default search action
15th CIS 2019: Macao, SAR, China
- 15th International Conference on Computational Intelligence and Security, CIS 2019, Macao, SAR, China, December 13-16, 2019. IEEE 2019, ISBN 978-1-7281-6092-4
Regular Papers
Intelligent Algorithms
- Xingsi Xue, Junfeng Chen, Aihong Ren:
Interactive Ontology Matching Based on Evolutionary Algorithm. 1-5 - Zhanjiang Zhi, Shuaijie Li:
An Image Segmentation Method Based on a Constrained Convex Variant of the Mumford-Shah Model. 6-10 - Yujun Xie, Yao Lu, Shuang Gu:
RGB-D Object Tracking with Occlusion Detection. 11-15 - Xinyu Li, Xiaochun Lei, Rongfeng Chen, Yizhou Feng, Tianmin Xiong, Junyan Chen:
Application of the Faster R-CNN Algorithm in Scene Recognition Function Design. 16-19 - Ying An, Xunli Fan, Li Chen, Pei Liu:
Infrared and Visible Image Fusion Based on Adaptive Dual-Channel PCNN and Saliency Detection. 20-25 - Jiaxin Hou, Weidong Zhou, Wen-An Zhang, Cong Zhang, Chen Chen, Chenghao Shan:
High-Order Unscented Transformation Based on the Bayesian Learning for Nonlinear Systems with Non-Gaussian Noises. 26-30
Intelligent Computation
- Wei Li, Xiang Meng, Ying Huang:
Differential Learning Particle Swarm Optimization with Full Dimensional Information. 31-35 - Minyi Zheng, Fangqing Gu, Xuesong Chen, Hao-Tian Wu:
A Variable Relationship Excavating Based Optimization Algorithm for Solving 0-1 Knapsack Problems. 36-39 - Wei Guo, Yong Wang, Miao Ye:
A New Construction Method of Regeneration Tree for Single Node Fault Repair Mechanism in Distributed Storage System. 40-44 - Zhihe Wang, Teng Zhang, Hui Du:
A Collaborative Filtering Recommendation Algorithm Based on Density Peak Clustering. 45-49 - Jiaming Song, Xiaobo Song, Xiaoli Wang:
A New Scheduling Model for Tire Production and Transportation Among Distributed Factories. 50-53 - Samson Hansen Sackey, Junfeng Chen, Joseph Henry Anajemba, Xuewu Zhang:
A Clustering Approach Based on Genetic Algorithm for Wireless Sensor Network Localization. 54-58 - Jiongcheng Li, Hai-Lin Liu:
A Contracting BFGS Update in Quasi-Newton Methods for Unconstrained Optimization. 59-62
Machine Learning and Neural Networks
- Weiguo Pan, Yinghao Chen, Bo Liu:
Traffic Light Detection for Self-Driving Vehicles Based on Deep Learning. 63-67 - Xiaoyu Dong, Xin Xin, Ping Guo:
Chinese NER by Span-Level Self-Attention. 68-72 - Bingxin Xu, Xiuling Zhou:
Deep Sparse Representation Classification with Stacked Autoencoder. 73-77 - Haidong Li, Jiongcheng Li, Xiaoming Guan, Binghao Liang, Yuting Lai, Xinglong Luo:
Research on Overfitting of Deep Learning. 78-81 - Baofeng Wang, Hai Zhu, Mengmeng Xu, Zumin Wang, Xudong Song:
Analysis and Improvement for Fingerprinting-Based Localization Algorithm Based on Neural Network. 82-86 - Yaofeng Yuan, Jiechang When:
Adaptively Weighted Channel Feature Network of Mixed Convolution Kernel. 87-91 - Zhengyan Wang, Junfeng Chen, Xiaolin Wang:
Convolutional Neural Network for Image Feature Extraction Based on Concurrent Nested Inception Modules. 92-97 - Doudou Wu, Xianghong Lin, Pangao Du:
An Adaptive Structure Learning Algorithm for Multi-Layer Spiking Neural Networks. 98-102 - Mengwei Zhang, Xianghong Lin, Pangao Du:
An Epilepsy and Seizure Classification Approach Based on Multi-Spike Liquid State Machines. 103-107 - Yan Hu, Minghua Nuo, Chao Tang:
A Deep Learning Approach for Chinese Tourism Field Attribute Extraction. 108-112 - Yan Wang, Xin Xin, Ping Guo:
Relation Extraction via Attention-Based CNNs using Token-Level Representations. 113-117
Intelligent Systems and Complex Systems
- Wenyi Zeng, Guangchen Song, Qian Yin, Ping Guo:
Some new Distance Measures of Hesitant Fuzzy Sets and its Application in Group Decision Making. 118-122 - Zhihua Song, Han Zhang, Xiaojie Zhang, Fa Zhang:
Unmanned Aerial Vehicle Coverage Path Planning Algorithm Based on Cellular Automata. 123-126 - Yanni Li, Wencheng Yang, Zhengang Zhong, Yueshen Xu:
NOLGP: A Novel Optimized Large-Scale Graph Partitioning Algorithm. 127-131 - Qingshan Wang, Jun Zhang:
Point Cloud Registration Algorithm Based on Combination of NDT and PLICP. 132-136 - Hui Liu, Kuanna Huang, Liping Jia:
Personalized Learning Resource Recommendation Algorithm of Mobile Learning Terminal. 137-141
Pattern Recognition and Knowledge Discovery
- Huijian Han, Qinghai Wang, Caixian Chen:
Policy Text Analysis Based on Text Mining and Fuzzy Cognitive Map. 142-146 - Tao Li, Yuanbo Guo, Ankang Ju:
A Self-Attention-Based Approach for Named Entity Recognition in Cybersecurity. 147-150 - Zhixian Ma, Jie Zhu, Yongkai Zhu, Haiguang Xu:
Radio Galaxy Morphology Simulation via Residual Conditional Variational Autoencoder. 151-155 - Zhihe Wang, Suping Shi, Hui Du, Shuyan Wang:
Collaborative Filtering Algorithm Based on Improved Similarity Calculation. 156-160
Data Mining and Clustering
- Si-Yuan Jing, Jun Yang:
A Novel Set-Based Discrete Differential Evolution Algorithm for Mining Process Model from Event Log. 161-165 - Yong Li, Baodong Liu, Changqing Wang:
Study of the Evolution of Online User Interest Behavior. 166-171 - Guang-Wei Cai, Zhi Fang, Yue-Feng Chen:
Estimating the Number of Hidden Nodes of the Single-Hidden-Layer Feedforward Neural Networks. 172-176 - Cheng Lin, Qinpei Zhao, Jiangfeng Li, Weixiong Rao:
Size Prediction for Online Clothing Shopping with Heterogeneous Information. 177-181 - Yuanchao Yang, Yuping Wang, Yuan Wei:
Adaptive Density Peak Clustering for Determinging Cluster Center. 182-186 - Jie Zhang, Junhong Feng, Xiani Yang:
Gene Selection for scRNA-Seq Data Based on Information Gain and Fruit Fly Optimization Algorithm. 187-191 - Zhonghua Li, Liping Jia, Bingjun Su:
Improved K-Means Algorithm for Finding Public Opinion of Mount Emei Tourism. 192-196
Optimization Theory and Methods
- Xiang Yi, Shixiao Liu:
Mobility of Discrete Breather in a FPU-KG Chain. 197-200 - Shuang Liang, Hao Li, Maoguo Gong, Yue Wu, Yun Zhu:
Distributed Multi-Objective Community Detection in Large-Scale and Complex Networks. 201-205 - Shuifeng Feng, Jiechang Wen:
An Evolutionary Many-Objective Optimization Algorithm Based on IGD Indicator and Region Decomposition. 206-210 - Yonghong Long, Xiuqin Deng, Guoxiang Zhong, Juan Fan, Fuchun Liu:
Gaussian Kernel Dynamic Similarity Matrix Based Sparse Subspace Clustering for Hyperspectral Images. 211-215 - Junhao Wang, Cong Jin, Wei Zhao, Shan Liu, Xin Lv:
An Unsupervised Methodology for Musical Style Translation. 216-220 - Xiaohe Wang, Yuping Wang, Chunyang Wang, Dandan Tang:
An Improved Subspace Clustering Algorithm Based on Sparse Representation. 221-224 - Feng Pan, Hong Bao:
Reinforcement Learning Model with a Reward Function Based on Human Driving Characteristics. 225-229 - Shu-quan Hong, Quan-ju Zhang:
Analysis of Development Status and Efficiency of Logistics Industry in the Pearl River Based on Delta in the Context of China-US Trade War by the DEA-ANN Model. 230-235
Cryptography and Cryptanalysis
- Hang-chao Ding, Han Jiang, Jie Cai, Chen-guang Wang, Jing Zou, Qiuliang Xu:
Research on Key Exchange Protocol Based on LWE. 236-240 - Xirong Xu, Zhiyang Wang, Yu Hong, Tianfan Xia, Jun Cheng, Jingqing Jiang:
Classification of Spectrum Images of Solar Radio Bursts Based on Deep Learning. 241-246 - Jiali Xu, Qian Yin, Ping Guo, Xin Zheng:
Effective Pulsar Dispersion Measure Estimation Based on Progressive Probabilistic Hough Transform. 247-251
Information Security and Integrity
- Yihong Long, Minyang Cheng:
Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption. 252-256 - Yaohua Liang, Yanmei Fang, Shangjun Luo, Bing Chen:
Image Resampling Detection Based on Convolutional Neural Network. 257-261 - Ming Fang, Yong Wang, Miao Ye:
A Multi-Controller Deployment Method of SDN Network Based on FPGA. 262-266
Network Security
- Wenqi Fang, Huiyun Li, Shaobo Dang, Hui Huang, Lei Peng, Li-Ta Hsu, Weisong Wen:
Combining Deep Gaussian Process and Rule-Based Method for Decision-Making in Self-Driving Simulation with Small Data. 267-271 - Ya-Ming Yang, Hui Du, Xiao-Bin Guo:
Approximate Fuzzy Solution of Positive Fully Fuzzy Matrix Equation. 272-276
Security Methodologies and Management
- Chan Huang, Yanmei Luo, Qingyuan Li:
Text Classification Method Based on Co-Occurrence Events. 277-281 - Zhanjun Zhou, Jianyang Zheng, Fengnian Meng:
Physical Health Test Analysis Based on Adaptive Proportional Fusion Ensemble Classifier for College Students. 282-286 - Nan Ma, Li Chen, Jiancheng Hu, Qiuna Shang, Jiahong Li, Guoping Zhang:
Pedestrian Detection Based on HOG Features and SVM Realizes Vehicle-Human-Environment Interaction. 287-291 - Hai-Dong Li, Chiang-Lung Lin:
Research on the Ability Evaluation of "Double-Qualified and Double-Ability" Teacher in M University Based on Fuzzy-AHP. 292-295 - Helong Li, Haibo Yu, Jinshuai Yuan:
Intelligent Energy Meter Fault Prediction Based on Machine Learning. 296-300 - Mengna Chai, Yuansheng Liu:
A Hybrid Loop Closure Detection Method Based on Lidar SLAM. 301-305 - Weijun Shan, Jun Yu, Limin Guo, Kun Jiang, Lihui Wang, Qing Li:
A Horizontal Attack on SM9 Signature Generation. 306-309
System Analysis and Modeling
- Mengmeng Xu, Hai Zhu, Juanjuan Wang, Hengzhou Xu:
Dynamic and Disjoint Routing Mechanism for Protecting Source Location Privacy in WSNs. 310-314 - Weijing Zhou, Hechun Zhu, Shiying Yao, Tong Li:
A Homomorphic Encryption-Based Privacy Preserving Data Aggregation Scheme for Smart Grid. 315-319 - Shougang Zhang, Yingchun Zheng, Yunfeng Yang:
The Pricing of European Exchange Option with Continuous Dividends. 320-323 - Yunfeng Yang, Rui Qiao, Yingchun Zheng:
Portfolio Selection with Stochastic Volatility and Continuous Dividends. 324-327 - Chuan-Chuan Ko, Ya-Juan Yang, Chien-Yu Liu:
Multinational Enterprise Investment Strategy Evaluation - Option to Growth or Option to Abandon of Binomial Options Application. 328-331
Short Papers
Intelligent Algorithms
- Wenjuan Jiang, Dong Xu, Fuyun Li:
Brain CT Image Segmentation Based on Improved Watershed Algorithm. 332-335 - Zhendong Liu, Fanghan Liu, Yurong Yang, Jiwei Wang, Hailin Zhang:
The Predicting Algorithm of Barrier Tree in RNA Folding Structure. 336-340 - Yizhou Feng, Junyan Chen, Tianmin Xiong, Rongfeng Chen, Xinyu Li, Yongqing Tang, Xiaochun Lei:
Application of the SSD Algorithm in a People Flow Monitoring System. 341-344 - Yan Zhang, Hong Bao:
Point Clouds-Image Fusion by Convolutional Method for Data Integrity using Neural Network. 345-348
Intelligent Computation
- Haosen Liu, Fangqing Gu, Hai-Lin Liu, Lei Chen:
A Co-Evolution Algorithm for Solving Many-Objective Problems with Independent Objective Sets. 349-352 - Ruliang Wang, Haozhi Luo:
Mean-Square Exponential Stability Analysis for Uncertain Stochastic Neutral Systems with Nonlinear Perturbations and Distributed Delays. 353-357
Machine Learning and Neural Networks
- Kangshun Li, Ziming Wang, Jiahao Liu, Hongming Fang, Yishu Lei:
K-Prototype Clustering for the Person of Temporary Probation and Parole and Criminal Release Based on Rough Set. 358-361 - Wei Ding, Heng Liu, Ying Huang:
Noise Suppression Algorithm for High Precision Seismic Data Acquirement System. 362-365 - Jingrong Mo, Yong Wang, Miao Ye:
Network Traffic Outlier Detection Based on Full Convolutional Network. 366-370 - Xin-Kai Xu, Yan Ma, Hong Bao, Ying Zheng:
Application of Improved MobileNet Network to Road Micro-Target Detection. 371-374 - Yanyuan Su, Jian Zhang, Jianhao Lu:
The Resume Corpus: A Large Dataset for Research in Information Extraction Systems. 375-378
Intelligent Systems and Complex Systems
- Qinghua Meng, Haiyou Mo, Dongxin Fan, Hongbin Tang:
Hardware Architecture Design of Intelligent Fighting Robot. 379-382 - Qianqian Chen, Xiaojie Su, Jianxing Liu, Chao Shen:
Event-Triggered Output Feedback Control of Takagi-Sugeno Fuzzy Systems. 383-386 - Changsheng Zhu, Dongmin Huang, Sijin Zhou, Yifei Chen, Jiali Lin, Dazhi Jiang:
A Robust Unsupervised Method for the Single Channel Speech Separation. 387-390
Pattern Recognition and Knowledge Discovery
- Yuxiang Yang, Qian Guan:
An Evolutionary Game Model Among the Interest-Related Parties for Return of E-Wastes. 391-394 - Shu-qing Jiao:
Image Denoising Based on Wave Atoms. 395-398
Data Mining and Clustering
- Haiyan Fu, Yu Li, Xuechao Sun:
Design and Implementation of Rapid Information Acquisition and Analysis System. 399-401
Optimization Theory and Methods
- Jiawen Zhang, Wen-Sheng Chen, Binbin Pan:
Non-Negative Feature Extraction using Conjugate Gradient Method. 402-405 - Hong Li, Li Zhang, Hecheng Li:
Modified NSGA-II Based Interactive Algorithm for Linear Multiobjective Bilevel Programs. 406-410
Cryptography and Cryptanalysis
- Fuyun Li, Jianping Feng, Mousong Fu:
A Natural Human-Computer Interaction Method in Virtual Roaming. 411-414 - Dong Han, Peijiang Liu, Huijian Han, Zheng Liu, Rui Zhang:
Research on Cigarette Retail and Supervision Model Based on Two-Dimensional Code. 415-418
Information Security and Integrity
- Yaling Zhang, Pei Luo, Lingyu Qu:
An Improved Differential Privacy Algorithm Using Frequent Pattern Mining. 419-423 - Wan-lung Lee, Wei Sun:
Reversible Steganography Scheme Based on Position-Recording in DCT Coefficients. 424-428 - Shenghui Su, Xuewei Niu, Shuwang Lü:
Design of a Program Identification System for Preventing Malicious Codes. 429-433
Network Security
- Qiang Wang, Yanhu Huang, Tingting Lan:
Optimized Power Allocation for Spectrum Sharing Multi-Cell Cellular Netwokrs. 434-437
System Analysis and Modeling
- Dehua He, Ruliang Wang:
State Assessment of Oil-Paper Insulation Based on Fuzzy Rough Sets. 438-441 - Yingchun Zheng, Shougang Zhang, Yunfeng Yang:
Dynamic Asset Allocation with Jump-Diffusion Processes. 442-446 - Ya-Juan Yang, Quan-ju Zhang:
Analysis on the Route of an Enterprise's Innovation and Development Based on Multi-Agent Model. 447-451
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.