Program

The 8th IEEE International Conference on Data Science in Cyberspace (IEEE DSC 2023)

August 18-20, 2023

Empark Grand Hotel (Anhui), Hefei, China

Day1, August 18, 2023 (Main Conference, Banquet Hall 1&2)
Time Event
08:30-09:00 Opening Ceremony & Welcoming Speech
09:00-09:45 Keynote I: Data Security Protection from the Perspective of Three Core Attributes
Binxing Fang, Academician, Chinese Academy of Engineering
09:45-10:30 Keynote II: 4D Millimeter Wave Radar and Auto Driving
Jianqi Wu, Academician, Chinese Academy of Engineering
10:30-10:50 Group Photo & Coffee Break
10:50-11:35 Keynote III: The MDATA Model and Its Applications
Yan Jia, Peng Cheng Laboratory
11:35-12:20 Keynote IV: Neural-enhanced Edge: Towards Operationalized AI in Cooperative Cloud-Edge Ecosystems
Song Guo, The Hong Kong Polytechnic University
12:20-14:00 Lunch Break
Invited Talk, Yunnan Hall 1&2
14:00-14:30 Invited Talk I:Heterogeneous Graph Computing
Chuan Shi, Beijing University of Posts and Telecommunications
14:30-15:00 Invited Talk II:Multimodal Named Entity Recognition and Relation Extraction
Yi Cai, South China University of Technology
15:00-15:20 Coffee Break
Sessions
15:20-17:00 Session 1:
Cyberspace security
(Yunnan Hall 1&2)
Session 2:
Knowledge Representation and Discovery
(Yunnan Hall 3)
Session 3:
Intelligent System
(Anhui Hall)
17:40-18:00 Awarding Ceremony Outstanding Paper Awards (Banquet Hall 1&2)
18:00-20:00 Banquet & Performances (Banquet Hall 1&2)
Day 2, August 19, 2023 (Invited Talk, Yunnan Hall 1&2)
Time Event
09:00-09:30 Invited Talk III: Software Intelligent Vulnerability Detection and Supply Chain Security
Deqing Zou, Huazhong University of Science and Technology
09:30-10:00 Invited Talk IV:Video content distribution, transmission and generation
Kaigui Bian, Peking University
10:00-10:20 Coffee Break
Sessions
10:20-12:00 Session 4:
Data Security and Privacy
(Yunnan Hall 1&2)
Session 5:
Deep Learning Algorithms and Applications I
(Yunnan Hall 3)
Session 6:
Network Attack and Defense
(Anhui Hall)
12:00-14:30 Lunch Break
14:30-17:30 Session 7:
Situation Awareness
(Yunnan Hall 1&2)
Session 8:
Machine Learning
(Yunnan Hall 3)
Session 9:
Deep Learning Algorithms and Applications II
(Anhui Hall)
18:00-20:00 Dinner
Day 3, August 20, 2023 (Workshops, Banquet Hall 1&2&3)
Time Event
09:00-10:20 MDATA
(Banquet Hall 1)
SAACS
(Banquet Hall 2)
VAAL
(Banquet Hall 3)
10:20-10:40 Coffee Break
10:40-12:00 MDATA
(Banquet Hall 1)
SAACS
(Banquet Hall 2)
VAAL
(Banquet Hall 3)
12:00-14:00 Lunch Break
14:00-15:40 NSAC
(Banquet Hall 1)
BDBA
(Banquet Hall 2)
GRLA
(Banquet Hall 3)
15:40-16:00 Coffee Break
16:00-18:00 NSAC
(Banquet Hall 1)
BDBA
(Banquet Hall 2)
GRLA
(Banquet Hall 3)
18:00-20:00 Dinner

Main Technical Program

SESSION 1: Cyberspace security

August 18th, 15:20-17:00, Yunnan Room 1 and 2

  • Fusing Security Alerts Improves Cyber-Security: An Alert Normalization Framework for Heterogeneous Devices
    Songxuan Wei; Yushun Xie; Angxiao Zhao; Xiao Jing; Cui Luo; Zhaoquan Gu
  • DACTI: a Generation-Based Data Augmentation Method for Cyber Threat Intelligence
    Jingbing Chen; Yali Gao; Xiaoyong Li
  • Building a High-performance Data Channel for the Federal Cyber Range
    Zengxie Ma; Ning Hu; Bo Qu; Yao Xin; Shengan Song; Xinyi Qiu
  • SCOBERT: A Pre-trained BERT for Smart Contract Vulnerability Detection
    Guojin Sun; Chi Jiang; Jinqing Shen; Yin Zhang
  • Logic-Based Trust Model for Maritime Cyber Intelligence with Enhanced Trustworthiness
    Yuhang Wang

SESSION 2: Knowledge Representation and Discovery

August 18th, 15:20-17:00, Yunnan Room 3

  • Knowledge Graph Embedding for Adaptive Negative Subsampling
    Dong Zhu; Le Wang; Yujie Feng; Haonan Tan
  • A Simplified Variant for Graph Convolutional Network based Knowledge Graph Completion Model
    Yashen Wang; Qiang Li; Yi Zhang; Xuecheng Zhang; Zhuoya Ju; Jian Sun
  • Multimodal Features Enhanced Named Entity Recognition based on Self-Attention Mechanism
    Changqing Li; Ye Qian; Li Pan
  • Research on the prospect of Knowledge Graph Completion based on the Federated Setting
    Anxiao Zhao; Yunhui Liu; Songxuan Wei; Yu Long; Wenying Feng; Zhaoquan Gu
  • Multi-modal Knowledge Representation: A Survey
    Weiqi Hu; Ye Wang; Yan Jia

SESSION 3: Intelligent System

August 18th, 15:20-17:00, Anhui Room

  • Analyzing Security Attacks Against Platoon of Intelligent and Connected Vehicles
    Liqun Sun; Yulu Qi; Shuqiang Yang; Weihong Han; Xiaoxia Li
  • Particle Filter Localization Algorithm based on LOS Possibility for Smart Vehicle Digital Key
    Zihan Zhou; WeiYi Hu; Yiran Tian; Lei Luo; Yun Li; Lirong Chen
  • Towards Scale-aware Self-supervised Multi-Frame Depth Estimation with IMU Motion Dynamics
    Yipeng Lu; Denghui Zhang; Zhaoquan Gu; Jing Qiu
  • Blockchain storage method based on Erasure Code
    Fanyao Meng; Jin Li; Jiaqi Gao; Junjie Liu; Junpeng Ru; Yueming Lu
  • Based on Linkable Ring Signature Map Review Scheme for Zero-trust Autonomous Vehicles
    Min Zhang; Qing Ye; Kaihuan Deng

SESSION 4: Data Security and Privacy

August 19th, 10:20-12:00, Yunnan Room 1 and 2

  • The Intelligent Information Search System IISI and Its Key Technologies for Internet Big Data
    Zhengjun Huang; Weihong Han; Yangyang Mei; Kaihan Lin
  • CoReg: Membership Privacy Protection via Collaborative Regularization
    Yuncong Yang; Minghao Lai; Xiao Han
  • A blockchain-based secure data sharing approach with proxy re-encryption
    Jiahao Liu; Chao Li; Ruoyu Wang; Wuhao Xia
  • Quantitative Dynamic Scalability Model and Analysis of Blockchain Database System
    Jiacheng Wei; Qingmei Wang; Zheng Wang
  • Data Governance: Status, Technologies, Applications and Trends
    Haiyang Zhu; Xiaofeng Chen; Suyan Li; Yejin Wang; Xinwei Fang; Minfeng Zhu

SESSION 5: Deep Learning Algorithms and Applications I

August 19th, 10:20-12:00, Yunnan Room 3

  • Universal Adversarial Perturbation From Dominant Feature For Speaker Recognition
    Xiaochen Liu; Jerry Tam; Junjian Zhang; Aiping Li; Zhaoquan Gu
  • Multi-task learning for Game Review Classification with Emotion and Sarcasm Detection
    Xinchen Xia; Yuee Huang; Yiwen Zhang
  • Anti-breast cancer active compound screening method based on simulated annealing algorithm and BP neural network
    Haonan Tan; Yunhui Liu; Le Wang; Jie Jiang; Jianyu Deng; Dong Zhu
  • Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency Parsing
    Xinru Huan; Jiapeng Zhao; Jinqiao Shi; Yanwei Sun; Xuebin Wang; Liyan Shen
  • Hierarchical Abstract Syntax Tree Representation Learning Based on Graph Coarsening for Program Classification
    Yizu Yang; Yuzhang Li; Zeyu He; Chunlu Wang

SESSION 6: Network Attack and Defense

August 19th, 10:20-12:00, Anhui Room

  • OBiLSTM-based Intrusion Detection Method for Industrial Internet of Things
    Shuai Xu; Xinyong Peng; Dandan Huang; Changsong Yang; Yong Ding; Hai Liang
  • Bi-ETC: A Bidirectional Encrypted Traffic Classification Model Based on BERT and BiLSTM
    Xiting Ma; Tao Liu; Ning Hu; Xin Liu
  • AlBERT: A Language-Agnostic Graph Neural Network Model for Vulnerability Detection
    Nurali Sarbakysh; Zheng Wang
  • An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversamping for Intrusion Detection
    Zhuoer Lu; Xiaoyong Li; Pengfei Qiu
  • CAKG: A Framework For Cybersecurity Threat Detection Of Automotive Via Knowledge Graph
    Peng Yang; Lijie Wang; Yun Li; Xuedong Song; Yaxin Wang; Biheng Guo

SESSION 7: Situation Awareness

August 19th, 14:30-17:30, Yunnan Room 1 and 2

  • Software Vulnerability Detection with GPT and In-Context Learning
    Zhihong Liu; Qing Liao; Wenchao Gu; Cuiyun Gao
  • GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles based on Generative Adversarial Networks
    Xiansen Chan; Kun Xiao; Lei Luo; Yun Li; Lirong Chen
  • Network Security Evaluation for Space-Ground Integrated Networks Based on Network Simulation
    Haibo Ye; Lei Zhao; Leiting Tao; Xiaofeng Wang
  • OIDMD: A Novel Open-Set Intrusion Detection Method Based on Mahalanobis Distance
    Yunhui Liu; Angxiao Zhao; Lei Du; Chenhui Zhang; Hao Yan; Zhaoquan Gu
  • A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-insurance
    Junzheng Yang; Lulu liang; Jiayin Qi

SESSION 8: Machine Learning

August 19th, 14:30-17:30, Yunnan Room 3

  • An Interpretable Data-Driven Approach for Employee Ability Assessment
    Youming Zhang; Zhizheng Li; Lei Wang; Yan Lv; Yan Xiong; Liu Yang
  • A Novel Concept-Driven Negative Sampling Mechanism for Enhancing Semanticity and Interpretability of Knowledge Graph Completion Task
    Liu Yuan; Yashen Wang; Tianzhu Chen; Xuecheng Zhang; Chenyu Liu; Yi Zhang
  • Collaborative learning for cross-organizational data sharing using Hyperledger Fabric
    Yaling Zheng; Ziwen Cheng; Yi Liu; Bowen Wang
  • Improved Grey Wolf Optimization Algorithm Based on Arctangent Inertia Weight
    Junfang Shi; Mingyao Chen; Yong Yang
  • Self-Disclosure Causality Detection:Discover What Cause the Self-Disclosure
    HaoJie Chen; Jiapeng Zhao; Jinqiao Shi; Xuebin Wang; Liyan Shen; Yanwei Sun

SESSION 9: Deep Learning Algorithms and Applications II

August 19th, 14:30-17:30, Anhui Room

  • Weak Feature Defect Generation with GAN for Faster RCNN based PCB Defect Detection
    Chao Li; Wuhao Xia; ZhengLiang Jiang
  • An image emotion classification method based on supervised contrastive learning
    Qing Zhang; Jianshan Sun; Kun Yuan; Yuanchun Jiang
  • Cluster Analysis of Target Events Based on Multidimensional Network Traffic Characteristics
    Zhaoxuan Lv; Jiahao Qi; Jiachen Zhang; Junmei Ding; Yueming Lu
  • Leveraging Concept-Enhanced Pre-Training Model and Masked-Concept Language Model for Shot-Text Conceptualization
    Xiaoling Zhu; Yashen Wang; Yi Zhang; Xuecheng Zhang

Workshops

Multi-dimensional Data Association and inTelligent Analysis (MDATA 2023)

August 20th, 09:00-12:00 (Banquet Hall 1)

  • FedValidate: A Robust Federated Learning Framework based on Client-side Validation
    Wenting Zhu; Zhe Liu; Zongyi Chen; Chuan Shi; Xi Zhang; Sanchuan Guo
  • Research and Implementation of Bluetooth AOA Indoor Positioning System
    Kun Xiao, Fuzhong Hao, Weijian Zhang, Nuannuan Li, Haiyan Zhi, Yintao wang
  • Analysis and Reflection on the Situation of Industrial Information Security Ransomware Attacks
    Dong Liu; Yang Liu; Zhicheng Liu; Xiaofei Zhang; Xueying Zhang
  • A HMM-Based ICS Adaptive Deception Defense Framework
    JiaWei Luo; Tao Liu; MengEn Liang; Ning Hu
  • Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace
    Weidong Shi; Fan Mingrui; Jiaqi Gao; Qi Jiahao; Daoqi Han; Yueming Lu
  • Efficient lightweight intrusion detection method for IoT OS:A study on the application of multi-teacher distillation
    Pengyu Zhang; Kun Xiao; Lei Luo; Yun Li; Lirong Chen
  • Research Ideas on Network Security Experiment and Appraisal of Avionics System
    Zhuoran Chen; Hongyu Zhu; Chen Yi; Zhen Liu
  • Research on Fault Diagnosis Model of Shearer Cutting Motor Based on Fuzzy Neural Network and Expert System
    Wei Han; Yiliang Xia; Haoyu Xue; Mengxuan Sun; Jinliang Chen; Gong Cao; Gang Lin

Situation Awareness Analysis for Cyberspace Security (SAACS 2023)

August 20th, 09:00-12:00 (Banquet Hall 2)

  • An Evaluation Method of Vehicle-Road-Cloud Collaborative System Security Situation Based on (CD)2 -A Elastic Computing Framework
    Shizhun Jia; Tian Zhang; Wenhui Lin; Mi Zhou; Xiaoxia Li
  • Identifying Mobile Application over Shadowsocks with Single-direction Traffic
    Simiao Cui; Pengxiao Li; Xi Zhang; Ming Zhang; Sanchuan Guo

Vulnerability Analysis and Adversarial Learning (VAAL 2023)

August 20th, 09:00-12:00 (Banquet Hall 3)

  • Threat-Aware Data Transmission in Software-Defined Networks
    Zhongbai Jiang; Yanwei Sun; Beibei Li; Bowen Sun; Shenduo Xiong; Yehao Li; Wenyue Du
  • The Report of Standardlization for Blockchain-based Digital Right Management System
    TianJian Zhao
  • Machine Learning Security Analysis Framework Based on Threat Matrix
    Hu Li
  • Survey on Fuzzing Techniques in Deep Learning Libraries
    Jiahe Ji; Wei Kong; Jianwen Tian; Taotao Gu; Yuanping Nie; Xiaohui Kuang
  • Adversarial Example Detection for Deep Neural Networks: A Review
    Chongyang Zhao; Hu Li; Dongxia Wang; Ruiqi Liu
  • A Blackbox Fuzzing Based on Automated State Machine Extraction
    Zhaowei Zhang; Wenjing Yu; Zibin Wang; Youlin Xiang
  • MDATA Model based Cyber Security Knowledge Representation and Application
    Yu Long
  • Automatically Identifying Sentences with Attack Behavior from Cyber Threat Intelligence Reports
    Jing Qiu; Junjun Chen; Chengliang Gao; Fei Tang; Jiaxu Xing; Dongyang Zheng

Network Security Analysis for Cyberspace (NSAC 2023)

August 20th, 14:00-18:00 (Banquet Hall 1)

  • Multi-secret sharing scheme based on XOR operations in combination with AES-GCM
    Haoyi Sun; Shuihai Zhang; Chunli Lv
  • FixGPT: A novel three-tier deep learning model for automated program repair
    Wenhao Ye; Jun Xia; Shuo Feng; Xiangyu Zhong; Shuai Yuan; Zhitao Guan
  • Towards Accurate and Efficient Super Spreader Detection with Sketching
    Shouyou Song; Pu Wang; Yangchun Li; Nanyang Wang; Wei Jiang
  • A Intrusion Detection Method of Industrial Internet of Things based on one-dimensional cropping multi-model
    Lei Wang; Tong Li; Chao Yang; Yang Liu; Jian Chen; Zhongjie Wang
  • Analysis and Research of Neural Network Adversarial Samples for Power Grid Security
    Bokai Li; Shenglong Wu; Yuke Yang; Geyao Zhang
  • Application of Real-time Big Data Technology in Complex Power Engineering Management
    Shenglong Wu; Boyang Cui; Yaqi Zhang
  • A Trust Usage Control Approach for Media Player Based on Intel SGX
    Ruoyu Wang; Junjian Li; Chao Li; Naqin Zhou; Jiahao Liu
  • Toward the Secure Transmission of Large-Scale Images in Autonomous Driving
    Lijing Ren; Denghui Zhang; Qingduo Zeng; Zhaoquan Gu

Big Data and Business Analytics (BDBA 2023)

August 20th, 14:00-18:00 (Banquet Hall 2)

  • Exploring the Factors and Influence Mechanisms of User Loyalty for Generative AI
    Ang Zeng; Xusen Cheng; Yajie Wang
  • Research on Recommendation Algorithms Based on Asymmetric Attention Mechanism Models
    Xiulei Wang; Sisi Chen; Jianzhang Zhang; Xiuxiu Zhan; Chuang Liu
  • An Unsupervised Graph Embedding Method Based on Dynamic Graph Attention Networks and Infomax for Link Prediction
    Jingzhu Lu
  • Hot spot analysis of rural e-commerce based on digital economy
    Jing Zheng; Xing Zhu
  • Assessing the risk of heavy metal mixture exposure and its association with cancer mortality
    Yanan Du
  • A Data Sharing and Access Control Model Based on Blockchain
    Xu Lin
  • A Review of User Identity Linkage Across Social Networks
    Danna Lu; Qing Li; Liu Zikang; Shumei Li; Xiaobo Wu; Shudong Li
  • Violence Detection In Videos via Motion-Guided Global and Local Views
    Ning Su; Lijuan Sun; Jingchen Wu; Xu Wu; Yutong Gao

Graph Representation Learning and its Applications (GRLA 2023)

August 20th, 14:00-18:00 (Banquet Hall 3)

  • Graph Pattern Matching based Intelligent Operation and Maintenance Method for Cloud Resource Operation
    Lin Qiao; Ruiting Qu; Qing Song; Xuming Lu; Lixia Wang; Jun Qi
  • Service Resources Mining Based on Association Rules
    Ruiting Qu; Lin Qiao; Qing Song; Yuanqi Yu; Zhenjiang Lei; Ran Ran; Haomiao Wang; Tianbo Wang
  • Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis
    Changchang Ma; Denghui Zhang; Zhang Junjian; Le Wang; Hao Li; Zhaoquan Gu
  • SSDAEE: Semi-Supervised Data-Augmented Event Extraction for Transfer Learning
    Yueyue Shen
  • UAV forest fire surveillance model based on graph edge detection and cellular automata
    Kai Li
  • EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature Mining
    Fanfeixue Meng
footer