default search action
6th SocialSec 2020: Tianjin, China
- Yang Xiang, Zheli Liu, Jin Li:
Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings. Communications in Computer and Information Science 1298, Springer 2020, ISBN 978-981-15-9030-6
Big Data Security
- Yunru Zhang, Min Luo, Kim-Kwang Raymond Choo, Li Li, Debiao He:
Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm. 3-19 - Zishuai Cheng, Baojiang Cui, Junsong Fu:
A Novel Web Anomaly Detection Approach Based on Semantic Structure. 20-33 - Zhiqiang Wang, Shuhao Li, Bingyan Wang, Xiaorui Ren, Tao Yang:
A Malicious URL Detection Model Based on Convolutional Neural Network. 34-40 - Ke Yuan, Yahui Wang, Yingming Zeng, Wenlei Ouyang, Zheng Li, Chunfu Jia:
Security-Enhanced Timed-Release Encryption in the Random Oracle Model. 41-51 - Xiaowei Peng, Hequn Xian, Qian Lu, Xiuqing Lu:
Generating Adversarial Malware Examples with API Semantics-Awareness for Black-Box Attacks. 52-61 - Pan Zhang, Fenggang Lai, Jing Du, Zhangchi Ying, Rui Kong, Yi Zhou, Xiao Yu:
An Elastic Data Processing Method Based on Data-Center-Platform. 62-71 - Jinyin Chen, Dunjie Zhang, Xiang Lin:
Adaptive Adversarial Attack on Graph Embedding via GAN. 72-84 - Shengxu Xie, Chang-you Xing, Guomin Zhang, Xianglin Wei, Guyu Hu:
Research on LDoS Attack Detection and Defense Mechanism in Software Defined Networks. 85-96 - Luming Yang, Yingming Zeng, Shaojing Fu, Yuchuan Luo:
Unsupervised Analysis of Encrypted Video Traffic Based on Levenshtein Distance. 97-108 - Jun-Feng Tian, Rui-Fang Guo:
An Efficient and Revocable Auditing Scheme for the Internet of Things. 109-119 - Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song:
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning. 120-131 - Umair Khadam, Muhammad Munwar Iqbal, Leonardo Mostarda, Farhan Ullah:
An Efficient Framework for Text Document Security and Privacy. 132-140
Social Networks
- Jianping Yu, Gang Zhao, Xiaohui Kuang, Ruyun Zhang:
A Real-Time Audio and Video Streaming Transmission Scheme for Social Media. 143-152 - Chaogang Tang, Xianglin Wei, Chong Liu, Haifeng Jiang, Huaming Wu, Qing Li:
UAV-Enabled Social Internet of Vehicles: Roles, Security Issues and Use Cases. 153-163 - Xinxin Zhang, Li Xu, Min Gao:
An Efficient Influence Maximization Algorithm Based on Social Relationship Priority in Mobile Social Networks. 164-177 - Zhifei Wang, Gang Xu, Fengqi Wei, Zhihan Qi, Liqiang He:
Key Nodes Recognition in Opportunistic Network. 178-188 - Bo Song, Zhengjun Jing, Y. Jay Guo, Ren Ping Liu, Qian Zhou:
A Novel Measure to Quantify the Robustness of Social Network Under the Virus Attacks. 189-200
Privacy-Preserving and Security
- Jingwen Lu, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo:
Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer's Disease Based on Machine Learning. 203-214 - Yanan Zhang, Chao Ma, Dong Wang, Tianyu Liu, Zhi Wu:
A Methodology of Fake Cell Test Based on the RRC Redirection or Reselection Priorities from the 5G Network. 215-223 - Lianfang Wang, Ye Wang, Gang Zhao, Lu Liu, Xiaohui Kuang:
Keeping Privacy Data Secure Under Factory Recovery. 224-233 - Ming Yan, Bo Zhang, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang:
An Intelligent File Transfer Optimization for Poor Network Conditions. 234-244 - Shuo Feng, Yu-an Tan, Gang Zhao, Xiaohui Kuang, Xiao Yu, Juan Wang:
A VirtualXposed-Based Inline Hooking Framework for Android Native Methods. 245-253 - Kai Yang, Ling Pang, Bo Zhang, Gang Zhao, Xiaohui Kuang:
An Android Data Protection Scheme for System-as-Root Architectures. 254-262 - Xueming Qiao, Meng Chen, Xiangkun Zhang, Weiyi Zhu, Yanhong Liu, Zhixin Huo, Ruiqi Sun, Dongjie Zhu:
A Two-Fitness Resource Scheduling Strategy Based on Improved Particle Swarm Optimization. 263-277 - Nan Jia, Shaojing Fu, Ming Xu:
Privacy-Preserving Nonlinear SVM Classifier Training Based on Blockchain. 278-288 - Quanyu Zhao, Fengqian Zhang, Yuan Zhang:
A Novel Defending Scheme for Graph-Based Classification Against Graph Structure Manipulating Attack. 289-302 - Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu:
Privacy-Preserving Graph Operations for Social Network Analysis. 303-317 - Min Li, Yingming Zeng, Yue Guo, Yun Guo:
The Movie Recommendation System Based on Differential Privacy. 318-328 - Hao Peng, Can Liu, Dandan Zhao, Zhao-Long Hu, Jianmin Han, Jianfeng Lu:
Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies. 329-339 - Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang:
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions. 340-354 - Wei Wei, Jin Yang, Sikai Wang, Deng Chen, Yanduo Zhang, Zihang Zhang, Wei Liu, Gonghao Duan, Chaohui Zheng, Jianping Ju, Jianyin Tang:
Automatic Counting of Railway Tools Based on Deep Learning. 355-368 - Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Zhaolong Hu:
Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links. 369-378 - Ying Ma, Kaiyong Li, Jiayu Hou:
Automatic Classification Analysis of Tibetan Folk Music Based on Adaboost Algorithm. 379-386 - Jing Wang, Hongjie Zhang, Lishong Shao, Li Li, Min Luo:
On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social Systems. 387-394 - Kaihao Lou, Shuqiu Li, Funing Yang, Xingliang Zhang:
Advertising Strategy for Maximizing Profit Using CrowdSensing Trajectory Data. 395-406 - Tianchu Hang, Yang Bai, Guishi Deng:
A Method for Community Partition Based on Information Granularity. 407-419 - Yi Lv:
Forward Calculation for Improving the Sensitivity of Multiple Perturbations in Magnetic Induction Tomography Based on Brain Tissue Structure. 420-432 - Jiangpeng Shi, Xiaochun Cheng, Jianfeng Wang:
Pair-Wise Convolution Network with Transformers for Sequential Recommendation. 433-445
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.