


default search action
7th DSC 2022: Guilin, China
- 7th IEEE International Conference on Data Science in Cyberspace, DSC 2022, Guilin, China, July 11-13, 2022. IEEE 2022, ISBN 978-1-6654-7480-1

- Ju Yang, Liang Zhou, Le Wang, Shudong Li, Ziqing Lin, Zhaoquan Gu:

A Multi-step Attack Detection Framework for the Power System Network. 1-8 - Kai Chen, Jingxian Zhu, Lansheng Han, Shenghui Li, Pengyi Gao:

A Novel Network Security Situation Awareness Model for Advanced Persistent Threat. 9-16 - Jun-Zheng Yang, Feng Liu

, Yuan-Jie Zhao, Lu-Lu Liang, Jia-Yin Qi:
NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model. 17-23 - Quan Hong, Yang Zhao, Jian Chang, Yuxin Du, Jun Li, Lidong Zhai:

Shock Trap: An active defense architecture based on trap vulnerabilities. 24-31 - Jiajia Yi, Meng Li, Kun Xiao, Lirong Chen, Lei Luo, Rui Xu:

Capability-based Component Security Mechanism for Microkernel OS. 32-39 - Runsheng Guo, Qichao Liu, Man Zhang, Ning Hu, Hui Lu:

A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection. 40-47 - Jiaxin Fan, Qi Yan, Mohan Li, Guanqun Qu, Yang Xiao:

A Survey on Data Poisoning Attacks and Defenses. 48-55 - Qian Ke, Chunlu Wang, Haixia Wang, Yongqiang Lyu, Zihan Xu, Dongsheng Wang:

Model Checking for Microarchitectural Data Sampling Security. 56-63 - Yu Zhang, Qingzhong Liu, Yuanquan Shi

:
MANAGE: A Novel Malware Evolution Model based on Digital Genes. 64-70 - Zhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang:

Automated Crash Analysis and Exploit Generation with Extendable Exploit Model. 71-78 - Lei Feng, Yuanfei Zhang, Zhiqiang Hao, Chonghua Wang:

WREP: A lightweight event real-time processing engine for IoT. 79-85 - Lingzi Kong, Daoqi Han, Junmei Ding, Mingrui Fan, Yueming Lu:

A Hierarchical Terminal Recognition Approach based on Network Traffic Analysis. 86-93 - Yuqiang Zhang, Zhiqiang Hao, Ning Hu, Jiawei Luo, Chonghua Wang:

A virtualization-based security architecture for industrial control systems. 94-101 - Haitao Zhang, Lei Luo, Ruikun Li, Jiajia Yi, Yun Li, Lirong Chen:

Research and Application of Intelligent Vehicle Cybersecurity Threat Model. 102-109 - Jincai Zou, Zhihan Tan, Yaya Huang, Yixing Chen, Yuqiang Zhang, Ning Hu:

SMRT: An Effective Malicious Node Resistance Design for Mixnets. 110-117 - Yixing Chen, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Yaya Huang, Ning Hu:

Stealth: A Heterogeneous Covert Access Channel for Mix-net. 118-125 - Fashan Dong, Binyue Deng, Haiyang Yu, Wenrong Xie, Huawei Xu, Zhaoquan Gu:

An Asterisk-shaped Patch Attack for Object Detection. 126-133 - Haitian Liu, Rong Jiang, Bin Zhou, Xing Rong, Juan Li, Aiping Li:

Multiple Sequential Network Attacks Detection Based on DTW-HMM. 134-141 - Jinlei Liu, Wenchao Dan, Nuo Cheng, Wenjing Lian, Peirong Qu, Hui Zhang, Yueling Zhang, Jie Wang:

Knowledge Graph of Artificial Intelligence in Medicine: A Scientometric Analysis. 142-153 - Depeng Wang, Yibo Sun, Chen Hong:

End-to-end training image-text matching network. 154-159 - Wei Liu, Yutao Huang, Yibing Guo, Ye Wang, Binxing Fang, Qing Liao:

Topic Modeling for Short Texts Via Dual View Collaborate optimization. 160-166 - Junjian Zhang, Hao Tan, Binyue Deng, Jiacen Hu, Dong Zhu, Linyi Huang, Zhaoquan Gu:

NMI-FGSM-Tri: An Efficient and Targeted Method for Generating Adversarial Examples for Speaker Recognition. 167-174 - Yaya Huang, Yixing Chen, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Ning Hu:

TFHM: A Traffic Feature Hiding Scheme Based on Generative Adversarial Networks. 175-182 - Yixiang Chen, Linhao Ye, Yufeng Ye, Peng Zhang

, Qinfeng Tan:
Anomaly Detection from Log Data Sequences with Perturbations. 183-190 - Ruiling Gan, Jiawen Diao, Xiang Cui, Shouyou Song:

A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples. 191-198 - Cheng Fang, Wenjie Mi, Ping Han, Lidong Zhai:

A method of network traffic anomaly detection based on Packet Window Transformer. 199-205 - Shangbin Han, Qianhong Wu, Han Zhang, Bo Qin:

Light-weight Unsupervised Anomaly Detection for Encrypted Malware Traffic. 206-213 - Xiao Gong, Mengwei Li, Zhengbin Zhao, Dengqi Cui:

Research on industrial Robot system security based on Industrial Internet Platform. 214-218 - Yundan Yang, Fenghui Duan, Maosheng Zhang, JunJie Liu, Jin Li, Yueming Lu:

Privacy Protection Management Model for Internet of Things Data. 219-226 - Jinhai Chen, Zheng Gong, Yufeng Tang

, Yupeng Zhang, Bin Li:
optimizing Diffusion Layer with AVX Shuffling: A Study on SKINNY. 227-233 - Tong Liu, Zhongru Wang, Yuntao Zhang, Zhehui Liu, Binxing Fang, Zhengyuan Pang:

Automated Vulnerability Discovery System Based on Hybrid Execution. 234-241 - Lang Liu, Yuejiao Wu, Lujun Yin, Junxiang Ren, Ruiling Song, Guoqiang Xu:

A Method Combining Text Classification and Keyword Recognition to Improve Long Text Information Mining. 242-248 - Ziqi Zhu, Bin Zhu, Huan Zhang, Yu Geng, Le Wang, Denghui Zhang, Zhaoquan Gu:

Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise. 249-256 - Hongshun He, Zhipeng Zhang, Lei Yang, Yang Li, Jiakang Shi:

A novel Tri-training algorithm based on Evidence Theory. 257-261 - Hongshun He, Wei Yu, Lei Yang, Yang Li, Luyu Sun:

Anchor graph semi-supervised learning method based on Evidence Theory. 262-267 - Xiaonian Wu, Nian Tong, Ruanlian Zhang, Yongzhuang Wei:

The Power Analysis Based on Mean-Ridge Regression. 268-274 - Jiashun Zhou, Na Wang, Aodi Liu, Xuehui Du:

FAVT: A Feature-Anchored Video Data Trading Mechanism. 275-282 - Zhihan Tan, Yaya Huang, Yixing Chen, Yuqiang Zhang, Jincai Zou, Ning Hu:

A Data Encoding Method for Multipath Anonymous Transmission. 283-290 - Yuanpeng Yang, Hongbo Wang, Xiaofeng Wang, Yuan Liu:

Research on One-way Data Transmission Technology Based on RDMA. 291-298 - Jun Sun, Dong Liu, Yang Liu, Chuang Li, Yumeng Ma:

Research on the Characteristics and Security Risks of the Internet of Vehicles Data. 299-305 - Weiyou Liang, Yujue Wang, Yong Ding, Haibin Zheng, Hai Liang, Huiyong Wang:

An efficient anonymous authentication and supervision system based on blockchain. 306-313 - Kai Chen, Jietong Su, Lansheng Han, Shenghui Li, Pengyi Gao:

Hybrid butterfly optimization algorithm-based support vector machine for botnet command-and-control channel detection. 314-321 - Jun Sun, Yang Li, Ge Zhang, Liangyu Dong, Zitao Yang, Mufeng Wang, Jiahe Cai:

Data traceability scheme of industrial control system based on digital watermark. 322-325 - Tao Liu, Honghao Liang, Xiaowei Chen, Zimeng Li, Lingzi Kong, Jin Li, Yueming Lu:

Design and Implementation of Network Traffic Analysis System for Power Grid Metering System. 326-332 - Chen Guo, Tianxiu Wang, Yang Lin, Hao Chen, Haiyang Yu, Chengwei Zhu, Jing Qiu:

Modeling Unseen Entities from a Semantic Evidence View in Temporal Knowledge Graphs. 333-339 - Lei Chen, Rong Jiang, Changjian Lin, Aiping Li:

A Survey on Threat Hunting: Approaches and Applications. 340-344 - Yu Hu, Ran Li, Simin Wang, Fuqiang Tao, Zhe Sun:

SpeechHide: A Hybrid Privacy-preserving Mechanism for Speech Content and Voiceprint in Speech Data Sharing. 345-352 - Huanyu Chi, Zekun Fei, Peinuo Li, Boyu Yang, Zhi Wang, Li Gu:

LISP-TBCNN: An AutoCAD Malware Detection Approach. 353-359 - Zian Jia, Xiaosu Wang, Yun Xiong, Yao Zhang, Jinjing Zhao:

AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat. 360-366 - Yabin Li, Yuanping Nie, Xiaohui Kuang:

Fuzzing DBMS via NNLM. 367-374 - Qian Yan, Minhuan Huang, Huayang Cao:

A Survey of Human-machine Collaboration in Fuzzing. 375-382 - Hanwen Sun, Yuanping Nie, Xiang Li, Minhuan Huang, Jianwen Tian, Wei Kong:

An Automatic Code Generation Method Based on Sequence Generative Adversarial Network. 383-390 - Ke Yan, Bo Yu, Yong Tang, Xiangdong Kong, Chen Chen, Jin Lei:

NAFuzzer: Augmenting Network Protocol Fuzzers via Automatic Template and Seed Generation. 391-398 - Jiawei Wu, Senyi Li, Junqiang Li, Long Luo, Hongfang Yu

, Gang Sun
:
DeepCov: Coverage Guided Deep Learning Framework Fuzzing. 399-404 - Feng Li, Fei Shu, Mingxuan Li, Bin Wang:

Network Security Intrusion Detection and Mass Alarms Under Cluster Computing Platform. 405-412 - Weidong Xiao, Xu Zhang, Dongbin Wang:

Cross-Security Domain Dynamic Orchestration Algorithm of Network Security Functions. 413-419 - You Zhai, Hao Dong, Zhoujun Li

, Liqun Yang, Longtao He:
AGDB: A Dictionary-based Malicious Domain Detection Method based on Representation Fusion. 420-425 - Kun Guo, Yibo Gao, Dongbin Wang, Hui Zhi, Tao Zhang, Yueming Lu:

A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense. 426-431 - Bing Chen, Yaping Liu, Shuo Zhang, Jie Chen, Zhiyu Han:

FLYFDetect: A Smart Home Privacy Protection Framework via Federated Learning. 432-439 - Jiahao Qi, Ziyu Guo, Yueming Lu, Jiaqi Gao, Yihong Guo, Fanyao Meng:

Security Evaluation Model of Blockchain System Based on Combination Weighting and Grey Clustering. 440-447 - Ling Liu, Xin Liu, Yue Zhao, Ning Hu:

TLD-WF: Surfing Freely Under Website Fingerprinting Attacks. 448-454 - Xiaohan Yin, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu:

MASCA: A Multimodal Abstractive Summarization Model Based on Core Words Fusion Attention. 455-461 - Dongye He, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu:

TAFM: Topic-Attention FM-encoder for Text Generation. 462-469 - Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu:

Adversarial Example Attacks against ASR Systems: An Overview. 470-477 - Liang Li, Liqun Gao, Feng Xie, Bin Zhou:

Prediction of Real Popularity based on Sample Debias. 478-482 - Tuwen Guo, Xi Zhang, Lirong Qiu:

Leveraging Multi-aspect Semantics for Conversation Structure Modeling. 483-490 - Yunfan Tian, Dongxin Liu, Laifu Wang, Bowen Hu:

A combined-CNN model of TLS Traffic Recognition and Classification. 491-497 - Yang Lv, Shaona Qin, Zifeng Zhu, Zhuocheng Yu, Shudong Li, Weihong Han:

A Review of Provenance Graph based APT Attack Detection: Applications and Developments. 498-505 - Haitao Zhang, Lei Luo, Yun Li, Lirong Chen, Xiaobo Wu:

A Novel Framework For Malicious Encrypted Traffic Classification At Host Level And Flow Level. 506-511 - Yangyang Mei, Weihong Han, Shudong Li, Xiaobo Wu, Kaihan Lin, Yulu Qi:

A Review of Attribution Technical for APT Attacks. 512-518 - Jiahui Zheng, Junjian Li, Chao Li, Ran Li:

A SQL Blind Injection Method Based on Gated Recurrent Neural Network. 519-525 - Jie Lu, Yong Ding, Zhenyu Li

, Chunhui Wang:
A timestamp-based covert data transmission method in Industrial Control System. 526-532 - Maosheng Zhang, Ruohan Cao, Fenghui Duan, Yundan Yang, Yueming Lu, Man Zhang, Xu Lu:

Research on Lightweight Blockchain Technology Based on Edge Computing. 533-539 - Fenghui Duan, Yundan Yang, Maosheng Zhang, Songqi Wu, Yueming Lu, Man Zhang, Xu Lu:

Access Control Mechanism for Edge Nodes. 540-547 - Jun Li, Xueying Qiu, Lingchen Li, Chenghui Zhu, Xiaonian Wu:

New Integral distinguishers for I - Present™, TANGRAM and CHAM. 548-555 - Jun-Zhu Zhang, Yu-Gao Zheng:

Display Design Based on Virtual Reality Technology VR-Platform Platform. 556-563 - Haoran Ma, Zhaoyun Ding:

Research on Multi-Model Fusion for Named Entity Recognition Based on Loop Parameter Sharing Transfer Learning. 564-569 - Ying Zhang:

Classification of Diabetic Retinopathy Based on B-ResNet. 570-575 - Qi Yan, Jiaxin Fan, Mohan Li, Guanqun Qu, Yang Xiao:

A Survey on Knowledge Graph Embedding. 576-583 - Feng Ye:

Image Art Innovation based on Extended Reality Technology. 584-587 - Ling Zou, Jing Li:

Application of Virtual Simulation in Digital Exhibition and Performance. 588-591 - Quanzhong Mao, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu:

SATMask: Spatial Attention Transform Mask for Dense Instance Segmentation. 592-598 - Qian Zhou

, Hua Dai, Liang Liu, Kai Shi, Jie Chen, Hong Jiang:
The final security problem in IOT: Don't count on the canary! 599-604 - Yunjie Tang, Kai Sun, Danhuai Zhao, Yan Lu, Jiaju Jiang, Hong Chen:

Industrial Defect Detection Through Computer Vision: A Survey. 605-610 - Yichuan Wu, Meng Guo, Lei Yang

, Wei Yu:
VCFN-Video Computing Force Network. 611-615 - Ge Zhang, Zheyu Zhang, Jun Sun, Zun Wang, Rui Wang, Shirui Wang, Chengyun Xie:

10 Gigabit industrial thermal data acquisition and storage solution based on software-defined network. 616-619 - Yuewu Lian, Haitao Zhan, Peiheng Zhang

, Mingwu Zhang:
Time-Lock Encryption for Multiple Consecutive Periods and its Application. 620-626 - Meng Zhao, Yong Ding, Tong Zhang, Xiaochun Zhou:

Secure outsourced VANET data in clouds with designated supervisor. 627-632 - Riming Wu, Yiliang Han, Kaiyang Guo, Kai Liu:

Information dissemination model of recommendation platform based on network community. 633-641 - Yichuan Wu, Jianping Zheng, Meng Guo:

A Novel Mobile Instant Messaging System. 642-645 - Jie Chen, Yaping Liu, Shuo Zhang, Zebin Guo, Bing Chen, Zhiyu Han:

DESEND: A Fast Device Event Signature Extraction And Detection Method for Smart Home. 646-652

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














