International Symposium on Security and Privacy in Social Networks and Big Data最新文献

筛选
英文 中文
Adaptive Adversarial Attack on Graph Embedding via GAN 基于GAN的图嵌入自适应对抗攻击
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_7
Jinyin Chen, Dunjie Zhang, Xiang Lin
{"title":"Adaptive Adversarial Attack on Graph Embedding via GAN","authors":"Jinyin Chen, Dunjie Zhang, Xiang Lin","doi":"10.1007/978-981-15-9031-3_7","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_7","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning 人工智能强化学习中基于关键状态的偏差约束的可配置非策略评估
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_11
Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song
{"title":"A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning","authors":"Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song","doi":"10.1007/978-981-15-9031-3_11","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_11","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123596113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pair-Wise Convolution Network with Transformers for Sequential Recommendation 带变压器的顺序推荐成对卷积网络
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_38
Jiangpeng Shi, Xiaochun Cheng, Jianfeng Wang
{"title":"Pair-Wise Convolution Network with Transformers for Sequential Recommendation","authors":"Jiangpeng Shi, Xiaochun Cheng, Jianfeng Wang","doi":"10.1007/978-981-15-9031-3_38","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_38","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"23 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123182251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Methodology of Fake Cell Test Based on the RRC Redirection or Reselection Priorities from the 5G Network 基于5G网络RRC重定向或重选优先级的假小区测试方法
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_19
Yanan Zhang, Chao Ma, Dong Wang, Tianyu Liu, Zhi Wu
{"title":"A Methodology of Fake Cell Test Based on the RRC Redirection or Reselection Priorities from the 5G Network","authors":"Yanan Zhang, Chao Ma, Dong Wang, Tianyu Liu, Zhi Wu","doi":"10.1007/978-981-15-9031-3_19","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_19","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent File Transfer Optimization for Poor Network Conditions 恶劣网络条件下的智能文件传输优化
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_21
Ming Yan, Bo Zhang, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang
{"title":"An Intelligent File Transfer Optimization for Poor Network Conditions","authors":"Ming Yan, Bo Zhang, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang","doi":"10.1007/978-981-15-9031-3_21","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_21","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on LDoS Attack Detection and Defense Mechanism in Software Defined Networks 软件定义网络中LDoS攻击检测与防御机制研究
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_8
Shengxu Xie, Chang-you Xing, Guomin Zhang, Xianglin Wei, Guyu Hu
{"title":"Research on LDoS Attack Detection and Defense Mechanism in Software Defined Networks","authors":"Shengxu Xie, Chang-you Xing, Guomin Zhang, Xianglin Wei, Guyu Hu","doi":"10.1007/978-981-15-9031-3_8","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_8","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130947894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Counting of Railway Tools Based on Deep Learning 基于深度学习的铁路工具自动计数
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_31
Wei Wei, Jin Yang, Sikai Wang, Deng Chen, Yanduo Zhang, Zihang Zhang, Wei Liu, Gonghao Duan, C. Zheng, Jianping Ju, Jianyin Tang
{"title":"Automatic Counting of Railway Tools Based on Deep Learning","authors":"Wei Wei, Jin Yang, Sikai Wang, Deng Chen, Yanduo Zhang, Zihang Zhang, Wei Liu, Gonghao Duan, C. Zheng, Jianping Ju, Jianyin Tang","doi":"10.1007/978-981-15-9031-3_31","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_31","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123484808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-Time Audio and Video Streaming Transmission Scheme for Social Media 一种面向社交媒体的实时音视频流传输方案
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_13
Jianping Yu, Gang Zhao, Xiaohui Kuang, Ruyun Zhang
{"title":"A Real-Time Audio and Video Streaming Transmission Scheme for Social Media","authors":"Jianping Yu, Gang Zhao, Xiaohui Kuang, Ruyun Zhang","doi":"10.1007/978-981-15-9031-3_13","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_13","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125232877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method for Community Partition Based on Information Granularity 基于信息粒度的社区划分方法
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_36
T. Hang, Yang Bai, G. Deng
{"title":"A Method for Community Partition Based on Information Granularity","authors":"T. Hang, Yang Bai, G. Deng","doi":"10.1007/978-981-15-9031-3_36","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_36","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126771049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Graph Operations for Social Network Analysis 社交网络分析中的隐私保护图运算
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2020-09-26 DOI: 10.1007/978-981-15-9031-3_27
Peng Li, Fu-cai Zhou, Zifeng Xu, Yuxi Li, Jian Xu
{"title":"Privacy-Preserving Graph Operations for Social Network Analysis","authors":"Peng Li, Fu-cai Zhou, Zifeng Xu, Yuxi Li, Jian Xu","doi":"10.1007/978-981-15-9031-3_27","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_27","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121820708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信