaHacking?: A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques. 53-60 - Yan Jia, Qiang Liu, Binxing Fang, Bin Zhou, Lu Deng, Yong Quan:
Virtual Community Detection Model and Related Research in Online Social Networks. 61-68 - Bengong Yu, Qingtang Xu, Peihang Zhang:
Question Classification Based on MAC-LSTM. 69-75 - Zeshan Peng, Wenbo Wang, Bitty Balducci, Detelina Marinova, Yi Shang:
Toward Predicting Communication Effectiveness. 76-83 - Xiaolong Yang, Mengce Zheng, Honggang Hu:
Generic Generating Functions for the Counting Functions of Quadratic Functions with Prescribed Walsh Spectrum. 84-91 - Zhinming Ding, Fujie Ren, Zhi Cai, Yang Cao:
Urban Road Congestion Condition Discrimination Research Based on Vector Features. 92-98 - Hao Wang, Wentao Ouyang, Huawei Shen, Xueqi Cheng:
ULE: Learning User and Location Embeddings for POI Recommendation. 99-106 - Hanpin Wang, Zhao Jin, Lei Zhang, Yuxin Jing, Yongzhi Cao:
Reasoning about Cloud Storage Systems. 107-114 - William Morrison, Luke M. Guerdan, Jayanth Kanugo, Timothy Trull, Yi Shang:
TigerAware: An Innovative Mobile Survey and Sensor Data Collection and Analytics System. 115-122 - Geng Li, Yichen Qian, Lili Liu, Yang Richard Yang:
JMS: Joint Bandwidth Allocation and Flow Assignment for Transfers with Multiple Sources. 123-130 - Yichun Duan, Guopeng Zhou, Yuanxing Zhang, Zhaoqian Lan, Chunhua Chi, Wei Yan:
Neural Network Based Clinical Treatment Decision Support System for Co-existing Medical Conditions. 131-138 - Dong Ye, Sheng Zhang, Hui Wang, Jiajun Cheng, Xin Zhang, Zhaoyun Ding, Pei Li:
Multi-level Composite Neural Networks for Medical Question Answer Matching. 139-145 - Kun Qin, Lei Sun, Bo Liu, Yuan Fan, Kar-Ann Toh:
A Robust Change-Point Detection Method by Eliminating Sparse Noises from Time Series. 146-152 - Handong Cui, Delu Huang, Yong Fang, Liang Liu, Cheng Huang:
Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm. 153-160 - Yifan Zhang, Kan Zhang, Xinyi Zou:
Structural Brain Network Mining Based on Core Theory. 161-168 - Yu Wu, Li Pan:
Privacy-Aware Personal Information Propagation Management in Social Networks. 169-174 - Khouanetheva Pholsena, Li Pan:
Traffic Status Evaluation Based on Possibilistic Fuzzy C-Means Clustering Algorithm. 175-180 - Di Wu, Binxing Fang, Jie Yin, Fangjiao Zhang, Xiang Cui:
SLBot: A Serverless Botnet Based on Service Flux. 181-188 - Jingqiang Liu, Bin Li, Lizhang Chen, Meng Hou, Feiran Xiang, Peijun Wang:
A Data Storage Method Based on Blockchain for Decentralization DNS. 189-196 - Zhaopeng Jia, Xiang Cui, Qixu Liu, Xiaoxi Wang, Chaoge Liu:
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers. 197-204 - Jiuhong Xiao, Weiping Wang, Meiqi Wang:
Image Encryption Algorithm Based on Memristive BAM Neural Networks. 205-212 - Xiaoyun Li, Xiang Cui, Limin Shi, Chaoge Liu, Xiaoxi Wang:
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model. 213-218 - Chaoge Liu, Xiang Cui, Zhi Wang, Xiaoxi Wang, Yun Feng, Xiaoyun Li:
MaliceScript: A Novel Browser-Based Intranet Threat. 219-226 - Zihan Wang, Xu Wu, Chaoge Liu, Qixu Liu, Jialai Zhang:
RansomTracer: Exploiting Cyber Deception for Ransomware Tracing. 227-234 - Chaoyang Li, Zhengyang Song, Jie Tang:
User Tagging in MOOCs Through Network Embedding. 235-241 - Yan Li, Peiyi Han, Chuanyi Liu, Binxing Fang:
Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis. 242-249 - Tianshu Li, Zhaoquan Gu, Xiao Lin, Shudong Li, Qingfeng Tan:
Approximation Algorithms for Controller Placement Problems in Software Defined Networks. 250-257 - Dongxiang Zhang, Mingtao Lei, Xiang Zhu:
SAQP++: Bridging the Gap between Sampling-Based Approximate Query Processing and Aggregate Precomputation. 258-265 - Zhaoquan Gu, Yongcai Wang, Jing Qiu, Lihua Yin, Zhihong Tian:
How to Control Target Nodes in Dynamic Networks. 266-273 - Fang Liu, Li Pan, Lihong Yao:
Evolutionary Game Based Analysis for User Privacy Protection Behaviors in Social Networks. 274-279 - Lihao Nan, Dacheng Tao:
Bitcoin Mixing Detection Using Deep Autoencoder. 280-287 - Wen Diao, Yuanxin Wu, Weiming Zhang, Bin Liu, Nenghai Yu:
Robust Audio Watermarking Algorithm Based on Air Channel Characteristics. 288-293 - Yuanxing Zhang, Kaigui Bian, Lin Chen, Shaoling Dong, Lingyang Song, Xiaoming Li:
Early Detection of Rumors in Heterogeneous Mobile Social Network. 294-301 - Zhongwen Zhao, Zhangyuan Li, Huanghuang Guo, Miaoben Yang:
Research on Vulnerability of Space Information Network Based on Interdependent Networks. 302-309 - Mingyuan Ma, Dongyang Zhao:
Stochastic Alternating Direction Method of Multipliers with Conjugate Gradient. 310-316 - Yang Liu, Peng Sun, Max R. Highsmith, Nickolas M. Wergeles, Joel Sartwell, Andy Raedeke, Mary Mitchell, Heath Hagy, Andrew D. Gilbert, Brian Lubinski, Yi Shang:
Performance Comparison of Deep Learning Techniques for Recognizing Birds in Aerial Images. 317-324 - Zhangkai Zhang, Zhoujun Li, Chunhe Xia, Jinhua Cui, Jinxin Ma:
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices. 325-332 - Qing Miao, Yuanyuan Qiao, Jie Yang:
Research of Urban Land Use and Regional Functions Based on Mobile Data Traffic. 333-338 - Xiaochen Wang, Wenzheng Feng, Jie Tang, Qingyang Zhong:
Course Concept Extraction in MOOC via Explicit/Implicit Representation. 339-345 - Zhaoqian Lan, Guopeng Zhou, Yichun Duan, Wei Yan:
AI-Assisted Prediction on Potential Health Risks with Regular Physical Examination Records. 346-352 - Yejun Zhou, Lede Qiu, Hang Yu, Chunhui Sun:
Study on Security Technology of Internet of Things Based on Network Coding. 353-357 - Chen-Yi Lin, Yuan-Chen Wang, Wan-Tian Fu, Yun-Sheng Chen, Kuan-Chen Chien, Bing-Yi Lin:
Efficiently Preserving Privacy on Large Trajectory Datasets. 358-364 - Zhen Ju, Xiang Lin, Fangqi Li, Shilin Wang:
Lip Segmentation with Muti-scale Features Based on Fully Convolution Network. 365-370 - Lina Liu, Jiayin Qi:
Research on Discrete Emotion Classification of Chinese Online Product Reviews Based on OCC Model. 371-378 - Yuguang Xu, Hanpin Wang, Hongyu Wang:
Complete Graph Random Number Generator and Symmetrical Design Scheme. 379-385 - Xiaomeng Wang, Binxing Fang, Hongli Zhang, Shen Su:
Predicting the Popularity of Online Content Based on the Weak Ties Theory. 386-391 - Shang Li, Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang:
Evaluating the Rationality of Judicial Decision with LSTM-Based Case Modeling. 392-397 - Mingxuan Xiong, Aiping Li, Zongsheng Xie, Yan Jia:
A Practical Approach to Answer Extraction for Constructing QA Solution. 398-404 - Shudong Li, Xiaobo Wu, Aiping Li, Bin Zhou, Zhihong Tian, Dawei Zhao:
Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks. 405-409
Big Data and Business Analytics (BDBA 2018)
- Xiaoyan Wang, Debao Hu, Hui Lu:
Will the Big Data Strategic Alliance be Workable for Intelligent Vehicles and New Energy Vehicles Industry? - Perspective of System Dynamics. 410-417 - Hao Xue, Zheng Huang, Huijuan Lian, Weidong Qiu, Jie Guo, Shen Wang, Zheng Gong:
Distributed Large Scale Privacy-Preserving Deep Mining. 418-422 - Man Bai, Xu Han, Haoran Jia, Cong Wang, Yawei Sun:
Transfer Pretrained Sentence Encoder to Sentiment Classification. 423-427 - Pin Ding, Qinliu Yang, Cong Wang, Xiaoyan Wei, Yi Zhou:
Application of Improved Grey Model GM(1, 1) in Prediction of Human Health Data. 428-432 - Yujing Huang, Haoran Jia, Dan Jiang, Jincui Yang:
Hybrid Recommendation Algorithm Based on Social Interaction and Tag Weight. 433-437 - Jianju Du, Lili Wang:
Ownership Concentration, Internal Control Quality and Real Earnings Management. 438-444 - Ming Liu, Xifen Xu:
Dockless Bike-Sharing Reallocation Based on Data Analysis: Solving Complex Problem with Simple Method. 445-450 - Yong Chen, Bin Zhou, Weina Zhang, Wenjie Gong, Guangfu Sun:
Sentiment Analysis Based on Deep Learning and Its Application in Screening for Perinatal Depression. 451-456 - Chuan Ai, Bin Chen, Liang Liu, Jian Dong, Lingnan He, Xiaogang Qiu:
Design and Implementation of Information Dissemination Simulation Algorithm in Large-Scale Complex Network Based on Spark. 457-464 - Yuanchun Jiang, Manli Lv, Jianshan Sun, Yezheng Liu:
A Bayesian Personalized Ranking Algorithm Based on Tag Preference. 465-471 - Yan Fang, Xinyue Xiao, Xiaoyu Wang, Huiqing Lan:
Customized Bundle Recommendation by Association Rules of Product Categories for Online Supermarkets. 472-475
Big Data Mining for Cyberspace (BDMC 2018)
- Xuebin Wang, Qingfeng Tan, Jinqiao Shi, Shen Su, Meiqi Wang:
Insider Threat Detection Using Characterizing User Behavior. 476-482 - Yunsheng Fu, Fang Lou, Fangzhi Meng, Zhihong Tian, Hua Zhang, Feng Jiang:
An Intelligent Network Attack Detection Method Based on RNN. 483-489 - Jingqiang Liu, Zihao Zhao, Xiang Cui, Zhi Wang, Qixu Liu:
A Novel Approach for Detecting Browser-Based Silent Miner. 490-497 - Guangwei Yang, Haining Yu, Hongli Zhang, Xiangzhan Yu:
A Metadata-Based Representation Method of the Internet of Things. 498-505 - Isaac Amankona Obiri, Yong Wang, Raphael Elimeli Nuhoho, Erick Owiyo:
Authentication of Multiple-User Spatial Keywords Queries. 506-513 - Jinjing Zhao, Ling Pang:
Automated Fuzz Generators for High-Coverage Tests Based on Program Branch Predications. 514-520 - Zhenpeng Zheng, Li Pan, Khouanetheva Pholsena:
Mode Decomposition Based Hybrid Model for Traffic Flow Prediction. 521-526 - Ke Li, Rongliang Chen, Liang Gu, Chaoge Liu, Jie Yin:
A Method Based on Statistical Characteristics for Detection Malware Requests in Network Traffic. 527-532 - Jing Du, Yan Jie, Fujiang Ao, Ying Zhou:
An Improved Uniform Identity Authentication Method Based on SAML in Cloud Environment. 533-536 - Yuhang Wang, Hongli Zhang, Shen Su, Zhihong Tian:
A Location Privacy-Aware Method for kNN Query in Location Based Services. 537-541 - Kai Xing, Zhen Ding, Shuai Jiang, Xueyan Ma, Kai Yang, Chifu Yang, Xiang Li, Feng Jiang:
Hand Gesture Recognition Based on Deep Learning Method. 542-546 - Chunzhi Yi, Ningling Ma, Chifu Yang, Hao Guo, Jiahong Han, Hefu Gao, Xiang Li, Feng Jiang:
A Novel Automatic Diagnosis Based Physical Therapy for Duchenne Muscular Dystrophy Children. 547-552 - Chenguang Li, Donghao Gu, Xueyan Ma, Kai Yang, Shaohui Liu, Feng Jiang:
Video Frame Interpolation Based on Multi-scale Convolutional Network and Adversarial Training. 553-560 - Yutao Zhang, Junwen Feng, Chenguang Li:
Analysis on the Influence Factors of the Medical Institutions' Medical Efficiency Change in China. 561-568
Data Intelligence and Security Analysis (DISA 2018)
- Jin Xu, Xu Wu, Xiaqing Xie:
Efficient Identity-Based Offline/Online Encryption Scheme for Lightweight Devices. 569-575 - Fanzhi Meng, Fang Lou, Yunsheng Fu, Zhihong Tian:
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security. 576-581 - Chuan Qin, Wenbo Zhou, Weiming Zhang, Nenghai Yu:
Ensemble Steganography. 582-587 - Rui Xu, Xiaojun Chen, Xingxing Wang, Jinqiao Shi:
An In-depth Study of Digits in Passwords for Chinese Websites. 588-595 - Yuhang Xing, Min Li, Litao Wang:
Chaotic-Map Image Encryption Scheme Based on AES Key Producing Schedule. 596-600 - Yu Tai, Hui He, Weizhe Zhang, Yanguo Jia:
Automatic Generation of Review Content in Specific Domain of Social Network Based on RNN. 601-608 - Hailong Yao, Caifen Wang:
A Novel Blockchain-Based Authenticated Key Exchange Protocol and Its Applications. 609-614 - Guang Yang, Ping Zhang, Jiachen Ding, Honggang Hu:
Advanced Slide Attacks on the Even-Mansour Scheme. 615-621 - Yu Su, Kaiyue Qi, Chong Di, Yinghua Ma, Shenghong Li:
Learning Automata Based Feature Selection for Network Traffic Intrusion Detection. 622-627 - Yichen Li, Yinghua Ma, Mingda Guo, Shenghong Li:
Anomaly Detection for Power Grid Flow Patterns Based on the Multi-restricted Boltzmann Machines. 628-633 - Guanqun Wang, Yunxiao Sun, Qinggang He, Guodong Xin, Bailing Wang:
A Content Auditing Method of IPsec VPN. 634-639 - Jingzhe Zhang, Xuewei Feng, Dongxia Wang, Liang Ming:
Web Service Applying Moving Target Defense. 640-645 - Wei Sun, Jianguo Jiang, Majing Su:
A Passive-Measurement-Guided Tree Network Surveying and Mapping Model. 646-651 - Dayin Zhang, Xiaojun Chen, Dakui Wang, Jinqiao Shi:
A Survey on Collaborative Deep Learning and Privacy-Preserving. 652-658 - Pin Lv, Lingling Bai, Tingwen Liu, Zhenhu Ning, Jinqiao Shi, Binxing Fang:
Detection of Malicious Domain Names Based on Hidden Markov Model. 659-664 - Erick Owiyo, Yong Wang, Eunice Asamoah, Domnic Kamenyi, Isaac Obiri:
Decentralized Privacy Preserving Reputation System. 665-672
Data Visualization (DV 2018)
- Ankang Li, Xiaoli Hu, Tong Li, Huibing Zhang:
Research on the Prediction Method of Power Battery SOC Based on Deep Learning. 673-679 - Chenxi Dong, Tengfei Xue, Cong Wang:
The Feature Representation Ability of Variational AutoEncoder. 680-684 - Dongzhe Wang, Kezhi Mao:
Multimodal Object Classification Using Bidirectional Gated Recurrent Unit Networks. 685-690 - Zhuoyuan Zheng, Yunpeng Cai, Yujie Yang, Ye Li:
Sparse Weighted Naive Bayes Classifier for Efficient Classification of Categorical Data. 691-696 - Ruyao Cui, Lei Sun, Jie Yang, Bo Liu, Yuan Fan:
A Categorically Reweighted Feature Extraction Method for Anomaly Detection. 697-704 - Dongyang Zhao, Jiuming Huang, Yu Luo, Yan Jia:
A Joint Decoding Algorithm for Named Entity Recognition. 705-709 - Liwen Yu, Chaoli Wang, Shuqun Cheng, Lei Guo:
Establishment of Computer-Aided Diagnosis System for Liver Tumor CT Based on SVM. 710-715 - Jieyun Huang, Yunjia Zhang, Jialai Zhang, Xi Zhang:
A Tensor-Based Sub-Mode Coordinate Algorithm for Stock Prediction. 716-721 - Fang Lv, Junheng Huang, Wei Wang, Guodong Xin, Bailing Wang:
Detecting Pyramid Scheme Accounts with Time Series Financial Transactions. 722-728 - Zhong-min Pei, Ming-hui Xiong, Wei Xiong:
Visualization of Pairwise Data: An Overview. 729-734 - Xiaorui Song, Lingda Wu, Hongxing Hao:
Hyperspectral Image Denoising base on Adaptive Sparse Representation. 735-739 - Yougen Zhang, Yingchun Shi:
Tactical Wireless Network Visualization: Requirements and Representations. 740-743 - Chengxiang Liu, Wei Xiong:
Reasearch on Dynamic Evolution Model Visualization of Satellite Communication Network Based on Complex Network. 744-748 - Yingmei Wei, Xiaolei Du, Dalin Xu, Xianghan Wang:
A Speedup Spatial Rearrangement Algorithm for Dynamic Network Visualization. 749-753 - Fande Yang, Li Qiang:
Generation Framework for Situation Visualization Service from the Perspective of Cognition. 754-759 - Xitao Zhang, Lingda Wu, Zhonghua Yao, Shaobo Yu:
A Multi-layer Network Topology Visualization Layout Based on Louvain Community Detection. 760-763 - Hongxing Hao, Lingda Wu, Ronghuan Yu:
Research on the Technology of Electromagnetic Information Modeling and Visual Analysis. 764-767 - Jiang Zhu, Lingda Wu, Yi Lu, Jiao Jiao, Xiaorui Song:
Convolutional Neural Networks Based for High Spectral Dimensional Data Classification. 768-772
Intelligent System Security (ISS 2018)
- Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han:
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding. 773-780 - XiaoXuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu:
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training. 781-787 - Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen:
Intention-Aware Multi-channel Keyword Extension for Content Security. 788-794 - Hengxun Li, Wei Guo, Guoying Wu, Yanxia Li:
A RF-PSO Based Hybrid Feature Selection Model in Intrusion Detection System. 795-802 - Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang:
An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document. 803-810
Multi-source Network Fusion and Analysis (MSNFA 2018)
- Jinlin Wang, Hongli Zhang, Binxing Fang, Xing Wang, Yuanxin Zhang:
Evaluation on Availability of Entity Information in Cyberspace. 811-818 - Hao Guo, Kai Yang, Xueyan Ma, Kai Xing, Xiaodong Xia, Chifu Yang, Chunzhi Yi, Feng Jiang:
Prediction of Twist Angle for Assistive Exoskeleton Based on EMG Signals. 819-823 - Qinliu Yang, Qunchao Fu, Cong Wang, Jincui Yang:
A Matrix-Based Apriori Algorithm Improvement. 824-828 - Sijia Feng, Hao Chen, Chun Du, Jun Li, Ning Jing:
A Hierarchical Demand Prediction Method with Station Clustering for Bike Sharing System. 829-836 - Jing Qiu, Yaqi Si, Zhihong Tian:
Automatic Taxonomy Construction for Eye Colors Data without Using Context Information. 837-841 - Ping Wang, Zhongtian Jia, Bo Zhang, Chengbo Xu:
A Pricing Model for Self-Help Investigation Offline Based on Multivariate Linear Regression Analysis. 842-847 - Lingyun Li, Yawei Sun, Xu Han, Cong Wang:
Research on Improve Topic Representation over Short Text. 848-853 - Chunyuan Kang, Tianle Zhang:
Realistic Traffic Data Based Mobility Modeling and Simulation of Smart EV. 854-857 - Tengfei Xue, Yuyu Yuan, Cong Wang:
An Approach for Evaluating User Participation in Bitcoin. 858-864 - Nianwen Ning, Bin Wu, Chengcheng Peng:
Representation Learning Based on Influence of Node for Multiplex Network. 865-872 - Shuqi Yu, Bin Wu:
Exploiting Structured News Information to Improve Event Detection via Dual-Level Clustering. 873-880 - Renjun Chi, Bin Wu, Lin Wang:
Expert Identification Based on Dynamic LDA Topic Model. 881-888
Vulnerability Analysis and Adversarial Learning (VAAL 2018)
- Meiqi Wang, Qingfeng Tan, Xuebin Wang, Jinqiao Shi:
De-anonymizing Social Networks User via Profile Similarity. 889-895 - Wentong Wang, Ning Hu, Xin Liu:
BlockCAM: A Blockchain-Based Cross-Domain Authentication Model. 896-901 - Xiaolin Zhao, Meijing Wu, Qi Zhang, Jingfeng Xue, Yiman Zhang:
A Method of Fast Locating the Key Nodes Based on the Distribution Law of Node's Propagation Domain. 902-909 - Jian Zhang, Luxin Zheng, Liangyi Gong, Zhaojun Gu:
A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation. 910-916 - Ming Hou, Hongli Zhang, Yuhang Wang:
OFC: An Approach for Protecting Location Privacy from Location Provider in Location-Based Services. 917-922 - Liang Ming, Gang Zhao, Minhuan Huang, Ling Pang, Jin Li, Jingzhe Zhang, Dan Li, Shuaibing Lu:
Remote Protocol Vulnerability Discovery for Intelligent Transportation Systems (ITS). 923-929 - Dan Li, Hua Chen, Huayang Cao, Liang Ming:
Data-Driven Vulnerability Pattern Analysis for Fuzzing. 930-935 - Yi-mu Ji, Chen Chen, Shangdong Liu, Fei Wu, Zhiyu Chen, Qiang Bi, Na Wang, Zhipeng Jiao, Yede Qi, Xingwang Yang, Siyang Hou, Xiangyu Cao, Yichao Dong:
Research on Security of Key Algorithms in Intelligent Driving System. 936-942 - Honghao Yang, Dong Liang, Xiaohui Kuang, Changqiao Xu:
A Vulnerability Test Method for Speech Recognition Systems Based on Frequency Signal Processing. 943-947 - Meiqi Wang, Xuebin Wang, Jinqiao Shi, Qingfeng Tan, Yue Gao, Muqian Chen, Xiaoming Jiang:
Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes. 948-955 - Yulu Qi, Rong Jiang, Yan Jia, Aiping Li:
Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation. 956-962 - Rui Jin, Hongli Zhang, Yu Zhang:
The social negative mood index for social networks. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.