Abstract is missing.
- Message from the General Chairs DSC 2023Xiaofang Zhou, Yezheng Liu. 1 [doi]
- Fusing Security Alerts Improves Cyber-Security: An Alert Normalization Framework for Heterogeneous DevicesSongxuan Wei, Yushun Xie, Angxiao Zhao, Xiao Jing, Cui Luo, Zhaoquan Gu. 1-7 [doi]
- DACTI: a Generation-Based Data Augmentation Method for Cyber Threat IntelligenceJingbing Chen, Yali Gao, Xiaoyong Li. 8-15 [doi]
- Building a High-Performance Data Channel for the Federal Cyber RangeZengxie Ma, Ning Hu, Bo Qu, Yao Xin, Shengan Song, Xinyi Qiu. 16-23 [doi]
- SCOBERT: A Pre-Trained BERT for Smart Contract Vulnerability DetectionGuojin Sun, Chi Jiang, Jinqing Shen, Yin Zhang 0002. 24-30 [doi]
- Logic-Based Trust Model for Industrial Cyber Intelligence with Enhanced TrustworthinessYuhang Wang, Salman Nazir. 31-37 [doi]
- Knowledge Graph Embedding via Adaptive Negative SubsamplingDong Zhu, Haonan Tan, Le Wang 0008, Yujie Feng, Yao Lin, Zhaoquan Gu. 38-43 [doi]
- A Simplified Variant for Graph Convolutional Network Based Knowledge Graph Completion ModelYashen Wang, Qiang Li, Yi Zhang, Xuecheng Zhang, Zhuoya Ju, Jian Sun. 44-51 [doi]
- Multimodal Features Enhanced Named Entity Recognition Based on Self-Attention MechanismChangqing Li, Ye Qian, Li Pan. 52-59 [doi]
- Research on the Prospect of Knowledge Graph Completion Based on the Federated SettingAngxiao Zhao, Yunhui Liu, Songxuan Wei, Yu Long, Wenying Feng 0003, Zhaoquan Gu. 60-67 [doi]
- Multi-Modal Knowledge Representation: A SurveyWeiqi Hu, Ye Wang, Yan Jia. 68-75 [doi]
- Analyzing Security Attacks Against Platoon of Intelligent and Connected VehiclesLiqun Sun, Yulu Qi, Shuqiang Yang, Weihong Han, Xiaoxia Li. 76-81 [doi]
- Particle Filter Localization Algorithm Based on LOS Possibility for Smart Vehicle Digital KeyZihan Zhou, Weivi Hu, Yiran Tian, Lei Luo 0004, Yun Li, Lirong Chen. 82-89 [doi]
- Towards Scale-Aware Self-Supervised Multi-Frame Depth Estimation with IMU Motion DynamicsYipeng Lu, Denghui Zhang, Zhaoquan Gu, Jing Qiu 0002. 90-97 [doi]
- Blockchain Storage Method Based on Erasure CodeFanyao Meng, Jin Li, Jiaqi Gao, Junjie Liu, Junpeng Ru, Yueming Lu. 98-105 [doi]
- Based on Linkable Ring Signature Map Review Scheme for Zero-Trust Autonomous VehiclesMin Zhang, Qing Ye, Kaihuan Deng. 106-113 [doi]
- The Intelligent Information Search System IISI and Its Key Technologies for Internet Big DataZhengjun Huang, Kaihan Lin, Yangyang Mei. 114-119 [doi]
- CoReg: Membership Privacy Protection via Collaborative RegularizationYungcong Yang, Minghao Lai, Xiao Han. 120-127 [doi]
- A Blockchain-Based Secure Data Sharing Approach with Proxy Re-EncryptionJiahao Liu, Chao Li, Ruoyu Wang, Junjian Li, Wuhao Xia. 128-134 [doi]
- Quantitative Dynamic Scalability Model and Analysis of Blockchain Database SystemJiacheng Wei, Qingmei Wang, Zheng Wang. 135-142 [doi]
- Data Governance: Status, Technologies, Applications and Development TrendsHaiyang Zhu, Xiaofeng Chen, Suyan Li, Yejin Wang, Xinwei Fang, Minfeng Zhu. 143-150 [doi]
- Universal Adversarial Perturbation From Dominant Feature For Speaker RecognitionXiaochen Liu, Hao Tan, Junjian Zhang, Aiping Li, Zhaoquan Gu. 151-158 [doi]
- Multi-Task Learning for Game Review Classification with Emotion and Sarcasm DetectionXinchen Xia, Yuee Huang, Yiwen Zhang. 159-165 [doi]
- Anti-Breast Cancer Active Compound Screening Method Based on Simulated Annealing Algorithm and BP Neural NetworkHaonan Tan, Yunhui Liu, Le Wang 0008, Jie Jiang, Jianyu Deng, Dong Zhu. 166-171 [doi]
- Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency ParsingXinru Huang, Jiapeng Zhao, Jinqiao Shi, Yanwei Sun, Xuebin Wang, Liyan Shen. 172-180 [doi]
- Hierarchical Abstract Syntax Tree Representation Learning Based on Graph Coarsening for Program ClassificationYizu Yang, Yuzhang Lee, Zeyu He, Chunlu Wang. 181-188 [doi]
- OBiLSTM-Based Intrusion Detection Method for Industrial Internet of ThingsShuai Xu, Xinyong Peng, Dandan Huang, Changsong Yang, Yong Ding 0005, Hai Liang. 189-196 [doi]
- Bi-ETC: A Bidirectional Encrypted Traffic Classification Model Based on BERT and BiLSTMXiTing Ma, Tao Liu, Ning Hu, Xin Liu. 197-204 [doi]
- A1BERT: A Language-Agnostic Graph Neural Network Model for Vulnerability DetectionNurali Sarbakysh, Zheng Wang. 205-212 [doi]
- An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion DetectionZhuoer Lu, Xiaoyong Li 0003, Pengfei Qiu. 213-220 [doi]
- CAKG: A Framework for Cybersecurity Threat Detection of Automotive via Knowledge GraphPeng Yang, Lijie Wang, Yun Li, Xuedong Song, Yaxin Wang, Guo Biheng. 221-228 [doi]
- Software Vulnerability Detection with GPT and In-Context LearningZhihong Liu, Qing Liao, Wenchao Gu, Cuiyun Gao. 229-236 [doi]
- GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles Based on Generative Adversarial NetworksXiansen Chen, Kun Xiao, Lei Luo 0004, Yun Li, Lirong Chen. 237-244 [doi]
- Network Security Evaluation for Space-Ground Integrated Networks Based on Network SimulationHaibo Ye, Lei Zhao, Leiting Tao, Xiaofeng Wang. 245-252 [doi]
- OIDMD: A Novel Open-Set Intrusion Detection Method Based on Mahalanobis DistanceYunhui Liu, Angxiao Zhao, Lei Du, Chenhui Zhang, Hao Yan, Zhaoquan Gu. 253-260 [doi]
- A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-InsuranceJun-Zheng Yang, Lu-Lu Liang, Jia Yin Qi. 261-269 [doi]
- An Interpretable Data-Driven Approach for Employee Ability AssessmentYouming Zhang, Zhizheng Li, Lei Wang, Yan Lv, Yan Xiong, Liu Yang. 270-276 [doi]
- A Novel Concept-Driven Negative Sampling Mechanism for Enhancing Semanticity and Interpretability of Knowledge Graph Completion TaskLiu Yuan, Yashen Wang, Tianzhu Chen, Xuecheng Zhang, Chenyu Liu, Yi Zhang. 277-284 [doi]
- Collaborative Learning for Cross-Organizational Data Sharing Using Hyperledger FabricYaling Zheng, Ziwen Cheng, Yi Liu, Bowen Wang, Cheng Zhu. 285-292 [doi]
- Improved Grey Wolf Optimization Algorithm Based on Arctangent Inertia WeightJunFang Shi, Yong Yang, Mingyao Chen. 293-297 [doi]
- Self-Disclosure Causality Detection: Discover What Cause the Self-DisclosureHaojie Chen, Jiapeng Zhao, Jinqiao Shi, Xuebin Wang, Liyan Shen, Yanwei Sun. 298-305 [doi]
- Weak Feature Defect Generation with GAN for Faster RCNN Based PCB Defect DetectionChao Li, Wuhao Xia, Zhengliang Jiang. 306-312 [doi]
- An Image Emotion Classification Method Based on Supervised Contrastive LearningQing Zhang, Jianshan Sun, Kun Yuan, Yuanchun Jiang. 313-320 [doi]
- Cluster Analysis of Target Events Based on Multidimensional Network Traffic CharacteristicsZhaoxuan Lv, Jiahao Qi, Jiaehen Zhang, Junmei Ding, Yueming Lu. 321-328 [doi]
- Leveraging Concept-Driven Pre-Training Model for Shot-Text Conceptualization TaskXiaoling Zhu, Yashen Wang, Yi Zhang, Xuecheng Zhang. 329-336 [doi]
- FedValidate: A Robust Federated Learning Framework Based on Client-Side ValidationWenting Zhu, Zhe Liu, Zongyi Chen, Chuan Shi, Xi Zhang, Sanchuan Guo. 337-344 [doi]
- Research and Implementation of Bluetooth AOA Indoor Positioning SystemKun Xiao, Fuzhong Hao, Weijian Zhang, Nuannuan Li, Haiyan Zhi, Yintao Wang. 345-353 [doi]
- Analysis and Reflection on the Situation of Industrial Information Security Ransomware AttacksDong Liu, Yang Liu, Zhicheng Liu, Xiaofei Zhang, Xueying Zhang. 354-358 [doi]
- A HMM-Based ICS Adaptive Deception Defense FrameworkJiawei Luo, Tao Liu, Mengen Liang, Ning Hu. 359-366 [doi]
- Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature SubspaceWeidong Shi, Mingrui Fan, Jiaqi Gao, Jiahao Qi, Daoqi Han, Yueming Lu. 367-374 [doi]
- Efficient Lightweight Intrusion Detection Method for IoT OS: A Study on the Application of Multi-Teacher DistillationPengyu Zhang, Kun Xiao, Lei Luo 0004, Yun Li, Lirong Chen. 375-382 [doi]
- Research Ideas on Network Security Experiment and Appraisal of Avionics SystemZhuoran Chen, Hongyu Zhu, Chen Yi, Zhen Liu. 383-390 [doi]
- Research on Fault Diagnosis Model of Shearer Cutting Motor Based on Fuzzy Neural Network and Expert SystemWei Han, Yiliang Xia, Haoyu Xue, Mengxuan Sun, Jinliang Chen, Gong Cao, Gang Lin. 391-396 [doi]
- Exploring the Factors and Influence Mechanisms of User Loyalty for Generative AIAng Zeng, Xusen Cheng, Yajie Wang. 397-400 [doi]
- Research on Recommendation Algorithms Based on Asymmetric Attention Mechanism ModelsXiulei Wang, Sisi Chen, Jianzhang Zhang, Xiuxiu Zhang, Chuang Liu 0001. 401-408 [doi]
- An Unsupervised Graph Embedding Method Based on Dynamic Graph Attention Networks and Infomax for Link PredictionJingzhu Lu, Feifan Song, Jingchen Wu, Xu Wu. 409-415 [doi]
- Assessing the Risk of Heavy Metal Mixture Exposure and its Association with Cancer MortalityYanan Du, Can Yang, Qi Li, Liping Zhi. 416-421 [doi]
- A Data Sharing and Access Control Model Based on BlockchainLin Xu. 422-428 [doi]
- A Review of User Identity Linkage Across Social NetworksDanna Lu, Qing Li, Zikang Liu, Shumei Li, Xiaobo Wu, Shudong Li. 429-436 [doi]
- Violence Detection In Videos via Motion-Guided Global and Local ViewsNing Su, Lijuan Sun, Yutong Gao, Jingchen Wu, Xu Wu. 437-442 [doi]
- Threat-Aware Data Transmission in Software-Defined NetworksZhongbai Jiang, Yanwei Sun, Beibei Li, Bowen Sun, Shenduo Xiong, Yehao Li, Wenyue Du. 443-449 [doi]
- The Report of Standardization for Blockchain-Based Digital Right Management SystemTianjian Zhao, Zhikai Lu, Wenxuan Wu, Fang Xiong, Ruitian Yang, Huaxu Zhou, Boyang Zhang, Yifan Hu, Yue Jiang. 450-455 [doi]
- Machine Learning Security Analysis Framework Based on Threat MatrixHu Li, Qiongmin Ma, Ming Zhang, Xiaohui Kuang. 456-460 [doi]
- Survey on Fuzzing Techniques in Deep Learning LibrariesJiahe Ji, Wei Kong, Jianwen Tian, Taotao Gu, Yuanping Nie, Xiaohui Kuang. 461-467 [doi]
- Adversarial Example Detection for Deep Neural Networks: A ReviewChongyang Zhao, Hu Li, Dongxia Wang, Ruiqi Liu. 468-475 [doi]
- A Blackbox Fuzzing Based on Automated State Machine ExtractionZhaowei Zhang, Wenjing Yu, Zibin Wang, Youlin Xiang. 476-482 [doi]
- MDATA Model Based Cyber Security Knowledge Representation and ApplicationYu Long, Xiayu Xiang, Xiao Jing, Angxiao Zhao, Lei Du, Zhaoquan Gu. 483-490 [doi]
- Automatically Identifying Sentences with Attack Behavior from Cyber Threat Intelligence ReportsJunjun Chen, Chengliang Gao, Fei Tang, Jiaxu Xing, Qianlong Xiao, Dongyang Zheng, Jing Qiu 0002. 491-498 [doi]
- FixGPT: A Novel Three-Tier Deep Learning Model for Automated Program RepairWenhao Ye, Jun Xia, Shuo Feng, Xiangyu Zhong, Shuai Yuan, Zhitao Guan. 499-505 [doi]
- Towards Accurate and Efficient Super Spreader Detection with SketchingShouyou Song, Pu Wang, Yangchun Li, Nanyang Wang, Wei Jiang. 506-511 [doi]
- A Intrusion Detection Method of Industrial Internet of Things Based on One-Dimensional Cropping Multi-ModelLei Wang, Tong Li, Chao Yang, Yang Liu, Jian Chen, Zhongjie Wang. 512-519 [doi]
- Analysis and Research of Neural Network Adversarial Samples for Power Grid SecurityBokai Li, Shenglong Wu, Yuke Yang, Geyao Zhang. 520-525 [doi]
- Application of Real-Time Big Data Technology in Complex Power Engineering ManagementShenglong Wu, Boyang Cui, Yaqi Zhang. 526-532 [doi]
- A Trust Usage Control Approach for Media Player Based on Intel SGXRuoyu Wang, Junjian Li, Chao Li, Naqin Zhou, Jiahao Liu. 533-539 [doi]
- Toward the Secure Transmission of Large-Scale Images in Autonomous DrivingLijing Ren, Denghui Zhang, Qingduo Zeng, Zhaoquan Gu. 540-545 [doi]
- An Evaluation Method of Vehicle-Road-Cloud Collaborative System Security Situation Based on (CD)2-A Elastic Computing FrameworkShizhun Jia, Tian Zhang, Wenhui Lin, Mi Zhou, Xiaoxia Li. 546-550 [doi]
- Identifying Mobile Application Over Shadowsocks with Single-Direction TrafficSimiao Cui, Dinghua Wang, Xi Zhang, Ming Zhang, Sanchuan Guo. 551-558 [doi]
- Empirical Study of the IPv4 and IPv6 Networks at the Autonomous System LevelJiaqi Nie, JiangTao Hao, Songtao Peng, Xincheng Shu, Zhongyuan Ruan, Qi Xuan. 559-565 [doi]
- Cross-System Data Integration Based on Rule-Based NLP and Node2VecJiakai Xiao, Wei Du 0005, Zhengxiang Xu, Yang Qian. 566-570 [doi]
- Graph Pattern Matching Based Intelligent Operation and Maintenance Method for Cloud Resource OperationLin Qiao, Ruiting Qu, Qing Song, Xuming Lyu, Lixia Wang, Jun Qi. 571-578 [doi]
- Service Resources Mining Based on Association RulesRuiting Qu, Lin Qiao, Qing Song, Yuanqi Yu, Zhenjiang Lei, Ran Ran, Haomiao Wang, Tianbo Wang. 579-582 [doi]
- Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity AnalysisChangchang Ma, Denghui Zhang, Junjian Zhang, Le Wang, Hao Li, Zhaoquan Gu. 583-590 [doi]
- SSDAEE: Semi-Supervised Data-Augmented Event Extraction for Transfer LearningYueyue Shen, Feifan Song, Jingchen Wu, Xu Wu. 591-598 [doi]
- EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature MiningFanfeixue Meng, Jingchen Wu, Feifan Song, Xu Wu, Lan Hu. 599-606 [doi]