Program

Program at a Glance


Main Technical Program

Session 1: DEEP LEARNING ALGORITHM AND APPLICATIONS 1

Session Chair:TBA,
June 24th, 16:30 - 18:00, Meeting Room #7

  • Differentially Private Convolutional Neural Networks with Adaptive Gradient Descent
    Xixi Huang (Harbin Institute of Technology (Shenzhen)); Jian Guan (Harbin engineering university); Bin Zhang (Peng Cheng Laboratory); Shuhan Qi (Harbin Institute of Technology, Shenzhen); Xuan Wang (Harbin Institute of Technology); Qing Liao (Harbin Institute of Technology (Shenzhen))
  • Design of High Performance Convolutional Neural Network for Lightweight Platform
    Daihui Li (Guangxi Normal University); Shangyou Zeng (Guangxi Normal University); Yue Zhou (Guangxi Normal University); Bing Pan (Guangxi Normal University); Lei Yang (Guangxi Normal University)
  • Research on data caching method of gradient consistent hash
    XU Kai (Shandong University of Science and Technology); LI Xujian (Shandong University of Science and Technology)
  • RnnTd: An Approach based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases
    Xiaoding Guo (Harbin Institute of Technology); Hongli Zhang (Harbin Institute of Technology); Lin Ye (Harbin Institute of Technology); Shang Li (Harbin Institute of Technology)

Session 2: CYBERSPACE SECURITY 1

Session Chair: TBA,
June 24th, 16:30 - 18:00, Meeting Room #8

  • The Improved Model for Anomaly Detection based on Clustering and Dividing of Flow
    Ao Liu (Tianjin University of Technology); Bin Sun (Tianjin University of Technology) Research of Trojan attack effect evaluation based on FAHP Haocheng Zhong ( National University of Defense Technology)
  • Research of Trojan attack effect evaluation based on FAHP
    Haocheng Zhong ( National University of Defense Technology)
  • Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments
    Hailong Yao (Lanzhou City University); Xingbing Fu (Hangzhou Dianzi University); Caifen Wang (Shenzhen Technology University); Congcong Meng (Lanzhou City University); Bo Hai (Lanzhou City University); Shiqiang Zhu (Lanzhou City University)
  • AutoDE: Automated Vulnerability Discovery and Exploitation
    Dong Ye, Sheng Zhang, Hui Wang, Jiajun Cheng, Xin Zhang, Zhaoyun Ding and Pei Li (National University of Defense Technology)

Session 3: DEEP LEARNING ALGORITHM AND APPLICATIONS 2

Session Chair: Guopeng Zhou, Peking University First Hospital
June 25th, 10:30 - 12:00, Meeting Room #7

  • Attentive Context-aware Music Recommendation
    Yu Tao (Peking University); Yuanxing Zhang (Peking University); Kaigui Bian (Peking University)
  • Rebalancing the Car Sharing System A Reinforcement Learning Method
    Lixingjian An (Zhejiang University); Changwei Ren (Zhejiang University); Zhaoquan Gu (Guangzhou University); Yuexuan Wang (Zhejiang University/The University of Hong Kong); Yunjun Gao (Zhejiang University)
  • FS-Net: Medical image denoising via local receptive field smoothing network
    Xiong Jiaxin (BEIJING INSTITUTE OF TECHNOLOGY); Xiaowei Wang (Command Automation College, PLA Army Engineering University); Rui Wang ( Harbin Institute of Technology); Worku Jifara Sori (Harbin Institute of technology); Wang Jingtian (Mary Star of the Sea High School); Shaohui Liu (Harbin Institute of Technology)
  • Multi-node Mode Decomposition Based Deep Learning Model for Road Section Traffic Prediction
    Khouanetheva Pholsena (Shanghai Jiaotong University); Li Pan (Shanghai Jiaotong University); Zhenpeng Zheng (Shanghai Jiaotong University)

Session 4: CYBERSPACE SECURITY 2

Session Chair: TBA ,
June 25th, 10:30 - 12:00, Meeting Room #8

  • Privacy-Preserving Location-Based Query over Encrypted Data in Outsourced Environment
    Huijuan Lian (Shanghai Jiao Tong University); Weidong Qiu (Shanghai Jiaotong University)*; Di Yan (Shanghai Jiao Tong University); Zheng Huang (Shanghai Jiao Tong University); Peng Tang (Shanghai Jiao Tong University
  • A Multi-Objective Examples Generation Approach to Fool the Deep Neural Networks in the Black-box Scenario
    Yepeng Deng ( Harbin Institute of Technology, Shenzhen); chunkai zhang (Harbin institute of technology); Xuan Wang (Harbin Institute of Technology, Shenzhen)
  • Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction
    Hezhong Pan (Beijing University of Posts and Telecommunications)*; Chuanyi Liu (Harbin Institute of Technology(Shenzhen)); Shaoming Duan ( Harbin Institute of Technology(Shenzhen)); Peiyi Han (Beijing University of Posts and Telecommunications); Xinyi Zhang (The Chinese University of Hong Kong, Shenzhen); Binxing Fang (Harbin Institute of Technology(Shenzhen))
  • Construction of Situation Assessment Indicator System Based on latitude and longitude lines of Information Security
    Yanwei Sun ; Li Chen (Chinese Academy of Sciences); Yunchuan Guo (Institute of Information Engineering, CAS, China); Lihua Yin (Guangzhou University)

Session 5: KNOWLEDGE GRAPTH AND KNOWLEDGE PROCESSING

Session Chair: TAB,
June 25th, 14:00 - 15:30, Meeting Room #5

  • Joint Extraction of Entities and Relations Based on Multi-Label Classification
    Yunxuan Liu (National University of Defense Technology); Aiping Li (NUDT); Jiuming Huang (National University of Defense Technology, China); Xinping Zheng ( National University of Defense Technology); Hao Wang (National University of Defense Technology); Weihong Han (Guangzhou University); Zhichao Wang (Hunan Singhand Intelligent Data Technology)
  • Knowledge Fusion: Introduction of Concepts and Techniques
    Yichen Song (National University of Defence Technology); Aiping Li (NUDT); Jiuming Huang (National University of Defense Technology, China); Xiaojuan Zhao (National University of Defense Technology); Yan Jia (National University of Defense Technology); Weihong Han (Guangzhou University)
  • Meta-Path based Text Feature Enrichment Using Knowledge Graph
    Jiayu Ding (Beijing University of Posts and Telecommunications); Xiaohuan Cao (Beijing University of Posts and Telecommunications); Linmei Hu (Beijing University of Posts and Telecommunications); Chuan Shi (Beijing University of Posts and Telecommunications)
  • Multi-source Knowledge Fusion: A Survey
    Xiaojuan Zhao (National University of Defense Technology); Yan Jia (National University of Defense Technology); Aiping Li (NUDT); Rong Jiang (National University of Defense Technology); Haocheng XI (NUDT); Yichen Song (National University of Defence Technology); Weihong Han (Guangzhou University)

Session 6: MACHINE LEARNING 1

Session Chair: Guopeng Zhou, Peking University First Hospital
June 25th, 14:00 - 15:30, Meeting Room #7

  • Learning Non-Stationary Dynamic Bayesian Network Structure from Data Stream
    Qing Meng (Hainan College of Vocation and Technique); Yongheng Wang (Zhejiang Lab); Jingbin An (Zhejiang Lab); Zhongru Wang (Zhejiang Lab)
  • HDGS: A Hybrid Dialogue Generation System using Adversarial Learning
    Yu Han (College of Computer National University of Defense Technology)
  • A Fast Network Embedding Approach with Preserving Hierarchical Proximities
    Jie Zhang (Tsinghua University); Yan Wang (Tsinghua University); Jie Tang (Tsinghua University)
  • Logic-based Online Complex Event Rule Learning with Weight Learning
    Rong Zhu (Hunan University); Yongheng Wang (Zhejiang Lab); Zengwang Wang (Hunan University); Xiaozan Zhang (hunan university); Baoxing Zhang (PLA 305 Hospital)

Session 7: SOCIAL NETWORKS 1

Session Chair: TBA,
June 25th, 14:00 - 15:30, Meeting Room #8

  • Text Sentiment Analysis based on Parallel Recursive Constituency Tree-LSTM
    Xiaozan Zhang (hunan university); Yongheng Wang (Zhejiang Lab); Xiangge Wang (Hunan University); rong zhu (Hunan University); Zengwang Wang (Hunan University); Lijie Liu (Xinjiang Military General Hospital)
  • Negotiation Game Model for Big Data Transactions
    Jiajia Zhang (Peng Cheng Laboratory); Shuqiang Yang (National University of Defense Technology); Weizhe Zhang (Pengcheng Laboratory); Bin Zhang (Peng Cheng Laboratory); Zhenhuan Luo (Harbin Institute of Technology ); Ying Zhou (Pengcheng Laboratory)
  • Joint Embedding of Emoticons and Labels Based on CNN for Microblog Sentiment Analysis
    Yongcai Tao (Zhengzhou University); Xinqian Zhang (Zhengzhou University)
  • Influence Maximization on Large-scale Networks with a Group-based Method via Network Embedding
    Li Pan (Shanghai Jiaotong University, China); Yaoxuan Ji (Shanghai Jiaotong University, China)

Session 8: INTELEGENT SYSTEM

Session Chair: TBA,
June 25th, 16:00 - 17:30, Meeting Room #5

  • An Improved Feature Fusion for Speaker Recognition
    Mei Xiang Dai (Hangzhou Dianzi University); Guojun Dai (Hangzhou Dianzi University); Yifan Wu (Hangzhou Dianzi University); Yixing Xia (Hangzhou Dianzi University); Fangyao Shen (Hangzhou Dianzi University); Zhang Hua (Hangzhou Dianzi University)
  • Visualization of the Non-dominated Solutions in Many-objective Optimization
    Minghui Xiong (Space Engineering University)
  • Toward Dynamic Computation Offloading for Data Processing in Vehicular Fog based F-RAN
    Tianpeng Ye (Shanghai Jiao Tong University); Xiang Lin (School of Electric Information and Electronic Engineering, Shanghai Jiaotong University); Jun Wu (School of Electric Information and Electronic Engineering, Shanghai Jiaotong University); Gaolei Li ( School of Electric Information and Electronic Engineering, Shanghai Jiaotong University); Jianhua Li (Shanghai Jiao Tong Uninversity)
  • Yun: A High-performance Container Management Service Based on OpenStack
    Sijie Yang (Jiangnan University); Xiaofeng Wang (Jiangnan Univeristy); An Lun; Guizhu Zhang (Jiangnan Univeristy)
  • Tracing Android Kernel Codes at Early Stage without Extra Hardware Components
    BoYu Zhang (Beijing Institute of Technology); Kai Yang ( Beijing Institute of Technology); LianFang Wang ( Beijing Institute of Technology); Yu-an Tan (Beijing Institute of Technology); SiKang Hu (Beijing Institute of Technology)

Session 9: MACHINE LEARNING 2

Session Chair: TBA,
June 25th, 16:00 - 17:30, Meeting Room #7

  • Cross-domain User Profile Construction by Log Analysis
    Ye Tao (Qingdao University of Science and Technology); Yanzhe Wang (Qingdao University of Science and Technology); Cao Shi (Qingdao University of Scinece and Technology); Xiaodong Wang (Ocean University of China); Canhui Xu (Qingdao University of Scinece and Technology); Zhifang Xu (Haier Technology Co., Ltd.)
  • The Nearest Neighbor Classifiers for Time Series with Complex Shape Features
    Qianhong Lin (Beijing Jiaotong University); huarui wu (National Agricultural Information Engineering Technology Research Center); Jidong Yuan (Beijing Jiaotong University); Jingqiu Gu (National Agricultural Information Engineering Technology Research Center)
  • Semi-Random Forest based on Representative Patterns for Noisy and Non-stationary Data Stream
    Bencai Zhang (Beijing Jiaotong University); Huarui Wu (National Agricultural Information Engineering Technology Research Center); Yange Sun (Beijing Jiaotong University)*; Ronghua Gao (Beijing Research Center for Information Technology in Agriculture)
  • A Standardized Aerosol Repository System for Knowledge Services and Crowdsourcing
    Xiaoyi Huang (Zhejiang University); Jun Zheng (Zhejiang University); Kejun Zhang (Zhejiang University); Jie Chen (Zhejiang University); Dong Liu (Zhejiang University); Lei Bi (Zhejiang University)

Session 10: SOCIAL NETWORKS 2

Session Chair: TBA,
June 25th, 16:00 - 17:30, Meeting Room #10

  • SMAM: Detecting Rumors from Microblogs with Stance Mining Assisting Task
    Zeng Lingyu(Beijing University of Posts and Telecommunications); Bin Wu (Beijing University of Posts and Telecommunications); Bai Wang (Beijing University of Posts and Telecommunications)
  • Topic Model-based Recommender System for Long-tailed Products against Popularity Bias
    Chunhua Sun (Hefei University of Technology); Yinjie Xu (Hefei University of Technology )
  • An Unsupervised Approach of Truth Discovery From Multi-Sourced Text Data
    Chen Chang (Army Engineering University); Cao Jianjun (Nanjing Telecommunication Technology Institute); Lv Guoijun; Nianfeng Weng (The Sixty-third Research Institute, National University of Defense Technology)
  • Identifying Influential Nodes with A Community Structure Measure
    Liangliang Zhang (Academy of Military Science)


Workshops

BIG DATA AND BUSINESS ANALYTICS (BDBA 2019)

Workshop Chair: Jianshan Sun

June 23th, 08:30 - 09:30, Meeting Room #5

  • Research on the relationship between APP size and installation time in intelligent mobile devices
  • Attention-based Text Recognition in Image
  • A multi-task Convolutional Neural Network for Image Classification
  • Chinese Text Classification based on Neural Networks and Word2vec
  • Weighted-Ring Similarity Measurement for Community Detection in Social Network
June 23th, 09:50 - 12:00, Meeting Room #5
  • Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-means and Skip-gram
  • Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural Network
  • Improvement and Application of Apriori Algorithm Based on Equalization
  • A Spatio-temporal Flow Model of Dockless Shared Bikes
  • Sentiment Analysis of Home Appliance Comment Based on Generative Probabilistic Model

June 23th, 13:30 - 15:30, Meeting Room #5
  • Competency Analysis in Human Resource Using Text Classification Based on Deep Neural Network
  • Finding Water Quality Trend Patterns Using Time Series Clustering: A Case Study
  • Overview of IoT Security Architecture
  • The current research of IoT security


Big Data Mining for Cyberspace (BDMC 2019)

Workshop Chair: Zhaoquan Gu and Jing Qiu
June 23th, 08:30 - 09:30, Meeting Room #8

  • Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation
  • BICON:Connecting the Same Users of Different Social Networks Using BiLSTM
  • Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks
  • A Topic Mining Method for Multi-source Network Public Opinion Based on Improved Hierarchical Clustering
  • Hybrid Text Topic Discovery Method for Multi source Information
  • 
June 23th, 09:50 - 12:00, Meeting Room #8
  • Machine Learning assisted Content Delivery at Edge of Mobile Social Networks
  • Community Preserving Node Embedding based on Seed-Expansion Sampling
  • The Impact of Personality on User-Genetated Content in Online Socail Networks
  • A Method of Conflict Detection for Security Policy Based on B+ Tree

Workshop Chair:  

Multi-Source Network Fusion and Analysis (MSNFA 2019)

Workshop Chair: Bin Wu and Chuan Shi

June 23th, 08:30 - 09:30, Meeting Room #8

  • Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation
  • BICON:Connecting the Same Users of Different Social Networks Using BiLSTM
  • Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks
  • A Topic Mining Method for Multi-source Network Public Opinion Based on Improved Hierarchical Clustering
  • Hybrid Text Topic Discovery Method for Multi source Information

June 23th, 09:50 - 12:00, Meeting Room #8

  • Machine Learning assisted Content Delivery at Edge of Mobile Social Networks
  • Community Preserving Node Embedding based on Seed-Expansion Sampling
  • The Impact of Personality on User-Genetated Content in Online Socail Networks
  • A Method of Conflict Detection for Security Policy Based on B+ Tree

Vulnerability Analysis and Adversarial Learning (VAAL 2019)

Workshop Chair: Hu Li and Yuanping Nie

June 23th, 13:30 - 15:30, Meeting Room #7

  • A Black-box Approach To Generate Adversarial Examples Against Deep Neural Networks For High Dimensional Input
  • A Structure-based De-anonymization Attack on Graph Data Using Weighted Neighbor Match
  • Botnet Detection Method Based on Artificial Intelligence
  • Construction of Cyber Range Network Security Indication System Based on Deep Learning
  • Formal Verification of 5G-EAP-TLS Authentication Protocol

June 23th, 16:00 - 17:50, Meeting Room #7
  • FSM-based Cyber Security Status Analysis Method
  • Intrusion Detection Results Analysis Based on Variational Auto-encoder
  • Research on Evaluation Index System for Software Vulnerability Analysis Methods
  • VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries
  • A Novel Text Classification Approach Based on Word2vec and TextRank Keyword Extraction
  • A Detection Method Based on K-Cores Algorithm for Abnormal Processes in the Server

Virtual Narration and User Experience Design Analysis (VNUEDA 2019)

Workshop Chair:Feng Ye and Ling Zou

June 23th, 13:30 - 15:30, Meeting Room #8

  • An Empirical Study on Expectation of Relationship Between Human and Smart Devices--with smart speaker as an example
  • Facial Movements Recognition Using Multichannel EMG Signals
  • Grey Island: Immersive tangible interaction through augmented reality
  • Narratology-based Interaction Design of 3D Reconstructed Cultural Relics
  • Research on the Application of Chinese Traditional Patterns Innovation and Development Based on Interactive Media

June 23th, 16:00 - 17:50, Meeting Room #8
  • Study on Digital Chromatography of Fahai Temple Frescoes in Ming Dynasty Based on Visualization
  • A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition
  • Feature selection and visualization based on interaction dominance
  • Efficient Randomized Hierarchy Construction for Interactive Visualization of Large Scale Point Clouds

Data Analysis for Bridging Cyber-Real Spaces (DA4BS2 2019)

Workshop Chair: Peng Wang and Xiao Sun

June 23th, 16:00 - 17:50, Meeting Room #5

  • Blockchain based Fine-grained and Scalable Acess Control for IoT Security and Privacy
  • UAV-based Motion Target Detection and Tracking Method in Dynamic Scenes
  • Accurate object recognition for unmanned aerial vehicle electric power inspection using an improved YOLOv2 algorithm
  • A Survey: Cloud Data Security Based on Blockchain Technology
  • Uncertain Complex Event Processing Based on Markov Logical Networks
  • A Localization Approach for Non-localizable Wireless Sensor Network with Stationary Passive Events
  • Analyzing the Cross-Sector Sharing of Government Data Based on the Niche Theory

footer