Luming Yang, Yingming Zeng, Shaojing Fu, Yuchuan Luo
{"title":"Unsupervised Analysis of Encrypted Video Traffic Based on Levenshtein Distance","authors":"Luming Yang, Yingming Zeng, Shaojing Fu, Yuchuan Luo","doi":"10.1007/978-981-15-9031-3_9","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_9","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128747894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating Adversarial Malware Examples with API Semantics-Awareness for Black-Box Attacks","authors":"Xiaowei Peng, Hequn Xian, Qian Lu, Xiuqing Lu","doi":"10.1007/978-981-15-9031-3_5","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_5","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117174104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forward Calculation for Improving the Sensitivity of Multiple Perturbations in Magnetic Induction Tomography Based on Brain Tissue Structure","authors":"Yi Lv","doi":"10.1007/978-981-15-9031-3_37","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_37","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121128202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Measure to Quantify the Robustness of Social Network Under the Virus Attacks","authors":"B. Song, Zhengjun Jing, Y. Guo, R. Liu, Qian Zhou","doi":"10.1007/978-981-15-9031-3_17","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_17","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116449379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao Peng, Can Liu, Dandan Zhao, Zhaolong Hu, Jianmin Han, Jianfeng Lu
{"title":"Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies","authors":"Hao Peng, Can Liu, Dandan Zhao, Zhaolong Hu, Jianmin Han, Jianfeng Lu","doi":"10.1007/978-981-15-9031-3_29","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_29","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127432541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Web Anomaly Detection Approach Based on Semantic Structure","authors":"Zishuai Cheng, Baojiang Cui, Junsong Fu","doi":"10.1007/978-981-15-9031-3_2","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_2","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Movie Recommendation System Based on Differential Privacy","authors":"Min Li, Yingming Zeng, Yue Guo, Yun Guo","doi":"10.1007/978-981-15-9031-3_28","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_28","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"247 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiqiang Wang, Shuhao Li, B. Wang, Xiaorui Ren, Tao Yang
{"title":"A Malicious URL Detection Model Based on Convolutional Neural Network","authors":"Zhiqiang Wang, Shuhao Li, B. Wang, Xiaorui Ren, Tao Yang","doi":"10.1007/978-981-15-9031-3_3","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_3","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128382397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions","authors":"Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang","doi":"10.1007/978-981-15-9031-3_30","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_30","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121597308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhifei Wang, Gang Xu, Fengqi Wei, Z. Qi, Liqiang He
{"title":"Key Nodes Recognition in Opportunistic Network","authors":"Zhifei Wang, Gang Xu, Fengqi Wei, Z. Qi, Liqiang He","doi":"10.1007/978-981-15-9031-3_16","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_16","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133613985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}