Program

Program at a Glance

The 6th IEEE International Conference on Data Science in Cyberspace(IEEE DSC2021) Program

October 9-11,Shenzhen,China

Day 1, October 9, 2021 (Main Conference) (Espana Ballroom II)

Day 2, October 10, 2021 (Sessions)

09:00-10:00 Session 1: Social Network (Madrid 2 Hall) Session 2: Situation Awareness (Madrid 3 Hall) Session 3: Cyberspace security I (Madrid 5 Hall)
10:00-10:30 Coffee Break
10:30-11:30 Session 1: Social Network (Madrid 2 Hall) Session 2: Situation Awareness (Madrid 3 Hall) Session 3: Cyberspace security I (Madrid 5 Hall)
11:30-13:30 Lunch Break
13:30-15:30 Session 4: Cyberspace security II (Madrid 2 Hall) Session 5: Deep Learning Algorithms and Applications I (Madrid 3 Hall) Session 6: Deep Learning Algorithms and Applications II (Madrid 5 Hall)
15:30-16:00 Coffee Break
16:00-18:00 Session 7: Knowledge Representation and Discovery (Madrid 2 Hall) Session 8: Intelligent System (Madrid 3 Hall) Session 9: Data Mining (Madrid 5 Hall)
18:00-21:00 Dinner(Galleon)

Day 3, October 11, 2021 (Workshops)

09:00-10:00 MDATA (Madrid 2 Hall) BDBA & MSNFA (Madrid 3 Hall) SAACS (Madrid 5 Hall)
10:00-10:30 Coffee Break
10:30-11:30 MDATA (Madrid 2 Hall) BDBA & MSNFA (Madrid 3 Hall) SAACS (Madrid 5 Hall)
11:30-13:30 Lunch Break
13:30-15:30 DHCA (Madrid 2 Hall) NSAC (Madrid 3 Hall) SAACS (Madrid 5 Hall)
15:30-16:00 Coffee Break
16:00-18:00 VAAL (Madrid 2 Hall) BDMC (Madrid 3 Hall) CCIS (Madrid 5 Hall)
18:00-21:00 Dinner(Galleon)

Main Technical Program

SESSION 1: Social Network

October 10th,09:00-10:00,10:30-11:30,Madrid 2 Hall

  • modeling connection strength in graph neural networks for social influence prediction
    Hongwu Zhuang; Bin Zhou*; Wen Xi; Liqun Gao; Haiyang Wang
  • Rumor Detection on Social Media Using Temporal Dynamic Structure and Emotional Information
    Chenming Wang; Bin Zhou*; Hongkui Tu; Yujia Liu
  • Survey on social event detection
    Yutao Huang*; Ye Wang
  • FIGAT: Accurately Predict Individual Crime Risks with Multi-information Fusion
    Xianzhe Yu

SESSION 2: Situation Awareness

October 10th,09:00-10:00,10:30-11:30,Madrid 3 Hall

  • Network Security Situation Prediction Model Based on The Prediction of Security Situation Factors
    Mingyang Zhang
  • GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security
    Fanzhi Meng
  • Malware classification based on visualization and feature fusion
    Zilin Zhao; Dawei Zhao *; Shudong Li; Shumian Yang
  • Mining Open-Source Cyber Threat Intelligence with Distant Supervision from the Web
    Panpan Zhang*; Jing Ya; Tingwen Liu; Jinqiao Shi

SESSION 3: Cyberspace security I

October 10th,09:00-10:00,10:30-11:30,Madrid 5 Hall

  • Sampled Data Debugging via Fuzzy C-Means
    Mingyang Zhang
  • A Security-Enhanced Modbus TCP Protocol and Authorized Access Mechanism
    Fumin Yi; Lei Zhang; Shumian Yang; Dawei Zhao*
  • Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications
    Zeyu Li*; Meiqi Wang; Xuebin Wang; Jinqiao Shi; Kexin Zou; Majin Su
  • APT Behaviors Detection Based on Email Business Scenarios
    Bo Bai; Yun Feng*; Baoxu Liu; Xutong Wang; Jiaxi Liu; Qingyue Liu; Qixu Liu; Shuang Zhao
  • A Decentralized Access Control Framework For DDS
    Qifeng Luo*; Ruisheng Shi

SESSION 4: Cyberspace security II

October 10th,13:30-15:30,Madrid 2 Hall

  • Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service Detection
    Kexin Zou*; Jinqiao Shi; Yue Gao; Xuebin Wang; Meiqi Wang; Zeyu Li; Majin Su
  • A proxy-protected proxy signature based on SM9
    Sen Yuan
  • The Survey on the development of Secure Multi-Party Computing in Blockchain
    Songqi Wu; Jin Li; Fenghui Duan; Yueming Lu; Xu Zhang; Jiefu Gan*
  • Research on Label Based Data Flow Control Mechanism
    Rongna Xie; Xiaonan Fan*; Jiayu Zhu; Guozhen Shi; Jiapeng Lou; Yuxin Huang
  • LoginSoEasy: a System Enabling both Authentication and Protection of Personal Information based on Trusted User Agent
    Wenyin Liu*; Yin Lin; Zongcheng Qi; Zekai Wu; Guipeng Zhang; Kai Wang; Shuai Fan; Zhenguo Yang

SESSION 5: Deep Learning Algorithms and Applications I

October 10th,13:30-15:30,Madrid 3 Hall

  • Adversarial Residual Variational Graph Autoencoder with Batch Normalization
    Qisheng Liao*; Xu Wu; Xiaqing Xie; Jingchen Wu; Lirong Qiu; Lijuan Sun
  • ResNet Approach for Coding Unit Fast Splitting Decision of HEVC Intra Coding
    Yixiao Li; Lixiang Li*; Zirui Zhuang; Yuan Fang; Yixian Yang
  • Universal Targeted Attack for Image Classification
    Huili Luo*; Zhaoquan Gu; Chuanjin Zhang; Le Wang; Shuhao Li; Zhiqin Chen
  • Improving the Transferability of Adversarial Examples with Advanced Diversity-Ensemble Method
    Yinhu Xu; Qi Chu*; Nenghai Yu
  • Sequence Attention for Multivariate Time Series Forecasting
    Wenrui Wu*; Tao Tao; Jing Shang; Ding Xiao; Chuan Shi; Yong Jiang

SESSION 6: Deep Learning Algorithms and Applications II

October 10th,13:30-15:30,Madrid 5 Hall

  • PTMT: Multi-Target Stance Detection with PTM-enhanced Multi-Task Learning
    Wen Xi*; Chenguang Chen; Hongwu Zhuang; Haiyang Wang; Liqun Gao; Bin Zhou
  • Generate Adversarial examples combined with Image Entropy Distribution
    Wenrong Xie*; Fashan Dong; Haiyang Yu; Zhaoquan Gu; Le Wang; Zhihong Tian
  • FedDeepFM: Ad CTR prediction based on Federated Factorization Machine
    Chenjia Yu; Shuhan Qi; Yang Liu*
  • PRFP: Privacy-respecting and Accurate Device Fingerprinting Identification
    Xunan Gao

SESSION 7: Knowledge Representation and Discovery

October 10th,16:00-18:00,Madrid 2 Hall

  • Relation Extraction based on Data Partition and Representation Integration
    Jiapeng Zhao*; Panpan Zhang; Tingwen Liu; Zhenyu Zhang; Yanzeng Li; Jinqiao Shi
  • A Review of Entity Alignment based on Graph Convolutional Neural Network
    Zeshi Wang*; Mohan Li; Zhaoquan Gu
  • MilKBQA: A Complex Knowledge Base Question Answering Dataset on Chinese Military Fieldv
    Xu Pike*; Zhen Huang; Li Tiejun; He Jiezhong; Ding Sun
  • Survey on Knowledge Graph Embedding Based on Hyperbolic Geometry
    Mengqi Lin*; Ye Wang
  • A Survey on Translating Embedding based Entity Alignment in Knowledge Graphs
    Jin Jiang; Mohan Li*; Zhaoquan Gu

SESSION 8: Intelligent System

October 10th,16:00-18:00,Madrid 3 Hall

  • Audio Steganography with Speech Recognition System
    Hao Tan*; Chenwei Liu; Yinyu Lyu; Xiao Zhang; Denghui Zhang; Zhaoquan Gu
  • Bow-tie Technology Analysis of Safety Risks of Lithium-ion Battery in Air Transport
    Zhang Yan
  • A Novel Deep Neural Network Model for Credit Risk Prediction of Chinese Farmers
    Yalong Xie*; Aiping Li; Ziniu Liu; Kai Chen; Hongkui Tu
  • Universal Pre-Calculating Structure: Reducing Complexity of Ising Chips with Arbitrary Connectivity
    Jian Zhang*; Linghui Lv; Zhi Wang; Yaohua Wang

SESSION 9: Data Mining

October 10th,16:00-18:00,Madrid 5 Hall

  • Acceleration of CUDA-based k-Nearest Neighbor algorithm and Naive Bayesian algorithm
    Huiping Chen
  • Attack-words Guided Sentence Generation for Textual Adversarial Attack
    Huan Zhang*; Yushun Xie; Ziqi Zhu; Jinglling Sun; Chao Li; Zhaoquan Gu
  • Sensitive Image Information Recognition Model of Network Community based on Content Text
    Li Gao*; Xu Wu; Jingchen Wu; Xiaqing Xie; Lirong Qiu;Lijuan Sun
  • High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network
    Yuan Fang; Lixiang Li*; Yixiao Li; Haipeng Peng
  • TCABRS: An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record System
    Aoran Lu*; Weihai Li; Yuanzhi Yao; Nenghai Yu

Workshops

Multi-dimensional Data Association and inTelligent Analysis (MDATA 2021)

Oct 11th,09:00-10:00,10:30-11:30,Madrid 2 Hall

  • Dynamic Topic Model for Tracking Topic Evolution and Measuring Popularity of Scientific Literature
  • A Method for Discovering Hidden Patterns of Cybersecurity Knowledge Based on Hierarchical Clustering
  • An Overview of Entity Alignment: Cross Language and Graph Approaches
  • Hierarchical Cooperative Social Spider Algorithm for Community Detection in Large Network
  • RanPAS A Behavior-based System for Ransomware Detection
  • Identifying Reply Relationships from Telegram Groups Using Multi-Features Fusion
  • A Manifold Learning Method to Passage Retrieval for Open-Domain Question Answering
  • BDCP: An Improved Nested Named Entity Recognition Model Based on LSTM
  • Survey on Temporal Knowledge Graph

Big Data and Business Analytics (BDBA 2021) & Multi-Source Network Fusion and Analysis (MSNFA 2021)

Oct 11th,09:00-10:00,10:30-11:30,Madrid 3 Hall

  • Pneumonia Detection with U-EfficientNet
  • Graph Neural Network Based User Group Comments Interaction Behavior Prediction on Microblog Websites
  • Insider Threat Detection Based on User Historical Behavior and Attention Mechanism
  • Interframe Variance in Vehicle Re-identification
  • A Survey on Smart Home Privacy Data Protection Technology
  • Rooted Subtrees Recursive Neural Networks on Graphs
  • Multi-dimensional Intelligent Network Asset Identification

Big Data Mining for Cyberspace (BDMC 2021)

Oct 11th,09:00-10:00,10:30-11:30,Madrid 5 Hall

  • Research on Requirements Recommendation Method for High-end Equipment Based on Generative Adversarial Networks
  • Self-attention UNet Model for Radar Based Precipitation Nowcasting
  • Adversarial Attacks on Vehicle Re-Identification
  • Research on Strategy Selection of Dynamic Defense Based on Game Theory
  • A Survey of DeepFakes Generation and Detection
  • Generating Highly Structured Inputs: A Survey
  • The controlled sharing mechanism for private data based on blockchain
  • Research on Progress of Blockchain Access Control

Digital Humanities and Computer Arts (DHCA 2021)

Oct 11th,13:30-15:30,Madrid 2 Hall

  • User Experience based Perspective Guidance Method for Immersive Interactive Video
  • Research on the application of digital media technology in media convergence
  • Art Experience Innovation Design in Digital Media Era
  • Analysis of Visual Subject Types in Immersive Image
  • The Manifestation of Gamification in App Content Design

Network Security Analysis for Cyberspace (NSAC 2021)

Oct 11th,13:30-15:30,Madrid 3 Hall

  • Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat Intelligence
  • Review on Fuzz Testing for Protocols in Industrial Control Systems
  • Investigations on Answer Selection Based on Co-attention Guided Stacked BiLSTM with BERT
  • A Method of Malicious Data Flow Detection Based on Convolutional Neural Network
  • A Joint Warning and Notification Mechanism for Cybersecurity Incidents
  • A Survey of Cyber Security Approaches for Prediction

Situation Awareness Analysis for Cyberspace Security (SAACS 2021)

Oct 11th,13:30-15:30,16:00-18:00,Madrid 5 Hall

  • APT Detection Based on Association Rule Mining with Bayesian Model
  • A New Method for Malware Detection Based on Energy
  • Smart grid terminal security assessment method based on subjective and objective comprehensive weighting
  • An android malware detection approach using multi-feature fusion and TF-IDF algorithm
  • High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network
  • A Survey of Advanced Persistent Threats Attack and Defense
  • Detecting Adversarial Samples in Neural Network with Statistical Metrics: A Study
  • An APT Malware Classification Method Based on Adaboost Feature Selection and LightGBM
  • The overview of spin in software model checking
  • Intelligent device identification method based on network packet fingerprint
  • A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning

Vulnerability Analysis and Adversarial Learning (VAAL 2021)

Oct 11th,16:00-18:00,Madrid 2 Hall

  • Code Decoupling Execution Isolating Based on TF Card Firmware Extension
  • Software Misconfiguration Troubleshooting Based on State Analysis
  • A Multilevel Non-interference Vulnerability Analysis Method for Information Leakage Problem
  • Android Malware Detection: Multi Model Collaborative Detection System Based on Credibility
  • IfCut: If Branch Cutting Based Fuzzing System
  • GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network
  • Deep Learning Framework Fuzzing Based on Model Mutation
  • Machine Learning for Software Vulnerability Analysis: A Survey
  • Gradient-oriented gray-box protocol fuzzing

Cybersecurity for Critical Infrastructure Systems (CCIS 2021)

Oct 11th,16:00-18:00,Madrid 3 Hall

  • Security Analysis of Fuzzy Network Graph via Connectivity Indices
  • A Honeypot-enabled SDN-based Selector for Industrial Device Access Control
  • Networked Device Identification: A Survey
  • Differential Cryptanalysis of TweGIFT-128 Based on Neural Network
  • Enhancing Continuous Service of Information Systems Based on Cyber Resilience
  • Information Security Detection Technology for Industrial Control Equipment Modeling Generated by Excitation Traversal Test Based on Big Data
  • Review of Firmware Homology Detection:a System Aspect
footer