


default search action
9th DSC 2024: Jinan, China
- 9th IEEE International Conference on Data Science in Cyberspace, DSC 2024, Jinan, China, August 23-26, 2024. IEEE 2024, ISBN 979-8-3503-9136-7

- Hua Huang, Hua Sheng, Xingwang Han, Wenbin Zhang, Zilin Zhao:

Visual malware classification and detection method based on convolutional neural network. 1-8 - Gaolei Du, Yunge Sun, Junpeng Qu, Yong Fu:

An automated construction method for symmetric encryption round function models based on dynamic analysis. 1-6 - Yunge Sun, Gaolei Du, Junpeng Qu, Yong Fu:

An Encryption Algorithm Cycle Identification Method Based on Bit Execution. 7-12 - Huynh Thanh Thien Pham

, Frank Jiang, Alessio Bonti, Lei Pan, Junyu Lu, Mohamed Almorsy Abdelrazek:
Towards Blockchain Services Marketplace for More Efficient Blockchain Development. 13-23 - Caiyan Tang, Qi Cai, Chengzu Dong, Qin Wang, Shiping Chen, Mingyue Jiang:

An Empirical Case Study of Meta-IP Chain DAO: The Pioneer Tokenless DAO. 24-31 - Junpeng Qu, Gaolei Du, Yunge Sun, Yong Fu:

Dynamic detection technology of encryption algorithm based on Pin. 32-37 - Yong Ding, Enchang Yuan, Changsong Yang

, Hai Liang, Huiyong Wang, Xinyong Peng:
An Efficient and Privacy-Preserving Load Monitoring and Billing Scheme in Smart Grid. 38-45 - Changsong Yang

, Sirui Huang, Yong Ding, Hai Liang, Siyuan Jia, Xinyong Peng:
A Perturbation-Based Privacy Leakage Defense Method for Federal Learning. 46-52 - Haibo Cheng, Wenjian Liu, Youyang Qu, Kexue Fu, Qinyuan Wang:

Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges. 53-60 - Hui Xiang, Yifan Wu, Xuebin Wang, Jinqiao Shi, Can Zhao, Jiapeng Zhao:

Identifying Data Breaches in Dark Web through Prompt Active Learning. 61-68 - Changjian Li, Kai Chen, Han Yu, Yinxuan Huang, Xuechen Zhao, Jianfeng Zhang, Aiping Li:

Learning to Distinguish Entities Overlapping for Open Relation Extraction*. 69-76 - Wenbo Zhang, Lei He, Tao Shi, Shuang Gao, Yichen Zhao, Xing Wang, Lumin Xing, Yongmeng Li:

Research on Key Technologies of Intelligent Management Platform for Medical Care Objects Based on Internet of Things and Digital Twins. 77-84 - Zilong Chen, Li Xu, Mohan Li, Yanbin Sun:

Smart Grid Attack Region Partitioning Strategy Based on Node Importance. 85-92 - Jie Yao, Funing Xiang, Xuemei Wei, Kun Yuan:

NEF-GGCN: Node-Edge Fusion Gated Graph Convolutional Networks For Skeleton-based Medical Action Recognition. 93-100 - Liancheng Xu, Xiaoqi Wu, Xiaoxiang Wang, Xinhua Wang:

Causal Attention Group Recommendation Integrating Social Information. 101-108 - Jinchen Shi, Yang Fang, Zhen Tan, Hui Yang, Xiang Zhao:

Community partition based source localization in early time. 109-115 - Zhitong Liu, Zhiqiang Zhang, Mengqing Cheng, Haonan Tan, Xinyao Tan, Le Wang:

SLX: A Multi-class Network Intrusion Detection Method on Stacking Boosting Algorithm. 116-121 - Chenyun Duan, Lei Du, Liyi Zeng

, Zhaoquan Gu:
Vehicle Network Intrusion Detection Based on K-nearest Neighbor Variational Autoencoder Using Contrastive Learning. 122-129 - Xinyu Zhang, Junmei Ding, Yueming Lu:

Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis. 130-137 - Chengyi Wang, Jinyin Chen, Haibin Zheng, Xuhua Pan:

SEAD: Self-aware Adversarial Detection for Black-box Reinforcement Learning. 138-145 - Yuting Zhou, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu:

An Abnormal Behavior Detection Method Based on User Behavior Correlation Feature Sequence Modeling. 146-153 - Chengyue Wang, Yang Liu, Yaojun Qiao, Daoqi Han, Yueming Lu:

Optimization Design of Network Attack and Defense Scenarios in Intelligent Clusters. 154-161 - Dong Liu, Zhicheng Liu, Yang Liu, Biqing Qiu, Shirui Wang:

Research on automobile data security risk analysis based on TARA method. 162-170 - Junzhe Dong

, Shuo Geng, Xiong Zhang:
An Intelligent Retrieval System for Similar Information System Vulnerabilities Based on Knowledge Graph. 171-176 - Hanjin Tong, Tianqing Zhu, Faqian Guan, Wanlei Zhou:

Defense Against Graph Injection Attack in Graph Neural Networks. 177-187 - Xing Zou, Ning Hu:

Cyber-Range: the Scientific Infrastructure for Cyberspace Security Research. 188-195 - Lai Jiang

, Conghui Zheng, Xiaohan Zhang, Fuhui Sun, Xiaoyan Wang, Pan Li:
Leveraging LLM based Retrieval-Augmented Generation for Legal Knowledge Graph Completion. 196-203 - Yibin Fu, Zhaoyun Ding, Xiaojie Xu:

LLM & Bagging for 1-shot Joint IE. 204-208 - Jiaqi Si, Xiaoye Ouyang, Xiaoling Zhu, Yi Zhang:

A Relation Semantic Enhancement Method for Large Language Model Based Knowledge Graph Completion. 209-215 - Lu Ou, Xiaoya Ni, Wei Wu, Zhihong Tian:

CyGPT: Knowledge Graph-Based Enhancement Techniques for Large Language Models in Cybersecurity. 216-223 - Hongfan Chen, Yigang Diao, Hui Xiang, Yixuan Huo, Xiaqing Xie, Jiapeng Zhao, Xuebin Wang, Yanwei Sun, Jinqiao Shi:

Decode the Dark Side of the Language: Applications of LLMs in the Dark Web. 224-231 - Zilong Chen, Peng Zhang, Mingyang Xu, Xingjian Gao, Dan Liu, Xuebing Luo, Rencheng Huang, Tao Zhang:

LocatingGPT: A multi-modal document retrieval method based on retrieval-augmented generation. 232-239 - Xu Yang, Lijuan Sun, Yutong Gao, Sanchuan Guo, Xu Wu:

A Method for Generating Medical Text Data by Integrating Spatiotemporal Attributes and Implicit State Transitions. 240-246 - Haoyuan Zeng, Bo Qiao, Ye Wang, Bin Zhou:

Hate Speech Detection in Network Perception Constrained Scenarios. 247-254 - Yuliang Wei, Qi Li, Yang Liu, Chang Sun, Yongzheng Zhang:

StanceDigger: Achieving Efficient Text Stance Detection with Collaborative Attention and Consistent Learning. 255-262 - Yashen Wang, Xiaoling Zhu, Tianzhu Chen, Yi Zhang:

An Aggregation Procedure Optimization Method by Leveraging Neighboring Prompt for GCN-based Knowledge Graph Completion Model. 263-270 - Yao Lin, Dong Zhu, Chenhui Zhang, Zhiqiang Zhang, Le Wang:

Spherical Hierarchical Knowledge Graph Embeddings for Cybersecurity Knowledge Graph Completion. 271-278 - Cui Luo, Haiyan Wang

, Huaping Yuan, Zhaoqian Gu, Ning Hu:
A novel method of cybersecurity knowledge graph construction and storage optimization based on cyber range. 279-286 - Lei He, Wenbo Zhang, Tao Shi, Yichen Zhao, Xing Wang, Lumin Xing, Yongmeng Li:

Knowledge Graph Construction in the Context of Traditional Chinese Medicine: A review. 287-293 - Weijie Deng, Zhaoyun Ding, Junqi Chen, Yi Wang:

Research on entity extraction method for rehabilitation medicine knowledge management. 294-299 - Jiarui Li

, Lei Du, Yilu Chen, Liyi Zeng
, Hao Li, Zhaoquan Gu:
CIL4EMTD: A Novel Class Incremental Learning Method for Encrypted Malware Traffic Detection. 300-307 - Jianbo Qin, Yi Wang, Zhaoyun Ding:

Weapon Target Assignment Based on Deep Q-learning. 308-313 - Weixuan Sun, Jiuyang Tang, Yang Fang, Jinqiu Hong, Hao Xu, Mao Wang:

Multi-Behavior Hypergraph Contrastive-Enhanced Transformer for Recommender Systems. 314-321 - Yinghui Xu, Haonan Tan, Jianyu Deng, Le Wang:

Node Fragility Reward Shaping Based on Reinforcement Learning in Intranet Penetration Scenario. 322-328 - Yidong Chai, Yi Liu, Mohammadreza Ebrahimi, Weifeng Li, Balaji Padmanabhan, Yuanchun Jiang, Yezheng Liu:

Enhancing Adversarial Robustness: A Novel Bayesian Uncertainty-Based Ensemble Learning Method. 329-336 - Yuankun Liu, Lumin Xing, Di Wang, Xin Nie, Xueyan Zhang, Di Wu, Wenjian Liu:

An Early Detection Model of Prostate Cancer Based on MRI. 337-344 - Hongpeng Wang, Duanfa Wang, Zhiqin Wang, Chenglong Li:

Enhancing CLAHE with Interval-Valued Fermatean Fuzziness for Robust Low-Light Image Enhancement. 345-353 - Chenqing Guo, Jinxin Zuo, Yueming Lu, Weixuan Xie:

Reliability Measurement Of Vehicle Sensor Data Based On Historical Perception. 354-361 - Feixiang Shu, Lai Jiang, Conghui Zheng, Fuhui Sun, Xiaoyan Wang, Pan Li:

ST-LadderNet: Spatial-Temporal Correlation Stepply Enhanced Deep Learning Model for Urban Traffic Predicting. 362-369 - Y. Neil Qu, Zonghao Ji, Lei Cui, Chong Zhang, Lei Liu, Zhiyi Tian:

Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial Testing. 370-377 - Xingyu Liu, Xiaozhen Liu, Kegang Hao, Ke Wang, Xinglong Chen, Weina Niu:

HGNNDroid: Android Malware Detection Based on Heterogeneous Graph Neural Network. 378-384 - Sijun Li, Jianqi Wang, Eric Li, Daren Liu, Yi Li:

The Ecological and Financial Impact Study of Electric Bus Transition. 385-391 - Biqing Qiu, Dong Liu, Shunchao Cao, Chunxu Mu, Shen Yan, Yang Liu:

Risk Analysis and Protection Suggestions for Artificial Intelligence Data Security. 392-398 - Dongzhi Ge, Lidong He, Zhengguo Bian:

Multi-agent Assignment via Growth Assignment Algorithm. 399-405 - Fei Shang, Weixiang Zhao, Jingyang Wen, Xiangui Kang, Z. Jane Wang:

INN-based Robust JPEG Steganography Through Cover Coefficient Selection. 406-413 - Sizheng Wu, Jun Li, Chao Li, Yawei Ren, Liyan Shen:

A Universal Semantic-Based Method for Backdoor Attack. 414-420 - Yuecheng Wen, Xiaotong Li, Haiqing Lv, Menglu Wang, Wenbo Zuo:

Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression. 421-427 - Xinxu Weng, Yuqing Wang, Shijing Weng, Juan Xiong, Lei Weng:

Bibliometric Analysis of Large Language Model Artificial Intelligence Based on Knowledge Graph. 428-434 - Yanan Du, Xiaoli Zha, Min Li, Yueli Song:

Online Health Information Adoption Behavior of Chronic Disease Patients. 435-440 - Lei Chen, Yilu Chen, Chenwei Liu, Wenying Feng:

An Encrypted Malicious Traffic Detection Method Based on Deeper Protocol Features. 441-445 - Songming Han, Ying Ling, Ming Xie, Shaofeng Ming, Fuchuan Tang:

A Data Dimensionality Reduction Method Based on Stacked Auto-Encoders with Self-Attention. 446-451 - Yuanyuan Guo, Xianqiang Zhu, Qianzhen Zhang, Bin Liu:

A Time-tightly Coupled UAV Control Scheduling Scheme. 452-456 - Zelin Wei, Qiwei Chen, Rui Weng:

Building an autonomous driving platform based on ROS and its safety analysis. 457-463 - Niuniu Zhang, Guohe Feng:

Analysis of Big Data Research Hotspots Based on Keyword Co-occurrence. 464-471 - Fangliao Yang, Shi Zhu, Mingguang Li, Lailong Luo, Bangbang Ren, Yuhui Cai:

Intelligent Recognition Model for IoT Terminal Devices Based on Message Business Logic Features. 472-478 - Tianfu Xu, Tianzhe Li, Qun He, Zhiyuan Luo, Naqin Zhou, Haoqin Chen, Rixuan Qiu:

Trapping resource orchestration scheme based on electric power environment. 479-486 - Songming Han, Ying Ling, Ming Xie, Shaofeng Ming:

Automatic Classification Based on the LSTM-SiTGRU Model for Plaintext and Ciphertext. 487-494 - Xuhua Ai, Yiting Huang, Yuan Yin, Yun Dong, Qi Meng, Denghao Tu, Liyuan Zhang:

Anonymous Smart Grid System Based on Revocable Ring Signatures. 495-500 - Jiahan Dong, Tong Jin, Xiaohu Wang, Guangxin Guo, Qihang Zhou:

Research on fault early warning of industrial control system based on TCN-MKELM. 501-506 - Honglei Yao, Donglan Liu, Yingxian Chang, Xin Liu, Chaofan Tang:

Time Series Anomaly Detection Based on Normalized Flow and Bayesian Networks. 515-522 - Yukun Zhang, Xiaoli Qin, Yanzhao Tian, Shenjian Xiao:

Research on Classification and Grading of Cross-Border Data in Free Trade Port Construction. 533-540 - Lei Li, Shichao Zhang, Xin Liu, Donglan Liu, Rui Wang, Fangzhe Zhang, Fuhui Zhao, Shanjie Xu:

Knowledge Base-Guided Modeling of ICS Device Behavior for Status Prediction. 541-548 - Ting Wang, Qian Zhao, Sen Wang, Changqiang Jing:

Research on Stochastic Feature Selection Optimization Algorithm Fusing Symmetric Uncertainty. 549-554 - Mingqian Yang, Wei Peng, Xiaowei Song, Xiting Ma, Ling Liu, Ning Hu:

SDCRT: An Anonymous Communication Network Routing Algorithm Based on SDN Architecture. 555-562 - Shuang Zhou, Zhigang Liu, Jian Liu, Han Jiang:

Secure Two-party Newton Interpolation. 563-566 - Rui Liang, Hanchong Zhang, Fuqiang Liu, Jinyun Zhang, Zhe Sun, Yanfei Song, Chao Li, Liang Zhang:

Encrypted Malicious Traffic Detection Based on Sample Selection Optimization and Data Augmentation. 567-574 - Xiaowei Song, Mingqian Yang, Wei Peng, Mengen Liang, Ling Liu, Ning Hu:

CloudNet: Building a Data-Plane for Anonymous Communication Network Based on Cloud Service. 575-582 - Wei Peng, Xiaowei Song, Mingqian Yang, Mengen Liang, Rui Wu, Ning Hu:

Conduit: An IPFS-based Hidden Access Channel for Mix-net. 583-590 - Lianhai Wang, Tianrui Liu, Yingxiaochun Wang, Xinlei Wang, Qi Li

:
Reputation based Adaptive Federated Learning in Medical Scenarios. 591-598 - Yunhao Xu, Chao Li, Daiqi Gu, Zhewei Zhang, Zhe Sun, Yanfei Song:

A Novel Method for Honeypot Anti-Identification against Modbus Fuzz Testing in Industrial Control Systems. 599-606 - Lianhai Wang, Xinlei Wang, Tianrui Liu, Yingxiaochun Wang, Qi Li

:
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction. 607-614 - Haozhan Gu, Hangwei Tian, Jingchun Wang, Yumei Li:

A Short-Term Electric Load Forecasting Method Based on the Fusion of Global and Local Features. 615-620 - Kuan Liu, Yumei Li, Yuanhua Qi, Ning Qi, Mengran Zhai:

Text Information Mining in Cyberspace: An Information Extraction Method Based on T5 and KeyBERT. 621-628 - Wenqi Zheng, Hao Ren, Siqi Yang, Zhi Chen, Jiajun Xie, Wenqiang Pan:

Networked Vehicle Practices Based on Networked Firing Ranges. 629-634 - Zhitao Yu, Peng Sun, Mingle Zhou, Qianlong Liu, Shilong Zhao:

Research on liquid crystal display technology based on regional dynamic dimming algorithm. 635-640 - Wei Li, Can He, MingLe Zhou, Hengyu Zhang, Wenlong Liu:

Ultra-high definition video quality assessment method based on deep learning. 641-646 - Wang Li, Hengyu Zhang, Hongze Xie, Xikai Ding, Qianlong Liu:

Incorporate Data Elements into the Digital Evaluation System of the NewEra. 647-651 - Jinyang Sun, Dongdong Peng, Zhe Lu, Mengran Zhai, Ning Qi, Yuanhua Qi:

Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization - - Taking Standardization Practice in Shandong Province as an Example. 652-659 - Yihong Li:

Security and Privacy of Artificial Intelligence with Ethical Concerns. 660-667 - Mingxi Ji, Xueping Gu, Qinghong Guo, Xikai Ding:

Research on Government Data Governance in the Era of Large Language Model. 668-671 - Zirui Xu, Jinyang Sun, Zhe Lu, Delong Han:

Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government. 672-676 - Min Li, Delong Han, Rui Shao, Jinghui He:

Feature Aggregation Network for Memory-Based Industrial Anomaly Detection. 677-683 - Yonghao Yu

, Yongde Guo, Dawei Zhao, Kexue Fu, Yongwei Tang, Qinyuan Wang:
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding. 684-690 - Xia Wu, Zehan Li, Zijun Hu, Qing Zhao, Hangyu Hu:

Aligning Users Across Social Networks Based on Hypergraph Embedding. 691-698 - Xin Li, Zhaoyang Qu, Tong Yu, Ming Xie, Fu Yu, Wei Ding:

Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex Networks. 699-705 - Qinyuan Wang, Bruce Gu, He Zhang, Yunfeng Li:

Fairness of Large Music Models: From a Culturally Diverse Perspective. 706-712 - Hao Ren, Zeyu Luo, Fengshi Jing, Xinyue Zhang, Han He, Yonghao Yu

, Dawei Zhao:
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNet. 713-719 - Xiaodong Wang, Sazia Parvin, Sitalakshmi Venkatraman, Kiran Fahd, Amjad Gawanmeh:

Scalable and Feasible Honeypot Solution for SMEs in Cloud Environments. 720-725 - Thang V. Q. Le, Dinh-Hong Vu, Van Huy Pham, Anh-Cuong Le, Nguyen P. Nguyen:

A Framework for Vietnamese Question-Answering in Law Domain. 726-731 - Ling Wang, Haoyu Hao, Xue Yan, Xiwei Wang, Tie Hua Zhou, Keun Ho Ryu:

Multiple Knowledge Graphs Semantic Interaction based on Graph Embedding and Matching Processing. 732-737 - Tie Hua Zhou, Xiuting Jia, Xirao Xun, Tianshuo Bi, Ling Wang:

Knowledge Points Semantic Classification Method based on Graph Embedding over Co-word Networks. 738-743 - Huilin Zheng, Yingyi Liang, Daming Zhang, Kai Shi, Luxi Dong, Xiaolan Xie:

Deep Learning-based Mortality Prediction of COVID-19 Patients with Cardiovascular Disease. 744-749 - Battogtokh Azzaya, Sambuu Uyanga, Namsrai Oyunerdene:

Solution for prediction of customer behavior in call center systems. 750-753 - Delgermaa Gankhuyag, Uyanga Sambuu, Enkhtuul Bukhsuren, Buyankhishig Bold:

A Model for Evaluating a Digital Transformation of Rural Areas of Mongolia. 754-761 - Lidi Wu, Yang Liu, Jiale Yang, Yongjun Piao:

A prognostic model based on five characteristic genes to predict the prognosis of patients with hepatocellular carcinoma. 762-769 - Yan Yan, Yukun Wang, Yiru Da, Yongjun Piao:

Single-cell RNA sequencing analysis reveals transcriptional dynamics of immune cells during ovarian cancer metastasis. 770-777 - Ha Ye Jin Kang

, Min Sam Ko, Kwang Sun Ryu:
Generation of Synthetic Data for Sharing and Utilization in Healthcare Data. 778-781 - Junwei Hu, Yule Zhang, Yongjun Piao:

Deciphering Myopia: Insights From Single-Cell Data and Machine Learning Approaches. 782-788 - Javkhlan Rentsendorj, Lkhamrolom Tsoodol, Munkhtsetseg Namsraidorj, Oyun-Erdene Namsrai:

Digital Contracts: A Sustainable and Secure Solution for Modern Businesses -A Case Study of E-Geree.mn in Mongolia. 789-792 - Yu Wang, Meijing Li, Runqing Huang:

Data Augmentation Based on Word Importance and Deep Back-Translation for Low-Resource Biomedical Named Entity Recognition. 793-797 - Sumiyakhand Dagdanpurev, Darkhijav Davaasuren, Adiyabat Enkhjargal, Amartuvshin Renchin-Ochir:

A new approach for non-contact, automated measurement of respiration rate using structured light. 798-801 - Xueying Zhai, Yunfeng Peng, Xiuping Guo, Liang Zhang, Wei Zhang:

Demand Response Scheme: Achieving Sustainability in Distributed Data Processing. 802-809 - Trung-Phien Nguyen, Van-Dung Hoang, Minh-Luan Su, Thi-Nhat-Vy Nguyen, Trong-Tri Bui, Ba-Duy Nguyen:

Improving Skin Lesion Classification based on Fusion Multi-Learning Models. 810-817 - Baatarbileg Altangerel, Tulgaa Purevsuren, Oyun-Erdene Namsrai:

Managing concurrent course selection requests in a web-based university management system. 818-820 - Lkhamrolom Tsoodol, Munkhnasan Tuvdendorj, Javkhlan Rentsendorj, Oyun-Erdene Namsrai:

Implementing Unified Identity and Access Management System: Case Study for the National University of Mongolia. 821-824 - Oyundolgor Khorloo, Enkhbayar Altantsetseg:

Cultural Heritage Education in the Metaverse. 825-831

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














