Program
Program at a Glance
Main Technical Program
Session 1: DEEP LEARNING ALGORITHM AND APPLICATIONS 1
Session Chair:Zhaoquan GuJune 24th, 16:30 - 18:00, Meeting Room #7
-
Differentially Private Convolutional Neural Networks with Adaptive Gradient Descent
Xixi Huang (Harbin Institute of Technology (Shenzhen)); Jian Guan (Harbin engineering university); Bin Zhang (Peng Cheng Laboratory); Shuhan Qi (Harbin Institute of Technology, Shenzhen); Xuan Wang (Harbin Institute of Technology); Qing Liao (Harbin Institute of Technology (Shenzhen)) -
Design of High Performance Convolutional Neural Network for Lightweight Platform
Daihui Li (Guangxi Normal University); Shangyou Zeng (Guangxi Normal University); Yue Zhou (Guangxi Normal University); Bing Pan (Guangxi Normal University); Lei Yang (Guangxi Normal University) -
Research on data caching method of gradient consistent hash
XU Kai (Shandong University of Science and Technology); LI Xujian (Shandong University of Science and Technology) -
RnnTd: An Approach based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases
Xiaoding Guo (Harbin Institute of Technology); Hongli Zhang (Harbin Institute of Technology); Lin Ye (Harbin Institute of Technology); Shang Li (Harbin Institute of Technology)
Session 2: CYBERSPACE SECURITY 1
Session Chair: Aiping LiJune 24th, 16:30 - 18:00, Meeting Room #8
-
The Improved Model for Anomaly Detection based on Clustering and Dividing of Flow
Ao Liu (Tianjin University of Technology); Bin Sun (Tianjin University of Technology) Research of Trojan attack effect evaluation based on FAHP Haocheng Zhong ( National University of Defense Technology) -
Research of Trojan attack effect evaluation based on FAHP
Haocheng Zhong ( National University of Defense Technology) -
Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments
Hailong Yao (Lanzhou City University); Xingbing Fu (Hangzhou Dianzi University); Caifen Wang (Shenzhen Technology University); Congcong Meng (Lanzhou City University); Bo Hai (Lanzhou City University); Shiqiang Zhu (Lanzhou City University) -
AutoDE: Automated Vulnerability Discovery and Exploitation
Dong Ye, Sheng Zhang, Hui Wang, Jiajun Cheng, Xin Zhang, Zhaoyun Ding and Pei Li (National University of Defense Technology)
Session 3: DEEP LEARNING ALGORITHM AND APPLICATIONS 2
Session Chair:Zhaoquan GuJune 25th, 10:30 - 12:00, Meeting Room #7
-
Attentive Context-aware Music Recommendation
Yu Tao (Peking University); Yuanxing Zhang (Peking University); Kaigui Bian (Peking University) -
Rebalancing the Car Sharing System A Reinforcement Learning Method
Lixingjian An (Zhejiang University); Changwei Ren (Zhejiang University); Zhaoquan Gu (Guangzhou University); Yuexuan Wang (Zhejiang University/The University of Hong Kong); Yunjun Gao (Zhejiang University) -
FS-Net: Medical image denoising via local receptive field smoothing network
Xiong Jiaxin (BEIJING INSTITUTE OF TECHNOLOGY); Xiaowei Wang (Command Automation College, PLA Army Engineering University); Rui Wang ( Harbin Institute of Technology); Worku Jifara Sori (Harbin Institute of technology); Wang Jingtian (Mary Star of the Sea High School); Shaohui Liu (Harbin Institute of Technology) -
Multi-node Mode Decomposition Based Deep Learning Model for Road Section Traffic Prediction
Khouanetheva Pholsena (Shanghai Jiaotong University); Li Pan (Shanghai Jiaotong University); Zhenpeng Zheng (Shanghai Jiaotong University)
Session 4: CYBERSPACE SECURITY 2
Session Chair: Aiping LiJune 25th, 10:30 - 12:00, Meeting Room #8
-
Privacy-Preserving Location-Based Query over Encrypted Data in Outsourced Environment
Huijuan Lian (Shanghai Jiao Tong University); Weidong Qiu (Shanghai Jiaotong University)*; Di Yan (Shanghai Jiao Tong University); Zheng Huang (Shanghai Jiao Tong University); Peng Tang (Shanghai Jiao Tong University -
A Multi-Objective Examples Generation Approach to Fool the Deep Neural Networks in the Black-box Scenario
Yepeng Deng ( Harbin Institute of Technology, Shenzhen); chunkai zhang (Harbin institute of technology); Xuan Wang (Harbin Institute of Technology, Shenzhen) -
Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction
Hezhong Pan (Beijing University of Posts and Telecommunications)*; Chuanyi Liu (Harbin Institute of Technology(Shenzhen)); Shaoming Duan ( Harbin Institute of Technology(Shenzhen)); Peiyi Han (Beijing University of Posts and Telecommunications); Xinyi Zhang (The Chinese University of Hong Kong, Shenzhen); Binxing Fang (Harbin Institute of Technology(Shenzhen)) -
Construction of Situation Assessment Indicator System Based on latitude and longitude lines of Information Security
Yanwei Sun ; Li Chen (Chinese Academy of Sciences); Yunchuan Guo (Institute of Information Engineering, CAS, China); Lihua Yin (Guangzhou University)
Session 5: KNOWLEDGE GRAPTH AND KNOWLEDGE PROCESSING
Session Chair:Shudong LiJune 25th, 14:00 - 15:30, Meeting Room #5
-
Joint Extraction of Entities and Relations Based on Multi-Label Classification
Yunxuan Liu (National University of Defense Technology); Aiping Li (NUDT); Jiuming Huang (National University of Defense Technology, China); Xinping Zheng ( National University of Defense Technology); Hao Wang (National University of Defense Technology); Weihong Han (Guangzhou University); Zhichao Wang (Hunan Singhand Intelligent Data Technology) -
Knowledge Fusion: Introduction of Concepts and Techniques
Yichen Song (National University of Defence Technology); Aiping Li (NUDT); Jiuming Huang (National University of Defense Technology, China); Xiaojuan Zhao (National University of Defense Technology); Yan Jia (National University of Defense Technology); Weihong Han (Guangzhou University) -
Meta-Path based Text Feature Enrichment Using Knowledge Graph
Jiayu Ding (Beijing University of Posts and Telecommunications); Xiaohuan Cao (Beijing University of Posts and Telecommunications); Linmei Hu (Beijing University of Posts and Telecommunications); Chuan Shi (Beijing University of Posts and Telecommunications) -
Multi-source Knowledge Fusion: A Survey
Xiaojuan Zhao (National University of Defense Technology); Yan Jia (National University of Defense Technology); Aiping Li (NUDT); Rong Jiang (National University of Defense Technology); Haocheng XI (NUDT); Yichen Song (National University of Defence Technology); Weihong Han (Guangzhou University)
Session 6: MACHINE LEARNING 1
Session Chair: Shuyuan JinJune 25th, 14:00 - 15:30, Meeting Room #7
-
Learning Non-Stationary Dynamic Bayesian Network Structure from Data Stream
Qing Meng (Hainan College of Vocation and Technique); Yongheng Wang (Zhejiang Lab); Jingbin An (Zhejiang Lab); Zhongru Wang (Zhejiang Lab) -
HDGS: A Hybrid Dialogue Generation System using Adversarial Learning
Yu Han (College of Computer National University of Defense Technology) -
A Fast Network Embedding Approach with Preserving Hierarchical Proximities
Jie Zhang (Tsinghua University); Yan Wang (Tsinghua University); Jie Tang (Tsinghua University) -
Logic-based Online Complex Event Rule Learning with Weight Learning
Rong Zhu (Hunan University); Yongheng Wang (Zhejiang Lab); Zengwang Wang (Hunan University); Xiaozan Zhang (hunan university); Baoxing Zhang (PLA 305 Hospital)
Session 7: SOCIAL NETWORKS 1
Session Chair: Xiang ZhuJune 25th, 14:00 - 15:30, Meeting Room #8
-
Text Sentiment Analysis based on Parallel Recursive Constituency Tree-LSTM
Xiaozan Zhang (hunan university); Yongheng Wang (Zhejiang Lab); Xiangge Wang (Hunan University); rong zhu (Hunan University); Zengwang Wang (Hunan University); Lijie Liu (Xinjiang Military General Hospital) -
Negotiation Game Model for Big Data Transactions
Jiajia Zhang (Peng Cheng Laboratory); Shuqiang Yang (National University of Defense Technology); Weizhe Zhang (Pengcheng Laboratory); Bin Zhang (Peng Cheng Laboratory); Zhenhuan Luo (Harbin Institute of Technology ); Ying Zhou (Pengcheng Laboratory) -
Joint Embedding of Emoticons and Labels Based on CNN for Microblog Sentiment Analysis
Yongcai Tao (Zhengzhou University); Xinqian Zhang (Zhengzhou University) -
Influence Maximization on Large-scale Networks with a Group-based Method via Network Embedding
Li Pan (Shanghai Jiaotong University, China); Yaoxuan Ji (Shanghai Jiaotong University, China)
Session 8: INTELEGENT SYSTEM
Session Chair: Shudong LiJune 25th, 16:00 - 17:30, Meeting Room #5
-
An Improved Feature Fusion for Speaker Recognition
Mei Xiang Dai (Hangzhou Dianzi University); Guojun Dai (Hangzhou Dianzi University); Yifan Wu (Hangzhou Dianzi University); Yixing Xia (Hangzhou Dianzi University); Fangyao Shen (Hangzhou Dianzi University); Zhang Hua (Hangzhou Dianzi University) -
Visualization of the Non-dominated Solutions in Many-objective Optimization
Minghui Xiong (Space Engineering University) -
Toward Dynamic Computation Offloading for Data Processing in Vehicular Fog based F-RAN
Tianpeng Ye (Shanghai Jiao Tong University); Xiang Lin (School of Electric Information and Electronic Engineering, Shanghai Jiaotong University); Jun Wu (School of Electric Information and Electronic Engineering, Shanghai Jiaotong University); Gaolei Li ( School of Electric Information and Electronic Engineering, Shanghai Jiaotong University); Jianhua Li (Shanghai Jiao Tong Uninversity) -
Yun: A High-performance Container Management Service Based on OpenStack
Sijie Yang (Jiangnan University); Xiaofeng Wang (Jiangnan Univeristy); An Lun; Guizhu Zhang (Jiangnan Univeristy) -
Tracing Android Kernel Codes at Early Stage without Extra Hardware Components
BoYu Zhang (Beijing Institute of Technology); Kai Yang ( Beijing Institute of Technology); LianFang Wang ( Beijing Institute of Technology); Yu-an Tan (Beijing Institute of Technology); SiKang Hu (Beijing Institute of Technology)
Session 9: MACHINE LEARNING 2
Session Chair:Shuyuan JinJune 25th, 16:00 - 17:30, Meeting Room #7
-
Cross-domain User Profile Construction by Log Analysis
Ye Tao (Qingdao University of Science and Technology); Yanzhe Wang (Qingdao University of Science and Technology); Cao Shi (Qingdao University of Scinece and Technology); Xiaodong Wang (Ocean University of China); Canhui Xu (Qingdao University of Scinece and Technology); Zhifang Xu (Haier Technology Co., Ltd.) -
The Nearest Neighbor Classifiers for Time Series with Complex Shape Features
Qianhong Lin (Beijing Jiaotong University); huarui wu (National Agricultural Information Engineering Technology Research Center); Jidong Yuan (Beijing Jiaotong University); Jingqiu Gu (National Agricultural Information Engineering Technology Research Center) -
Semi-Random Forest based on Representative Patterns for Noisy and Non-stationary Data Stream
Bencai Zhang (Beijing Jiaotong University); Huarui Wu (National Agricultural Information Engineering Technology Research Center); Yange Sun (Beijing Jiaotong University)*; Ronghua Gao (Beijing Research Center for Information Technology in Agriculture) -
A Standardized Aerosol Repository System for Knowledge Services and Crowdsourcing
Xiaoyi Huang (Zhejiang University); Jun Zheng (Zhejiang University); Kejun Zhang (Zhejiang University); Jie Chen (Zhejiang University); Dong Liu (Zhejiang University); Lei Bi (Zhejiang University)
Session 10: SOCIAL NETWORKS 2
Session Chair:Xiang ZhuJune 25th, 16:00 - 17:30, Meeting Room #10
-
SMAM: Detecting Rumors from Microblogs with Stance Mining Assisting Task
Zeng Lingyu(Beijing University of Posts and Telecommunications); Bin Wu (Beijing University of Posts and Telecommunications); Bai Wang (Beijing University of Posts and Telecommunications) -
Topic Model-based Recommender System for Long-tailed Products against Popularity Bias
Chunhua Sun (Hefei University of Technology); Yinjie Xu (Hefei University of Technology ) -
An Unsupervised Approach of Truth Discovery From Multi-Sourced Text Data
Chen Chang (Army Engineering University); Cao Jianjun (Nanjing Telecommunication Technology Institute); Lv Guoijun; Nianfeng Weng (The Sixty-third Research Institute, National University of Defense Technology) -
Identifying Influential Nodes with A Community Structure Measure
Liangliang Zhang (Academy of Military Science)
Workshops
BIG DATA AND BUSINESS ANALYTICS (BDBA 2019)
Workshop Chair: Jianshan SunJune 23th, 08:30 - 09:30, Meeting Room #5
- Research on the relationship between APP size and installation time in intelligent mobile devices
- Attention-based Text Recognition in Image
- A multi-task Convolutional Neural Network for Image Classification
- Chinese Text Classification based on Neural Networks and Word2vec
- Weighted-Ring Similarity Measurement for Community Detection in Social Network
June 23th, 09:50 - 12:00, Meeting Room #5
- Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-means and Skip-gram
- Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network
- Improvement and Application of Apriori Algorithm Based on Equalization
- A Spatio-temporal Flow Model of Dockless Shared Bikes
- Sentiment Analysis of Home Appliance Comment Based on Generative Probabilistic Model
June 23th, 13:30 - 15:30, Meeting Room #5
- Competency Analysis in Human Resource Using Text Classification Based on Deep Neural Network
- Finding Water Quality Trend Patterns Using Time Series Clustering: A Case Study
- Overview of IoT Security Architecture
- The current research of IoT security
Big Data Mining for Cyberspace (BDMC 2019)
Workshop Chair: Zhaoquan Gu and Jing QiuJune 23th, 08:30 - 09:30, Meeting Room #8
- Conflicts Resolving for Fusion of Multi-source Data
- Adathm: Adaptive Gradient Method Based on Estimates of Third-order Moments
- Efficient Parallel Algorithm for Mining High Utility Patterns Based on Spark
- Knowledge Graph-based Clinical Decision Support System Reasoning: A Survey
- KSC: A fast and simple spectral clustering algorithm
June 23th, 09:50 - 12:00, Meeting Room #8
- STNS-CSG: Syntax Tree Networks with Self-attention for Complex SQL Generation
- Multiscale Emulation Technology Based on the Integration of Virtualization, Physical and Simulation Networks
- Short-term traffic flow prediction using attention-based long short-term memory network
- Hot Event Detection for Social Media Based on Keyword Semantic Information
- A Simple But Effective Way To Improve The Performance Of RNN-based Encoder In Neural Machine Translation Task
- A Weakness Correlation Evaluation Method Based on PageRank
Multi-Source Network Fusion and Analysis (MSNFA 2019)
Workshop Chair: Bin Wu and Chuan ShiJune 23th, 08:30 - 09:30, Meeting Room #8
- Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation
- BICON:Connecting the Same Users of Different Social Networks Using BiLSTM
- Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks
- A Topic Mining Method for Multi-source Network Public Opinion Based on Improved Hierarchical Clustering
- Hybrid Text Topic Discovery Method for Multi source Information
June 23th, 09:50 - 12:00, Meeting Room #8
- Machine Learning assisted Content Delivery at Edge of Mobile Social Networks
- Community Preserving Node Embedding based on Seed-Expansion Sampling
- The Impact of Personality on User-Genetated Content in Online Socail Networks
- A Method of Conflict Detection for Security Policy Based on B+ Tree
Vulnerability Analysis and Adversarial Learning (VAAL 2019)
Workshop Chair: Hu Li and Yuanping NieJune 23th, 13:30 - 15:30, Meeting Room #7
- A Black-box Approach To Generate Adversarial Examples Against Deep Neural Networks For High Dimensional Input
- A Structure-based De-anonymization Attack on Graph Data Using Weighted Neighbor Match
- Botnet Detection Method Based on Artificial Intelligence
- Construction of Cyber Range Network Security Indication System Based on Deep Learning
- Formal Verification of 5G-EAP-TLS Authentication Protocol
June 23th, 16:00 - 17:50, Meeting Room #7
- FSM-based Cyber Security Status Analysis Method
- Intrusion Detection Results Analysis Based on Variational Auto-encoder
- Research on Evaluation Index System for Software Vulnerability Analysis Methods
- VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries
- A Novel Text Classification Approach Based on Word2vec and TextRank Keyword Extraction
- A Detection Method Based on K-Cores Algorithm for Abnormal Processes in the Server
Virtual Narration and User Experience Design Analysis (VNUEDA 2019)
Workshop Chair:Feng Ye and Ling ZouJune 23th, 13:30 - 15:30, Meeting Room #8
- An Empirical Study on Expectation of Relationship Between Human and Smart Devices--with smart speaker as an example
- Facial Movements Recognition Using Multichannel EMG Signals
- Grey Island: Immersive tangible interaction through augmented reality
- Narratology-based Interaction Design of 3D Reconstructed Cultural Relics
- Research on the Application of Chinese Traditional Patterns Innovation and Development Based on Interactive Media
June 23th, 16:00 - 17:50, Meeting Room #8
- Study on Digital Chromatography of Fahai Temple Frescoes in Ming Dynasty Based on Visualization
- A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition
- Feature selection and visualization based on interaction dominance
- Efficient Randomized Hierarchy Construction for Interactive Visualization of Large Scale Point Clouds
Data Analysis for Bridging Cyber-Real Spaces (DA4BS2 2019)
Workshop Chair: Peng Wang and Xiao SunJune 23th, 16:00 - 17:50, Meeting Room #5
- Blockchain based Fine-grained and Scalable Acess Control for IoT Security and Privacy
- UAV-based Motion Target Detection and Tracking Method in Dynamic Scenes
- Accurate object recognition for unmanned aerial vehicle electric power inspection using an improved YOLOv2 algorithm
- A Survey: Cloud Data Security Based on Blockchain Technology
- Uncertain Complex Event Processing Based on Markov Logical Networks
- A Localization Approach for Non-localizable Wireless Sensor Network with Stationary Passive Events
- Analyzing the Cross-Sector Sharing of Government Data Based on the Niche Theory