{"title":"Adaptive Adversarial Attack on Graph Embedding via GAN","authors":"Jinyin Chen, Dunjie Zhang, Xiang Lin","doi":"10.1007/978-981-15-9031-3_7","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_7","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song
{"title":"A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning","authors":"Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song","doi":"10.1007/978-981-15-9031-3_11","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_11","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123596113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pair-Wise Convolution Network with Transformers for Sequential Recommendation","authors":"Jiangpeng Shi, Xiaochun Cheng, Jianfeng Wang","doi":"10.1007/978-981-15-9031-3_38","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_38","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"23 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123182251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Methodology of Fake Cell Test Based on the RRC Redirection or Reselection Priorities from the 5G Network","authors":"Yanan Zhang, Chao Ma, Dong Wang, Tianyu Liu, Zhi Wu","doi":"10.1007/978-981-15-9031-3_19","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_19","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ming Yan, Bo Zhang, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang
{"title":"An Intelligent File Transfer Optimization for Poor Network Conditions","authors":"Ming Yan, Bo Zhang, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang","doi":"10.1007/978-981-15-9031-3_21","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_21","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shengxu Xie, Chang-you Xing, Guomin Zhang, Xianglin Wei, Guyu Hu
{"title":"Research on LDoS Attack Detection and Defense Mechanism in Software Defined Networks","authors":"Shengxu Xie, Chang-you Xing, Guomin Zhang, Xianglin Wei, Guyu Hu","doi":"10.1007/978-981-15-9031-3_8","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_8","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130947894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Wei, Jin Yang, Sikai Wang, Deng Chen, Yanduo Zhang, Zihang Zhang, Wei Liu, Gonghao Duan, C. Zheng, Jianping Ju, Jianyin Tang
{"title":"Automatic Counting of Railway Tools Based on Deep Learning","authors":"Wei Wei, Jin Yang, Sikai Wang, Deng Chen, Yanduo Zhang, Zihang Zhang, Wei Liu, Gonghao Duan, C. Zheng, Jianping Ju, Jianyin Tang","doi":"10.1007/978-981-15-9031-3_31","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_31","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123484808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianping Yu, Gang Zhao, Xiaohui Kuang, Ruyun Zhang
{"title":"A Real-Time Audio and Video Streaming Transmission Scheme for Social Media","authors":"Jianping Yu, Gang Zhao, Xiaohui Kuang, Ruyun Zhang","doi":"10.1007/978-981-15-9031-3_13","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_13","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125232877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Community Partition Based on Information Granularity","authors":"T. Hang, Yang Bai, G. Deng","doi":"10.1007/978-981-15-9031-3_36","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_36","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126771049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Graph Operations for Social Network Analysis","authors":"Peng Li, Fu-cai Zhou, Zifeng Xu, Yuxi Li, Jian Xu","doi":"10.1007/978-981-15-9031-3_27","DOIUrl":"https://doi.org/10.1007/978-981-15-9031-3_27","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121820708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}