Program

Program at a Glance

The 7th IEEE International Conference on Data Science in Cyberspace(IEEE DSC2022) Program

July 11-13,Guilin,China

Day 1, July 11, 2022 (Main Conference) (Golden Cassia)

Time Event Chair
09:00-09:15 Opening ceremony
Welcoming speech: Binxing Fang, Academician, Chinese Academy of Engineering
Welcome speech: Ya Zhou
Yanchun Zhang
09:15-10:00 Keynote I: Science, Technology, Engineering, Industry
Speaker: Shanlin Yang, Academician, Chinese Academy of Engineering
Yanchun Zhang
10:00-10:30 Invited Talk I: Tackling Unknown Future: Open-World Domain Adaptive Graph Learning Speaker: Xingquan Zhu
10:30-10:50 Group photo & Coffee Break
10:50-11:35 Keynote II: The Construction of Science and Technology Industry System of Information System
Speaker: Jun Lu, Academician, Chinese Academy of Engineering
Jianming Liu
11:35-12:05 Invited Talk II: Multi-Granularity Cognitive Computing for Network Security
Speaker: Guoyin Wang
12:05-14:00 Lunch Break
14:00-14:45 Keynote III: Human-centred Perspectives for Data Quality Discovery
Speaker: Shazia Sadiq
Hongwei Li
14:45-15:15 Invited Talk III: Real-world stream data analysis: challenges and opportunities
Speaker: Toshiyuki Amagasa
15:15-15:35 Coffee break
15:35-16:20 Keynote IV: Data Management for Effective and Efficient Deep Learning
Speaker: Lei Chen
Shuyuan Jin
16:20-16:50 Invited Talk IV: Challenges of Satellite Internet Security
Speaker: Xiaosong Zhang
17:50-18:00 Awarding Ceremony
Best Paper Awards
Yong Ding
18:00-20:00 Banquet & Performances (Duxiu Room)

Day 2, July 12, 2022 (Sessions)

09:00-10:30 Session 1: Situation Awareness (Guihu Room) Session 2: Cyberspace security I (Ronghu Room) Session 3: Cyberspace security II (Shanhu room)
10:30-10:50 Coffee Break
10:50-12:20 Session 4: Cyberspace Security III (Guihu Room) Session 5: Deep Learning Algorithms and Applications I (Ronghu Room) Session 6: Deep Learning Algorithms and Applications II (Shanhu room)
12:20-14:20 Lunch Break
14:20-15:50 Session 7: Network Attack and Defense (Guihu Room) Session 8: Intelligent System (Ronghu Room) Session 9: Data Mining I (Shanhu room)
15:50-16:20 Coffee Break
16:20-18:00 Session 10: Data Mining II (Guihu Room) Session 11: Data Security and Privacy (Ronghu Room) Session :
(Shanhu room)
18:00-21:00 Dinner(Galleon)

Day 3, July 13, 2022 (Workshops)

09:00-10:20 MDATA (Guihu Room) VAAL (Ronghu Room) NSAC (Shanhu room)
10:20-10:50 Coffee Break
10:50-12:00 MDATA (Guihu Room) VAAL (Ronghu Room) NSAC (Shanhu room)
12:00-14:00 Lunch Break
14:00-15:40 BDBA (Guihu Room) SAACS (Ronghu Room) CCIS (Shanhu room)
15:40-16:10 Coffee Break
16:10-18:10 DHCA (Guihu Room) BDMC (Ronghu Room) DGPP (Shanhu room)
18:10-21:00 Dinner

Main Technical Program

SESSION 1: Situation Awareness

July 12th, 09:00-10:30,Guihu Room

  • A Multi-step Attack Detection Framework for the Power System Network
    Ju Yang; Liang Zhou; Le Wang; Shudong Li; Ziqing Lin; Zhaoquan Gu
  • A Novel Network Security Situation Awareness Model for Advanced Persistent Threat
    Kai Chen; Jingxian Zhu; Lansheng Han; Shenghui Li; Pengyi Gao
  • NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model
    Junzheng Yang; Feng Liu; Lu-lu Liang; Yuan-jie Zhao; Jiayin Qi
  • Shock Trap: An active defense architecture based on trap vulnerabilities
    Quan Hong; Yang Zhao; Jian Chang; Yuxin Du; Jun Li; Lidong Zhai

SESSION 2: Cyberspace Security I

July 12th, 09:00-10:30,Ronghu Room

  • Capability-based Component Security Mechanism for Microkernel OS
    Jiajia Yi; Lirong Chen; Kun Xiao
  • A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection
    Runsheng Guo; Man Zhang; Hui Lu; Qichao Liu; Ning Hu
  • A Survey on Data Poisoning Attacks and Defenses
    Jiaxin Fan
  • A Model Checker for MDS Attacks
    Qian Ke; Haixia Wang; Chunlu Wang; Zihan Xu; Yongqiang Lyu; Dongsheng Wang

SESSION 3: Cyberspace security II

July 12th, 09:00-10:30,Shanhu room

  • MANAGE: A Novel Malware Evolution Model based on Digital Genes
    Yu Zhang
  • Automated Crash Analysis and Exploit Generation with Extendable Exploit Model
    Zhehui Liu; Zhongru Wang; Yuntao Zhang; Tong Liu; Binxing Fang; Zhengyuan Pang
  • WREP: A lightweight event real-time processing engine for IoT
    Lei Feng; Yuanfei Zhang; Zhiqiang Hao; Chonghua Wang
  • A Hierarchical Terminal Recognition Approach based on Network Traffic Analysis
    Lingzi Kong; Daoqi Han; Junmei Ding; Mingrui Fan; Yueming Lu

SESSION 4: Cyberspace security III

July 12th, 10:50-12:20,Guihu Room

  • A virtualization-based security architecture for industrial control systems
    Yuqiang Zhang; Zhiqiang Hao; JiaWei Luo; Ning Hu; Chonghua Wang
  • Research and Application of Intelligent Vehicle Cybersecurity Threat Model
    Haitao Zhang; Lei Luo; Ruikun Li; Jiajia Yi; Yun Li; Lirong Chen
  • SMRT: An Effective Malicious Node Resistance Design for Mixnets
    Jincai Zou; Zhihan Tan; Yaya Huang; Yixing Chen; Yuqiang Zhang; Ning Hu
  • Stealth: A Heterogeneous Covert Access Channel for Mix-net
    Yixing Chen; Yuqiang Zhang; Jincai Zou; Zhihan Tan; Yaya Huang; Ning Hu

SESSION 5: Deep Learning Algorithms and Applications I

July 12th, 10:50-12:20,Ronghu Room

  • An asterisk-shaped patch attack for object detection
    Fashan Dong; Binyue Deng; Haiyang Yu; Wenrong Xie; Huawei Xu; Zhaoquan Gu
  • Multiple Sequential Network Attacks Detection Based on DTW-HMM
    Haitian Liu; Rong Jiang; Bin Zhou; Xing Rong; Juan Li; Aiping Li
  • Knowledge Graph of Artificial Intelligence in Medicine: A Scientometric Analysis
    Jinlei Liu; Wenchao Dan; Nuo Cheng; Wenjing Lian; Peirong Qu; Hui Zhang; Yuling Zha; Jie Wang
  • End-to-end training image-text matching network
    Depeng Wang; Hong Chen; Yibo Sun

SESSION 6: Deep Learning Algorithms and Applications II

July 12th, 10:50-12:20,Shanhu room

  • Topic Modeling for Short Texts Via Dual View Collaborate Optimization
    Wei Liu; Yutao Huang; Yibing Guo; Ye Wang; Binxing Fang; Qing Liao
  • NMI-FGSM-tri: An efficient and targeted method for generating adversarial examples in speaker recognition
    Junjian Zhang; Hao Tan; Binyue Deng; Jiacen Hu; Dong Zhu; Linyi Huang; Zhaoquan Gu
  • An Optimized Transaction Processing Scheme for Highly Contented E-commerce Workloads
    Chenjia Yu; Shuhan Qi; Yang Liu*
  • TFHM: A Traffic Feature Hiding Scheme Based on Generative Adversarial Networks
    Yaya Huang; Yixing Chen; Yuqiang Zhang; Jincai Zou; Zhihan Tan; Ning Hu

SESSION 7: Network Attack and Defense

July 12th, 14:20-15:50,Guihu Room

  • Anomaly Detection from Log Data Sequences with Perturbations
    Yixiang Chen; Linhao Ye; Yufeng Ye; Qingfeng Tan; Peng Zhang
  • A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples
    Ruiling Gan; Jiawen Diao; Xiang Cui; Shouyou Song
  • A method of network traffic anomaly detection based on Packet Window Transformer
    Wenjie Mi
  • Light-weight Unsupervised Anomaly Detection for Encrypted Malware Traffic
    Shangbin Han; Qianhong Wu; Han Zhang; Bo Qin

SESSION 8: Intelligent System

July 12th, 14:20-15:50,Ronghu Room

  • Research on industrial Robot system security based on Industrial Internet Platform
    Gong Xiao
  • Privacy Protection Management Model for Internet of Things Data
    Yundan Yang; Fenghui Duan; Maoshen Zhang; Junjie Liu; Jin Li; Yueming Lu
  • Optimizing Diffusion Layer with AVX Shuffling: A Study on SKINNY
    Jinhai Chen; Zheng Gong; Yufeng Tang; Yupeng Zhang; Bin Li
  • Automated Vulnerability Discovery System Based on Hybrid Execution
    Tong Liu; Zhongru Wang; Yuntao Zhang; Zhehui Liu; Binxing Fang; Zhengyuan Pang

SESSION 9: Data Mining I

July 12th, 14:20-15:50,Shanhu room

  • A Method Combining Text Classification and Keyword Recognition to Improve Long Text Information Mining
    Lang Liu
  • Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise
    Ziqi Zhu; Bin Zhu; Huan Zhang; Yu Geng; Le Wang; Denghui Zhang; Zhaoquan Gu
  • Exploring Users’ Temporal Characteristics of “Purchase and Comment” Behaviors based on Human Dynamics
    Liang Wu; Fangming Ruan; Liangqiang Li; Yidan Li

SESSION 10: Data Mining II

July 12th, 16:20-18:00,Guilu Room

  • A novel Tri-training algorithm based on Evidence Theory
    Hongshun He; Zhipeng Zhang; Lei Yang; Yang Li; Jiakang Shi
  • Anchor graph semi-supervised learning method based on Evidence Theory
    Hongshun He; Wei Yu; Lei Yang; Yang Li; Luyu Sun
  • The Power Analysis Based on Mean–Ridge Regression
    Xiaonian Wu
  • FAVT: A Feature-Anchored Video Data Trading Mechanism
    JiaShun Zhou; Na Wang; Aodi Liu; Xuehui Du

SESSION 11: Data Security and Privacy

July 12th, 16:20-18:00,Ronghu Room

  • A Data Encoding Method for Multipath Anonymous Transmission
    Zhihan Tan; Yaya Huang; Yixing Chen; Yuqiang Zhang; Jincai Zou; Ning Hu
  • Research on One-way Data Transmission Technology Based on RDMA
    Yuanpeng Yang; Hongbo Wang; Xiaofeng Wang; Yuan Liu
  • Research on the Characteristics and Security Risks of the Internet of Vehicles Data
    Jun Sun; Dong Liu; Yang Liu; Chuang Li; Yumeng Ma
  • An efficient anonymous authentication and supervision system based on blockchain
    Weiyou Liang; Yujue Wang; Yong Ding; Haibin Zheng; Hai Liang; Huiyong Wang

Workshops

Multi-dimensional Data Association and inTelligent Analysis (MDATA 2022)

July 13th, 09:00-10:20, 10:20-12:00 (Guihu Room)

  • Hybrid butterfly optimization algorithm–based support vector machine for botnet command-and-control channel detection
    Kai Chen; Jietong Su; Lansheng Han; Shenghui Li; Pengyi Gao
  • Data traceability scheme of industrial control system based on digital watermark
    Jun Sun; Yang Li; Ge Zhang; Liangyu Dong; Zitao Yang; Mufeng Wang; Jiahe Cai
  • A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection
    Runsheng Guo; Qichao Liu; Man Zhang; Ning Hu; Hui Lu
  • Design and Implementation of Network Traffic Analysis System for Power Grid Metering System
    Tao Liu; Honghao Liang; Xiaowei Chen; Zimeng Li; Lingzi Kong; Jin Li; Yueming Lu
  • Modeling Unseen Entities from a Semantic Evidence View in Temporal Knowledge Graphs
    Chen Guo; Yang Lin; Hao Chen; Haiyang Yu; Chengwei Zhu; Jing Qiu
  • A Survey on Threat Hunting: Approaches and Applications
    Lei Chen; Rong Jiang; Changjian Lin; Aiping Li
  • SpeechHide: A Hybrid Privacy-preserving Mechanism for Speech Content and Voiceprint in Speech Data Sharing
    Yu Hu; Ran Li; Simin Wang; Fuqiang Tao; Zhe Sun

Vulnerability Analysis and Adversarial Learning (VAAL 2022)

July 13th, 09:00-10:20, 10:20-12:00 (Ronghu Room)

  • Lisp-TBCNN: A Malicious Code Detection System Based on Machine Learning
    Huanyu Chi; Zekun Fei; Zhi Wang; Li Gu
  • AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat
    Zian Jia; Xiaosu Wang; Yun Xiong; Yao Zhang; Jinjing Zhao
  • Fuzzing DBMS via Sequence Model
    Yabin Li; Yuanping Nie; Xiaohui Kuang
  • A Survey of Human-machine Collaboration in Fuzzing
    Qian Yan; Minhuan Huang; Huayang Cao
  • An Automatic Code Generation Method Based on Sequence Generative Adversarial Network
    Hanwen Sun; Yuanping Nie; Xiang Li; Minhuan Huang; Jianwen Tian; Wei Kong
  • NAFuzzer: Augmenting Network Protocol Fuzzers via Automatic Template and Seed Generation
    Ke Yan; Bo Yu; Yong Tang; Xiangdong Kong; Chen Chen; Jin Lei
  • DeepCov: Coverage Guided Deep Learning Framework Fuzzing
    Hongfang Yu; Jiawei Wu; Senyi Li; Junqiang Li; Long Luo; Gang Sun

Network Security Analysis for Cyberspace (NSAC 2022)

July 13th, 09:00-10:20, 10:20-12:00 (Shanhu room)

  • Network Security Intrusion Detection and Mass Alarms Under Cluster Computing Platform
    Feng Li; Fei Shu; Mingxuan Li; Bin Wang
  • Cross-Security Domain Dynamic Orchestration Algorithm of Network Security Functions
    Weidong Xiao; Xu Zhang; Dongbin Wang
  • AGDB: A Dictionary-based Malicious Domain Detection Method based on Representation Fusion
    You Zhai; Hao Dong; Zhoujun Li; Liqun Yang; Longtao He
  • A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense
    Kun Guo; Yibo Gao; Dongbin Wang; Hui Zhi; Tao Zhang; Yueming Lu
  • FLYFDetect: A Smart Home Privacy Protection Framework via Federated Learning
    Bing Chen; Yaping Liu; Shuo Zhang; Jie Chen; Zhiyu Han
  • Security Evaluation Model of Blockchain System Based on Combination Weighting and Grey Clustering
    Qi Jiahao; Ziyu Guo; Yueming Lu; Jiaqi Gao; Yihong Guo; Fanyao Meng
  • TLD-WF: Surfing Freely Under Website Fingerprinting Attacks
    Ling Liu; Xin Liu; Yue Zhao; Ning Hu

Big Data and Business Analytics (BDBA 2022)

July 13th, 14:00-15:40 (Guihu Room)

  • MASCA:A Multimodal Abstractive Summarization Model Based on Core Words Fusion Attention
    Xiaohan Yin; Lijuan Sun; Jingchen Wu; Xu Wu; Lirong Qiu
  • TAFM: Topic-Attention FM-encoder for Text Generation
    Dongye He; Xu Wu; Lijuan Sun; Jingchen Wu; Lirong Qiu
  • Adversarial Example Attacks against ASR Systems: An Overview
    Xiao Zhang; Hao Tan; Zhaoquan Gu
  • Prediction of Real Popularity based on Sample Debias
    Liang Li; Liqun Gao; Feng Xie; Bin Zhou
  • Leveraging Multi-aspect Semantics for Conversation Structure Modeling
    Tuwen Guo; Xi Zhang; Lirong Qiu

Situation Awareness Analysis for Cyberspace Security (SAACS 2022)

July 13th, 14:00-15:40 (Ronghu Room)

  • A combined-CNN model of TLS Traffic Recognition and Classification
    Yunfan Tian; Dongxin Liu; Laifu Wang; Bowen Hu
  • A Review of Provenance Graph based APT Attack Detection:Applications and Developments
    Yang Lv; Shaona Qin; Zifeng Zhu; Zhuocheng Yu; Shudong Li; Weihong Han
  • A Novel Framework For Malicious Encrypted Traffic Classification On Host Level And Flow Level
    Haitao Zhang; Lei Luo; Yun Li; Lirong Chen; Xiaobo Wu
  • A Review of Attribution Technical for APT Attacks
    Yangyang Mei; Weihong Han; Shudong Li; Xiaobo Wu; Kaihan Lin; Yulu Qi
  • A SQL Blind Injection Method Based on Gated Recurrent Neural Network
    Jiahui Zheng; Junjian Li; Chao Li; Ran Li

Cybersecurity for Critical Infrastructure Systems (CCIS 2022)

July 13th, 14:00-15:40 (Shanhu room)

  • A timestamp-based covert data transmission method in Industrial Control System
    Jie Lu; Yong Ding; Zhenyu Li; Chunhui Wang
  • Research on Lightweight Blockchain Technology Based on Edge Computing
    Maosheng Zhang; Ruohan Cao; Fenghui Duan; Yundan Yang; Yueming Lu; Man Zhang; Xu Lu
  • Access Control Mechanism for Edge Nodes
    Fenghui Duan; Yundan Yang; Maosheng Zhang; Songqi Wu; Yueming Lu; Man Zhang; Xu Lu
  • New Integral distinguishers for I - PresentTM, TANGRAM and CHAM
    Li Lingchen; Qiu Xueying; Zhu Chenghui; Xiaonian Wu

Digital Humanities and Computer Arts (DHCA 2022)

July 13th, 16:10-18:10 (Guihu Room)

  • Display Design Based on Virtual Reality Technology VR-Platform Platform
    Junzhu Zhang; Yugao Zheng
  • Research on Multi-Model Fusion for Named Entity Recognition Based on Loop Parameter Sharing Transfer Learning
    Haoran Ma; Zhaoyun Ding
  • Classification of Diabetic Retinopathy Based on B-ResNet
    Ying Zhang
  • A Survey on Knowledge Graph Embedding
    Qi Yan; Jiaxin Fan; Mohan Li; Guanqun Qu; Yang Xiao
  • Image Art Innovation based on Extended Reality Technology
    Feng Ye
  • Application of Virtual Simulation in Digital Exhibition and Performance
    Ling Zou; Jing Li

Big Data Mining for Cyberspace (BDMC 2022)

July 13th, 16:10-18:10 (Ronghu Room)

  • SATMask: Spatial Attention Transform Mask for Dense Instance Segmentation
    Quanzhong Mao; Lijuan Sun; Jingchen Wu; Xu Wu; Lirong Qiu
  • A Lightweight Authentication Protocol For IoT based on ECC scheme
    Zhiyu Han; Yaping Liu; Shuo Zhang; Jie Chen; Bing Chen
  • The final security problem in IOT:Don’t count on the canary!
    Qian Zhou; Hua Dai; Liang Liu; Jie Chen; Kai Shi; Hong Jiang
  • Industrial Defect Detection Through Computer Vision: A Survey
    Yunjie Tang; Kai Sun; Danhuai Zhao; Yan Lu; Jiaju Jiang; Hong Chen
  • VCFN-Video Computing Force Network
    Yichuan Wu; Meng Guo; Lei Yang; Wei Yu
  • 10 Gigabit industrial thermal data acquisition and storage solution based on software-defined network
    Ge Zhang

Data Governance and Privacy Protection (DGPP 2022)

July 13th, 16:10-18:10 (Shanhu room)

  • Time-Lock Encryption for Multiple Consecutive Periods and its Application
    Yuewu Lian; Haitao Zhan; Peiheng Zhang; Mingwu Zhang
  • Secure outsourced VANET data in clouds with designated supervisor
    Meng Zhao; Yong Ding; Tong Zhang; Xiaochun Zhou
  • Information dissemination model of recommendation platform based on network community
    Wu R Ming
  • A Novel Mobile Instant Messaging System
    Yichuan Wu; Jianping Zheng; Meng Guo
  • VCFN-Video Computing Force Network
    Yichuan Wu; Meng Guo; Lei Yang; Wei Yu
  • DESEND:A Fast Device Event Signature Extraction And Detection Method for Smart Home
    Jie Chen; Yaping Liu; Shuo Zhang
footer