Program
The 8th IEEE International Conference on Data Science in Cyberspace (IEEE DSC 2023)
August 18-20, 2023
Empark Grand Hotel (Anhui), Hefei, China
Day1, August 18, 2023 (Main Conference, Banquet Hall 1&2) | |||
---|---|---|---|
Time | Event | ||
08:30-09:00 | Opening Ceremony & Welcoming Speech | ||
09:00-09:45 | Keynote I: Data Security Protection from the Perspective of Three Core Attributes Binxing Fang, Academician, Chinese Academy of Engineering |
||
09:45-10:30 | Keynote II: 4D Millimeter Wave Radar and Auto Driving Jianqi Wu, Academician, Chinese Academy of Engineering |
||
10:30-10:50 | Group Photo & Coffee Break | ||
10:50-11:35 | Keynote III: The MDATA Model and Its Applications Yan Jia, Peng Cheng Laboratory |
||
11:35-12:20 | Keynote IV: Neural-enhanced Edge: Towards Operationalized AI in Cooperative Cloud-Edge
Ecosystems Song Guo, The Hong Kong Polytechnic University |
||
12:20-14:00 | Lunch Break | ||
Invited Talk, Yunnan Hall 1&2 | |||
14:00-14:30 | Invited Talk I:Heterogeneous Graph Computing Chuan Shi, Beijing University of Posts and Telecommunications |
||
14:30-15:00 | Invited Talk II:Multimodal Named Entity Recognition and Relation Extraction Yi Cai, South China University of Technology |
||
15:00-15:20 | Coffee Break | ||
Sessions | |||
15:20-17:00 | Session 1: Cyberspace security (Yunnan Hall 1&2) |
Session 2: Knowledge Representation and Discovery (Yunnan Hall 3) |
Session 3: Intelligent System (Anhui Hall) |
17:40-18:00 | Awarding Ceremony Outstanding Paper Awards (Banquet Hall 1&2) | ||
18:00-20:00 | Banquet & Performances (Banquet Hall 1&2) | ||
Day 2, August 19, 2023 (Invited Talk, Yunnan Hall 1&2) | |||
Time | Event | ||
09:00-09:30 | Invited Talk III: Software Intelligent Vulnerability Detection and Supply Chain
Security Deqing Zou, Huazhong University of Science and Technology |
||
09:30-10:00 | Invited Talk IV:Video content distribution, transmission and generation Kaigui Bian, Peking University |
||
10:00-10:20 | Coffee Break | ||
Sessions | |||
10:20-12:00 | Session 4: Data Security and Privacy (Yunnan Hall 1&2) |
Session 5: Deep Learning Algorithms and Applications I (Yunnan Hall 3) |
Session 6: Network Attack and Defense (Anhui Hall) |
12:00-14:30 | Lunch Break | ||
14:30-17:30 | Session 7: Situation Awareness (Yunnan Hall 1&2) |
Session 8: Machine Learning (Yunnan Hall 3) |
Session 9: Deep Learning Algorithms and Applications II (Anhui Hall) |
18:00-20:00 | Dinner | ||
Day 3, August 20, 2023 (Workshops, Banquet Hall 1&2&3) | |||
Time | Event | ||
09:00-10:20 | MDATA (Banquet Hall 1) |
SAACS (Banquet Hall 2) |
VAAL (Banquet Hall 3) |
10:20-10:40 | Coffee Break | ||
10:40-12:00 | MDATA (Banquet Hall 1) |
SAACS (Banquet Hall 2) |
VAAL (Banquet Hall 3) |
12:00-14:00 | Lunch Break | ||
14:00-15:40 | NSAC (Banquet Hall 1) |
BDBA (Banquet Hall 2) |
GRLA (Banquet Hall 3) |
15:40-16:00 | Coffee Break | ||
16:00-18:00 | NSAC (Banquet Hall 1) |
BDBA (Banquet Hall 2) |
GRLA (Banquet Hall 3) |
18:00-20:00 | Dinner |
Main Technical Program
SESSION 1: Cyberspace security
August 18th, 15:20-17:00, Yunnan Room 1 and 2
- Fusing Security Alerts Improves Cyber-Security: An Alert Normalization Framework for Heterogeneous Devices
Songxuan Wei; Yushun Xie; Angxiao Zhao; Xiao Jing; Cui Luo; Zhaoquan Gu - DACTI: a Generation-Based Data Augmentation Method for Cyber Threat Intelligence
Jingbing Chen; Yali Gao; Xiaoyong Li - Building a High-performance Data Channel for the Federal Cyber Range
Zengxie Ma; Ning Hu; Bo Qu; Yao Xin; Shengan Song; Xinyi Qiu - SCOBERT: A Pre-trained BERT for Smart Contract Vulnerability Detection
Guojin Sun; Chi Jiang; Jinqing Shen; Yin Zhang - Logic-Based Trust Model for Maritime Cyber Intelligence with Enhanced Trustworthiness
Yuhang Wang
SESSION 2: Knowledge Representation and Discovery
August 18th, 15:20-17:00, Yunnan Room 3
- Knowledge Graph Embedding for Adaptive Negative Subsampling
Dong Zhu; Le Wang; Yujie Feng; Haonan Tan - A Simplified Variant for Graph Convolutional Network based Knowledge Graph Completion Model
Yashen Wang; Qiang Li; Yi Zhang; Xuecheng Zhang; Zhuoya Ju; Jian Sun - Multimodal Features Enhanced Named Entity Recognition based on Self-Attention Mechanism
Changqing Li; Ye Qian; Li Pan - Research on the prospect of Knowledge Graph Completion based on the Federated Setting
Anxiao Zhao; Yunhui Liu; Songxuan Wei; Yu Long; Wenying Feng; Zhaoquan Gu - Multi-modal Knowledge Representation: A Survey
Weiqi Hu; Ye Wang; Yan Jia
SESSION 3: Intelligent System
August 18th, 15:20-17:00, Anhui Room
- Analyzing Security Attacks Against Platoon of Intelligent and Connected Vehicles
Liqun Sun; Yulu Qi; Shuqiang Yang; Weihong Han; Xiaoxia Li - Particle Filter Localization Algorithm based on LOS Possibility for Smart Vehicle Digital Key
Zihan Zhou; WeiYi Hu; Yiran Tian; Lei Luo; Yun Li; Lirong Chen - Towards Scale-aware Self-supervised Multi-Frame Depth Estimation with IMU Motion Dynamics
Yipeng Lu; Denghui Zhang; Zhaoquan Gu; Jing Qiu - Blockchain storage method based on Erasure Code
Fanyao Meng; Jin Li; Jiaqi Gao; Junjie Liu; Junpeng Ru; Yueming Lu - Based on Linkable Ring Signature Map Review Scheme for Zero-trust Autonomous Vehicles
Min Zhang; Qing Ye; Kaihuan Deng
SESSION 4: Data Security and Privacy
August 19th, 10:20-12:00, Yunnan Room 1 and 2
- The Intelligent Information Search System IISI and Its Key Technologies for Internet Big Data
Zhengjun Huang; Weihong Han; Yangyang Mei; Kaihan Lin - CoReg: Membership Privacy Protection via Collaborative Regularization
Yuncong Yang; Minghao Lai; Xiao Han - A blockchain-based secure data sharing approach with proxy re-encryption
Jiahao Liu; Chao Li; Ruoyu Wang; Wuhao Xia - Quantitative Dynamic Scalability Model and Analysis of Blockchain Database System
Jiacheng Wei; Qingmei Wang; Zheng Wang - Data Governance: Status, Technologies, Applications and Trends
Haiyang Zhu; Xiaofeng Chen; Suyan Li; Yejin Wang; Xinwei Fang; Minfeng Zhu
SESSION 5: Deep Learning Algorithms and Applications I
August 19th, 10:20-12:00, Yunnan Room 3
- Universal Adversarial Perturbation From Dominant Feature For Speaker Recognition
Xiaochen Liu; Jerry Tam; Junjian Zhang; Aiping Li; Zhaoquan Gu - Multi-task learning for Game Review Classification with Emotion and Sarcasm Detection
Xinchen Xia; Yuee Huang; Yiwen Zhang - Anti-breast cancer active compound screening method based on simulated annealing algorithm and BP neural network
Haonan Tan; Yunhui Liu; Le Wang; Jie Jiang; Jianyu Deng; Dong Zhu - Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency Parsing
Xinru Huan; Jiapeng Zhao; Jinqiao Shi; Yanwei Sun; Xuebin Wang; Liyan Shen - Hierarchical Abstract Syntax Tree Representation Learning Based on Graph Coarsening for Program Classification
Yizu Yang; Yuzhang Li; Zeyu He; Chunlu Wang
SESSION 6: Network Attack and Defense
August 19th, 10:20-12:00, Anhui Room
- OBiLSTM-based Intrusion Detection Method for Industrial Internet of Things
Shuai Xu; Xinyong Peng; Dandan Huang; Changsong Yang; Yong Ding; Hai Liang - Bi-ETC: A Bidirectional Encrypted Traffic Classification Model Based on BERT and BiLSTM
Xiting Ma; Tao Liu; Ning Hu; Xin Liu - AlBERT: A Language-Agnostic Graph Neural Network Model for Vulnerability Detection
Nurali Sarbakysh; Zheng Wang - An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversamping for Intrusion Detection
Zhuoer Lu; Xiaoyong Li; Pengfei Qiu - CAKG: A Framework For Cybersecurity Threat Detection Of Automotive Via Knowledge Graph
Peng Yang; Lijie Wang; Yun Li; Xuedong Song; Yaxin Wang; Biheng Guo
SESSION 7: Situation Awareness
August 19th, 14:30-17:30, Yunnan Room 1 and 2
- Software Vulnerability Detection with GPT and In-Context Learning
Zhihong Liu; Qing Liao; Wenchao Gu; Cuiyun Gao - GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles based on Generative Adversarial Networks
Xiansen Chan; Kun Xiao; Lei Luo; Yun Li; Lirong Chen - Network Security Evaluation for Space-Ground Integrated Networks Based on Network Simulation
Haibo Ye; Lei Zhao; Leiting Tao; Xiaofeng Wang - OIDMD: A Novel Open-Set Intrusion Detection Method Based on Mahalanobis Distance
Yunhui Liu; Angxiao Zhao; Lei Du; Chenhui Zhang; Hao Yan; Zhaoquan Gu - A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-insurance
Junzheng Yang; Lulu liang; Jiayin Qi
SESSION 8: Machine Learning
August 19th, 14:30-17:30, Yunnan Room 3
- An Interpretable Data-Driven Approach for Employee Ability Assessment
Youming Zhang; Zhizheng Li; Lei Wang; Yan Lv; Yan Xiong; Liu Yang - A Novel Concept-Driven Negative Sampling Mechanism for Enhancing Semanticity and Interpretability of Knowledge Graph Completion Task
Liu Yuan; Yashen Wang; Tianzhu Chen; Xuecheng Zhang; Chenyu Liu; Yi Zhang - Collaborative learning for cross-organizational data sharing using Hyperledger Fabric
Yaling Zheng; Ziwen Cheng; Yi Liu; Bowen Wang - Improved Grey Wolf Optimization Algorithm Based on Arctangent Inertia Weight
Junfang Shi; Mingyao Chen; Yong Yang - Self-Disclosure Causality Detection:Discover What Cause the Self-Disclosure
HaoJie Chen; Jiapeng Zhao; Jinqiao Shi; Xuebin Wang; Liyan Shen; Yanwei Sun
SESSION 9: Deep Learning Algorithms and Applications II
August 19th, 14:30-17:30, Anhui Room
- Weak Feature Defect Generation with GAN for Faster RCNN based PCB Defect Detection
Chao Li; Wuhao Xia; ZhengLiang Jiang - An image emotion classification method based on supervised contrastive learning
Qing Zhang; Jianshan Sun; Kun Yuan; Yuanchun Jiang - Cluster Analysis of Target Events Based on Multidimensional Network Traffic Characteristics
Zhaoxuan Lv; Jiahao Qi; Jiachen Zhang; Junmei Ding; Yueming Lu - Leveraging Concept-Enhanced Pre-Training Model and Masked-Concept Language Model for Shot-Text Conceptualization
Xiaoling Zhu; Yashen Wang; Yi Zhang; Xuecheng Zhang
Workshops
Multi-dimensional Data Association and inTelligent Analysis (MDATA 2023)
August 20th, 09:00-12:00 (Banquet Hall 1)
- FedValidate: A Robust Federated Learning Framework based on Client-side Validation
Wenting Zhu; Zhe Liu; Zongyi Chen; Chuan Shi; Xi Zhang; Sanchuan Guo - Research and Implementation of Bluetooth AOA Indoor Positioning System
Kun Xiao, Fuzhong Hao, Weijian Zhang, Nuannuan Li, Haiyan Zhi, Yintao wang - Analysis and Reflection on the Situation of Industrial Information Security Ransomware Attacks
Dong Liu; Yang Liu; Zhicheng Liu; Xiaofei Zhang; Xueying Zhang - A HMM-Based ICS Adaptive Deception Defense Framework
JiaWei Luo; Tao Liu; MengEn Liang; Ning Hu - Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace
Weidong Shi; Fan Mingrui; Jiaqi Gao; Qi Jiahao; Daoqi Han; Yueming Lu - Efficient lightweight intrusion detection method for IoT OS:A study on the application of multi-teacher distillation
Pengyu Zhang; Kun Xiao; Lei Luo; Yun Li; Lirong Chen - Research Ideas on Network Security Experiment and Appraisal of Avionics System
Zhuoran Chen; Hongyu Zhu; Chen Yi; Zhen Liu - Research on Fault Diagnosis Model of Shearer Cutting Motor Based on Fuzzy Neural Network and Expert System
Wei Han; Yiliang Xia; Haoyu Xue; Mengxuan Sun; Jinliang Chen; Gong Cao; Gang Lin
Situation Awareness Analysis for Cyberspace Security (SAACS 2023)
August 20th, 09:00-12:00 (Banquet Hall 2)
- An Evaluation Method of Vehicle-Road-Cloud Collaborative System Security Situation Based on (CD)2 -A Elastic Computing Framework
Shizhun Jia; Tian Zhang; Wenhui Lin; Mi Zhou; Xiaoxia Li - Identifying Mobile Application over Shadowsocks with Single-direction Traffic
Simiao Cui; Pengxiao Li; Xi Zhang; Ming Zhang; Sanchuan Guo
Vulnerability Analysis and Adversarial Learning (VAAL 2023)
August 20th, 09:00-12:00 (Banquet Hall 3)
- Threat-Aware Data Transmission in Software-Defined Networks
Zhongbai Jiang; Yanwei Sun; Beibei Li; Bowen Sun; Shenduo Xiong; Yehao Li; Wenyue Du - The Report of Standardlization for Blockchain-based Digital Right Management System
TianJian Zhao - Machine Learning Security Analysis Framework Based on Threat Matrix
Hu Li - Survey on Fuzzing Techniques in Deep Learning Libraries
Jiahe Ji; Wei Kong; Jianwen Tian; Taotao Gu; Yuanping Nie; Xiaohui Kuang - Adversarial Example Detection for Deep Neural Networks: A Review
Chongyang Zhao; Hu Li; Dongxia Wang; Ruiqi Liu - A Blackbox Fuzzing Based on Automated State Machine Extraction
Zhaowei Zhang; Wenjing Yu; Zibin Wang; Youlin Xiang - MDATA Model based Cyber Security Knowledge Representation and Application
Yu Long - Automatically Identifying Sentences with Attack Behavior from Cyber Threat Intelligence Reports
Jing Qiu; Junjun Chen; Chengliang Gao; Fei Tang; Jiaxu Xing; Dongyang Zheng
Network Security Analysis for Cyberspace (NSAC 2023)
August 20th, 14:00-18:00 (Banquet Hall 1)
- Multi-secret sharing scheme based on XOR operations in combination with AES-GCM
Haoyi Sun; Shuihai Zhang; Chunli Lv - FixGPT: A novel three-tier deep learning model for automated program repair
Wenhao Ye; Jun Xia; Shuo Feng; Xiangyu Zhong; Shuai Yuan; Zhitao Guan - Towards Accurate and Efficient Super Spreader Detection with Sketching
Shouyou Song; Pu Wang; Yangchun Li; Nanyang Wang; Wei Jiang - A Intrusion Detection Method of Industrial Internet of Things based on one-dimensional cropping multi-model
Lei Wang; Tong Li; Chao Yang; Yang Liu; Jian Chen; Zhongjie Wang - Analysis and Research of Neural Network Adversarial Samples for Power Grid Security
Bokai Li; Shenglong Wu; Yuke Yang; Geyao Zhang - Application of Real-time Big Data Technology in Complex Power Engineering Management
Shenglong Wu; Boyang Cui; Yaqi Zhang - A Trust Usage Control Approach for Media Player Based on Intel SGX
Ruoyu Wang; Junjian Li; Chao Li; Naqin Zhou; Jiahao Liu - Toward the Secure Transmission of Large-Scale Images in Autonomous Driving
Lijing Ren; Denghui Zhang; Qingduo Zeng; Zhaoquan Gu
Big Data and Business Analytics (BDBA 2023)
August 20th, 14:00-18:00 (Banquet Hall 2)
- Exploring the Factors and Influence Mechanisms of User Loyalty for Generative AI
Ang Zeng; Xusen Cheng; Yajie Wang - Research on Recommendation Algorithms Based on Asymmetric Attention Mechanism Models
Xiulei Wang; Sisi Chen; Jianzhang Zhang; Xiuxiu Zhan; Chuang Liu - An Unsupervised Graph Embedding Method Based on Dynamic Graph Attention Networks and Infomax for Link Prediction
Jingzhu Lu - Hot spot analysis of rural e-commerce based on digital economy
Jing Zheng; Xing Zhu - Assessing the risk of heavy metal mixture exposure and its association with cancer mortality
Yanan Du - A Data Sharing and Access Control Model Based on Blockchain
Xu Lin - A Review of User Identity Linkage Across Social Networks
Danna Lu; Qing Li; Liu Zikang; Shumei Li; Xiaobo Wu; Shudong Li - Violence Detection In Videos via Motion-Guided Global and Local Views
Ning Su; Lijuan Sun; Jingchen Wu; Xu Wu; Yutong Gao
Graph Representation Learning and its Applications (GRLA 2023)
August 20th, 14:00-18:00 (Banquet Hall 3)
- Graph Pattern Matching based Intelligent Operation and Maintenance Method for Cloud Resource Operation
Lin Qiao; Ruiting Qu; Qing Song; Xuming Lu; Lixia Wang; Jun Qi - Service Resources Mining Based on Association Rules
Ruiting Qu; Lin Qiao; Qing Song; Yuanqi Yu; Zhenjiang Lei; Ran Ran; Haomiao Wang; Tianbo Wang - Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis
Changchang Ma; Denghui Zhang; Zhang Junjian; Le Wang; Hao Li; Zhaoquan Gu - SSDAEE: Semi-Supervised Data-Augmented Event Extraction for Transfer Learning
Yueyue Shen - UAV forest fire surveillance model based on graph edge detection and cellular automata
Kai Li - EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature Mining
Fanfeixue Meng