Program
Program at a Glance
The 6th IEEE International Conference on Data Science in Cyberspace(IEEE DSC2021) Program
October 9-11,Shenzhen,China
Day 1, October 9, 2021 (Main Conference) (Espana Ballroom II)
Day 2, October 10, 2021 (Sessions)
09:00-10:00 | Session 1: Social Network (Madrid 2 Hall) | Session 2: Situation Awareness (Madrid 3 Hall) | Session 3: Cyberspace security I (Madrid 5 Hall) |
10:00-10:30 | Coffee Break | ||
10:30-11:30 | Session 1: Social Network (Madrid 2 Hall) | Session 2: Situation Awareness (Madrid 3 Hall) | Session 3: Cyberspace security I (Madrid 5 Hall) |
11:30-13:30 | Lunch Break | ||
13:30-15:30 | Session 4: Cyberspace security II (Madrid 2 Hall) | Session 5: Deep Learning Algorithms and Applications I (Madrid 3 Hall) | Session 6: Deep Learning Algorithms and Applications II (Madrid 5 Hall) |
15:30-16:00 | Coffee Break | ||
16:00-18:00 | Session 7: Knowledge Representation and Discovery (Madrid 2 Hall) | Session 8: Intelligent System (Madrid 3 Hall) | Session 9: Data Mining (Madrid 5 Hall) |
18:00-21:00 | Dinner(Galleon) |
Day 3, October 11, 2021 (Workshops)
09:00-10:00 | MDATA (Madrid 2 Hall) | BDBA & MSNFA (Madrid 3 Hall) | SAACS (Madrid 5 Hall) |
10:00-10:30 | Coffee Break | ||
10:30-11:30 | MDATA (Madrid 2 Hall) | BDBA & MSNFA (Madrid 3 Hall) | SAACS (Madrid 5 Hall) |
11:30-13:30 | Lunch Break | ||
13:30-15:30 | DHCA (Madrid 2 Hall) | NSAC (Madrid 3 Hall) | SAACS (Madrid 5 Hall) |
15:30-16:00 | Coffee Break | ||
16:00-18:00 | VAAL (Madrid 2 Hall) | BDMC (Madrid 3 Hall) | CCIS (Madrid 5 Hall) |
18:00-21:00 | Dinner(Galleon) |
Main Technical Program
SESSION 1: Social Network
October 10th,09:00-10:00,10:30-11:30,Madrid 2 Hall
- modeling connection strength in graph neural networks for social influence prediction
Hongwu Zhuang; Bin Zhou*; Wen Xi; Liqun Gao; Haiyang Wang - Rumor Detection on Social Media Using Temporal Dynamic Structure and Emotional Information
Chenming Wang; Bin Zhou*; Hongkui Tu; Yujia Liu - Survey on social event detection
Yutao Huang*; Ye Wang - FIGAT: Accurately Predict Individual Crime Risks with Multi-information Fusion
Xianzhe Yu
SESSION 2: Situation Awareness
October 10th,09:00-10:00,10:30-11:30,Madrid 3 Hall
- Network Security Situation Prediction Model Based on The Prediction of Security Situation Factors
Mingyang Zhang - GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security
Fanzhi Meng - Malware classification based on visualization and feature fusion
Zilin Zhao; Dawei Zhao *; Shudong Li; Shumian Yang - Mining Open-Source Cyber Threat Intelligence with Distant Supervision from the Web
Panpan Zhang*; Jing Ya; Tingwen Liu; Jinqiao Shi
SESSION 3: Cyberspace security I
October 10th,09:00-10:00,10:30-11:30,Madrid 5 Hall
- Sampled Data Debugging via Fuzzy C-Means
Mingyang Zhang - A Security-Enhanced Modbus TCP Protocol and Authorized Access Mechanism
Fumin Yi; Lei Zhang; Shumian Yang; Dawei Zhao* - Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications
Zeyu Li*; Meiqi Wang; Xuebin Wang; Jinqiao Shi; Kexin Zou; Majin Su - APT Behaviors Detection Based on Email Business Scenarios
Bo Bai; Yun Feng*; Baoxu Liu; Xutong Wang; Jiaxi Liu; Qingyue Liu; Qixu Liu; Shuang Zhao - A Decentralized Access Control Framework For DDS
Qifeng Luo*; Ruisheng Shi
SESSION 4: Cyberspace security II
October 10th,13:30-15:30,Madrid 2 Hall
- Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service Detection
Kexin Zou*; Jinqiao Shi; Yue Gao; Xuebin Wang; Meiqi Wang; Zeyu Li; Majin Su - A proxy-protected proxy signature based on SM9
Sen Yuan - The Survey on the development of Secure Multi-Party Computing in Blockchain
Songqi Wu; Jin Li; Fenghui Duan; Yueming Lu; Xu Zhang; Jiefu Gan* - Research on Label Based Data Flow Control Mechanism
Rongna Xie; Xiaonan Fan*; Jiayu Zhu; Guozhen Shi; Jiapeng Lou; Yuxin Huang - LoginSoEasy: a System Enabling both Authentication and Protection of Personal Information based on Trusted User Agent
Wenyin Liu*; Yin Lin; Zongcheng Qi; Zekai Wu; Guipeng Zhang; Kai Wang; Shuai Fan; Zhenguo Yang
SESSION 5: Deep Learning Algorithms and Applications I
October 10th,13:30-15:30,Madrid 3 Hall
- Adversarial Residual Variational Graph Autoencoder with Batch Normalization
Qisheng Liao*; Xu Wu; Xiaqing Xie; Jingchen Wu; Lirong Qiu; Lijuan Sun - ResNet Approach for Coding Unit Fast Splitting Decision of HEVC Intra Coding
Yixiao Li; Lixiang Li*; Zirui Zhuang; Yuan Fang; Yixian Yang - Universal Targeted Attack for Image Classification
Huili Luo*; Zhaoquan Gu; Chuanjin Zhang; Le Wang; Shuhao Li; Zhiqin Chen - Improving the Transferability of Adversarial Examples with Advanced Diversity-Ensemble Method
Yinhu Xu; Qi Chu*; Nenghai Yu - Sequence Attention for Multivariate Time Series Forecasting
Wenrui Wu*; Tao Tao; Jing Shang; Ding Xiao; Chuan Shi; Yong Jiang
SESSION 6: Deep Learning Algorithms and Applications II
October 10th,13:30-15:30,Madrid 5 Hall
- PTMT: Multi-Target Stance Detection with PTM-enhanced Multi-Task Learning
Wen Xi*; Chenguang Chen; Hongwu Zhuang; Haiyang Wang; Liqun Gao; Bin Zhou - Generate Adversarial examples combined with Image Entropy Distribution
Wenrong Xie*; Fashan Dong; Haiyang Yu; Zhaoquan Gu; Le Wang; Zhihong Tian - FedDeepFM: Ad CTR prediction based on Federated Factorization Machine
Chenjia Yu; Shuhan Qi; Yang Liu* - PRFP: Privacy-respecting and Accurate Device Fingerprinting Identification
Xunan Gao
SESSION 7: Knowledge Representation and Discovery
October 10th,16:00-18:00,Madrid 2 Hall
- Relation Extraction based on Data Partition and Representation Integration
Jiapeng Zhao*; Panpan Zhang; Tingwen Liu; Zhenyu Zhang; Yanzeng Li; Jinqiao Shi - A Review of Entity Alignment based on Graph Convolutional Neural Network
Zeshi Wang*; Mohan Li; Zhaoquan Gu - MilKBQA: A Complex Knowledge Base Question Answering Dataset on Chinese Military Fieldv
Xu Pike*; Zhen Huang; Li Tiejun; He Jiezhong; Ding Sun - Survey on Knowledge Graph Embedding Based on Hyperbolic Geometry
Mengqi Lin*; Ye Wang - A Survey on Translating Embedding based Entity Alignment in Knowledge Graphs
Jin Jiang; Mohan Li*; Zhaoquan Gu
SESSION 8: Intelligent System
October 10th,16:00-18:00,Madrid 3 Hall
- Audio Steganography with Speech Recognition System
Hao Tan*; Chenwei Liu; Yinyu Lyu; Xiao Zhang; Denghui Zhang; Zhaoquan Gu - Bow-tie Technology Analysis of Safety Risks of Lithium-ion Battery in Air Transport
Zhang Yan - A Novel Deep Neural Network Model for Credit Risk Prediction of Chinese Farmers
Yalong Xie*; Aiping Li; Ziniu Liu; Kai Chen; Hongkui Tu - Universal Pre-Calculating Structure: Reducing Complexity of Ising Chips with Arbitrary Connectivity
Jian Zhang*; Linghui Lv; Zhi Wang; Yaohua Wang
SESSION 9: Data Mining
October 10th,16:00-18:00,Madrid 5 Hall
- Acceleration of CUDA-based k-Nearest Neighbor algorithm and Naive Bayesian algorithm
Huiping Chen - Attack-words Guided Sentence Generation for Textual Adversarial Attack
Huan Zhang*; Yushun Xie; Ziqi Zhu; Jinglling Sun; Chao Li; Zhaoquan Gu - Sensitive Image Information Recognition Model of Network Community based on Content Text
Li Gao*; Xu Wu; Jingchen Wu; Xiaqing Xie; Lirong Qiu;Lijuan Sun - High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network
Yuan Fang; Lixiang Li*; Yixiao Li; Haipeng Peng - TCABRS: An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record System
Aoran Lu*; Weihai Li; Yuanzhi Yao; Nenghai Yu
Workshops
Multi-dimensional Data Association and inTelligent Analysis (MDATA 2021)
Oct 11th,09:00-10:00,10:30-11:30,Madrid 2 Hall
- Dynamic Topic Model for Tracking Topic Evolution and Measuring Popularity of Scientific Literature
- A Method for Discovering Hidden Patterns of Cybersecurity Knowledge Based on Hierarchical Clustering
- An Overview of Entity Alignment: Cross Language and Graph Approaches
- Hierarchical Cooperative Social Spider Algorithm for Community Detection in Large Network
- RanPAS A Behavior-based System for Ransomware Detection
- Identifying Reply Relationships from Telegram Groups Using Multi-Features Fusion
- A Manifold Learning Method to Passage Retrieval for Open-Domain Question Answering
- BDCP: An Improved Nested Named Entity Recognition Model Based on LSTM
- Survey on Temporal Knowledge Graph
Big Data and Business Analytics (BDBA 2021) & Multi-Source Network Fusion and Analysis (MSNFA 2021)
Oct 11th,09:00-10:00,10:30-11:30,Madrid 3 Hall
- Pneumonia Detection with U-EfficientNet
- Graph Neural Network Based User Group Comments Interaction Behavior Prediction on Microblog Websites
- Insider Threat Detection Based on User Historical Behavior and Attention Mechanism
- Interframe Variance in Vehicle Re-identification
- A Survey on Smart Home Privacy Data Protection Technology
- Rooted Subtrees Recursive Neural Networks on Graphs
- Multi-dimensional Intelligent Network Asset Identification
Big Data Mining for Cyberspace (BDMC 2021)
Oct 11th,09:00-10:00,10:30-11:30,Madrid 5 Hall
- Research on Requirements Recommendation Method for High-end Equipment Based on Generative Adversarial Networks
- Self-attention UNet Model for Radar Based Precipitation Nowcasting
- Adversarial Attacks on Vehicle Re-Identification
- Research on Strategy Selection of Dynamic Defense Based on Game Theory
- A Survey of DeepFakes Generation and Detection
- Generating Highly Structured Inputs: A Survey
- The controlled sharing mechanism for private data based on blockchain
- Research on Progress of Blockchain Access Control
Digital Humanities and Computer Arts (DHCA 2021)
Oct 11th,13:30-15:30,Madrid 2 Hall
- User Experience based Perspective Guidance Method for Immersive Interactive Video
- Research on the application of digital media technology in media convergence
- Art Experience Innovation Design in Digital Media Era
- Analysis of Visual Subject Types in Immersive Image
- The Manifestation of Gamification in App Content Design
Network Security Analysis for Cyberspace (NSAC 2021)
Oct 11th,13:30-15:30,Madrid 3 Hall
- Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat Intelligence
- Review on Fuzz Testing for Protocols in Industrial Control Systems
- Investigations on Answer Selection Based on Co-attention Guided Stacked BiLSTM with BERT
- A Method of Malicious Data Flow Detection Based on Convolutional Neural Network
- A Joint Warning and Notification Mechanism for Cybersecurity Incidents
- A Survey of Cyber Security Approaches for Prediction
Situation Awareness Analysis for Cyberspace Security (SAACS 2021)
Oct 11th,13:30-15:30,16:00-18:00,Madrid 5 Hall
- APT Detection Based on Association Rule Mining with Bayesian Model
- A New Method for Malware Detection Based on Energy
- Smart grid terminal security assessment method based on subjective and objective comprehensive weighting
- An android malware detection approach using multi-feature fusion and TF-IDF algorithm
- High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network
- A Survey of Advanced Persistent Threats Attack and Defense
- Detecting Adversarial Samples in Neural Network with Statistical Metrics: A Study
- An APT Malware Classification Method Based on Adaboost Feature Selection and LightGBM
- The overview of spin in software model checking
- Intelligent device identification method based on network packet fingerprint
- A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning
Vulnerability Analysis and Adversarial Learning (VAAL 2021)
Oct 11th,16:00-18:00,Madrid 2 Hall
- Code Decoupling Execution Isolating Based on TF Card Firmware Extension
- Software Misconfiguration Troubleshooting Based on State Analysis
- A Multilevel Non-interference Vulnerability Analysis Method for Information Leakage Problem
- Android Malware Detection: Multi Model Collaborative Detection System Based on Credibility
- IfCut: If Branch Cutting Based Fuzzing System
- GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network
- Deep Learning Framework Fuzzing Based on Model Mutation
- Machine Learning for Software Vulnerability Analysis: A Survey
- Gradient-oriented gray-box protocol fuzzing
Cybersecurity for Critical Infrastructure Systems (CCIS 2021)
Oct 11th,16:00-18:00,Madrid 3 Hall
- Security Analysis of Fuzzy Network Graph via Connectivity Indices
- A Honeypot-enabled SDN-based Selector for Industrial Device Access Control
- Networked Device Identification: A Survey
- Differential Cryptanalysis of TweGIFT-128 Based on Neural Network
- Enhancing Continuous Service of Information Systems Based on Cyber Resilience
- Information Security Detection Technology for Industrial Control Equipment Modeling Generated by Excitation Traversal Test Based on Big Data
- Review of Firmware Homology Detection:a System Aspect