default search action
CIS 2010: Nanning, Guangxi Zhuang Autonomous Region, China
- Muren Liu, Yuping Wang, Ping Guo:
2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-9114-8
Fuzzy and Intelligent Systems
- Wenbin Pan, Yanquan Zhou:
Chinese Sentiment Orientation Analysis. 1-5 - Juguo Wang, Guoqi Li, Yun Pu:
A Scenario-Based Architecture for Reliability Design of Artificial Intelligent Software. 6-9 - Yihui Liu, Katherine Martin, Andrew Sparkes, Ross D. King:
The Analysis of Yeast Cell Morphology Using a Robot Scientist. 10-14 - Yong-lin Liu, Mei-ying Ren:
IMP-Filters of R0-Algebras. 15-17 - Yanmei Chai, Tian Xia, Jianming Zhu, Haifeng Li:
Intelligent Digital Photo Management System Using Ontology and SWRL. 18-22 - Yating Wang, Wuneng Zhou, Jinliang Liu, Da Luo:
New Results on H∞ Filter Design for Continue-Time Systems with Time-Varying Delay. 23-27 - Hong Yao, Wuneng Zhou:
Synchronization Algorithm for Multi-hop in Wireless Sensor Networks. 28-32 - Yuxia Qin, Lanshen Guo, Jian Wang:
Tool Wear Detection Based on Wavelet Packet and BP Neural Network. 33-36 - Li Xiao:
Neural Network Method for Solving Linear Fractional Programming. 37-41
Data Mining
- Viacheslav Wolfengagen:
Semantic Modeling: Computational Models of the Concepts. 42-46 - Wei Yang:
A Fast HITON_PC Algorithm. 47-50 - Zhiqing Meng, Baosheng Shao, Min Jiang:
An Algorithm of Dynamic Associate Rule Based on Sliding Windows. 51-54 - Yu Tu, Yubao Liu, Zhijie Li:
Online Segmentation Algorithm for Time Series Based on BIRCH Clustering Features. 55-59 - Jun-jie Yang, Hai-Lin:
A New Clustering Algorithm Based on Normalized Signal for Sparse Component Analysis. 60-63 - Qi Luo:
Dynamic Fluzzy Clustering Algorithm for Web Documents Mining. 64-67 - Hong-guo Cai, Chang-an Yuan, Jin-Guang Luo, Jin-de Huang:
A Novel GEP-Based Multiple-Layers Association Rule Mining Algorithm. 68-72 - Wei Li, Xuemei Wu, Yayun Sun, Quanju Zhang:
Credit Card Customer Segmentation and Target Marketing Based on Data Mining. 73-76 - Suxian Zhang, Hai-Lin Liu:
A Improved Fuzzy K-Subspace Clustering and Its Application in Multiple Dominant Sparse Component Analysis. 77-80 - Huaipeng Li, Sulin Pang:
The Study of Credit Risk Evaluation Based on DEA Method. 81-85 - Shengen Li, Ling Song, Qiang Lv, Yuejun Li:
An Efficient Semantic Similarity Search on XML Documents. 86-90
Evolutionary Computation
- Juan Zou, Jinhua Zheng:
Research on Feature Extraction Based on Genetic Algorithm in Text Categorization. 91-94 - Xue-fei Yao, Hai-Lin:
The Comparison of Two Kinds of Reproduction in Multiobjective Optimization. 95-99 - Hecheng Li, Yuping Wang:
A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems Using Genetic Algorithms. 100-103 - Jiechang Wen, Xuefei Yao:
A New Kind of Handling Constraint Method for Optimization. 104-108 - Xiaofeng Feng, Xiong Shi, Jun Chen:
An Algorithm of Collision Detection Based on Hybrid Model. 109-112 - Qing-dao-er-ji Ren, Yuping Wang, Xiaojing Si:
An Improved Genetic Algorithm for Job Shop Scheduling Problem. 113-116 - Yajuan Yang, Pingan Wang, Wenxue Niu:
Industrial Clusters Evolution Research Based on the SGA. 117-121 - Jinling Du, Dalian Liu:
Hybrid Genetic Algorithm for the Multi-objective Flexible Scheduling Problem. 122-126 - Da Li, Jin Wu, Jiacai Zhang:
An EOG Artifacts Correction Method Based on Subspace Independent Component Analysis. 127-131 - Zhiqing Meng, Min Jiang, Chuangyin Dang:
Evolutionary Algorithm for Zero-One Constrained Optimization Problems Based on Objective Penalty Function. 132-136 - Fangqing Gu, Hai-Lin Liu:
A Novel Weight Design in Multi-objective Evolutionary Algorithm. 137-141 - Yibo Hu:
A New Evolutionary Algorithm Based on Simplex Crossover and PSO Mutation for Constrained Optimization Problems. 142-146 - Dalian Liu, Chunfeng Xing, Xuehai Shang:
A New Genetic Algorithm and Its Convergence for Constrained Optimization Problems. 147-150 - Guoqiang Chen, Xiaofang Guo:
A Genetic Algorithm Based on Modularity Density for Detecting Community Structure in Complex Networks. 151-154 - Na Li, Qing-dao-er-ji Ren:
The Application of Dominant-Recessive Diploid Codes in MOGA. 155-159 - Xiaoshu Ma, Jing Huo, Qun Wang:
A Multi-objective Genetic Algorithm Approach Based on the Uniform Design Metmod. 160-164 - Yun Shang, Jian Chen, Qun Wang:
Improved Electromagnetism-Like Mechanism Algorithm for Constrained Optimization Problem. 165-169 - Yuelin Gao, Jingke Zhou, Songwei Jia:
A New Multi-objective Differential Evolution Algorithm. 170-173 - Lei Fan, Yuping Wang, Meijuan Wang:
A New Genetic Algorithm with Elliptical Crossover for Constrained Multi-objective Optimization Problems. 174-178 - Huidang Zhang, Yifei Zhang:
The Particle Swarm Optimization with Decaying ICMIC for Shortest Path Computation in Computer Networks. 179-183 - Zhangjun Wu, Zhiwei Ni, Lichuan Gu, Xiao Liu:
A Revised Discrete Particle Swarm Optimization for Cloud Workflow Scheduling. 184-188 - Jiansheng Wu, Enhong Chen:
A Novel Hybrid Particle Swarm Optimization for Feature Selection and Kernel Optimization in Support Vector Regression. 189-194 - Hongwei Lin, Yuping Wang, Cai Dai:
A Swarm Intelligence Algorithm Based on Boundary Mutation. 195-199 - Zhengjia Wu, Wen Wang, Jin Zhou, Fen-fen Ren, Cheng Zhang:
Research on Double Objective Optimization of Master Production Schedule Based on Ant Colony Algorithm. 200-204 - Changyou Liu, Kaifeng Guo:
Airport Taxi Scheduling Optimization Based on Genetic Algorithm. 205-208 - Xiaoying Pan, Hao Chen:
A Multi-agent Social Evolutionary Algorithm for Resource-Constrained Project Scheduling. 209-213
Support Vector Machines and Learning Algorithms
- Xiuyu Wang, Xingwu Jiang, Xiaogang Dong, Qinghuai Liu:
Existence of the Solution for General Complementarity Problems. 214-217 - Xuejun Gao, Zhenyou Wang:
Prediction Discrete Data Used BP Network Based on AGO. 218-222 - Shu-Juan Peng:
Motion Segmentation Using Central Distance Features and Low-Pass Filter. 223-226 - Zhenyou Wang, Xuejun Gao:
Performance Analysis Based on Transform Matrix of MLE in CICA. 227-229 - Tian Tian, Hua Duan, Guoping He:
Privacy-Preserving Classification on Horizontally Partitioned Data. 230-233 - Jinhong Di, Hongyan Hua:
An Improved Side Information Generation Scheme for Wyner-Ziv Video Coding. 234-237
Pattern Recognition
- Wenyao Zhang, Bo Sun, Yi Wang:
A Streamline Placement Method Highlighting Flow Field Topology. 238-242 - Bin Li, Maohua Wang, Li Li:
A Real-Time Pineapple Matching System Based on Speeded-Up Robust Features. 243-247 - Wenbang Sun, Hexin Chen, Haiyan Tang, Di Wu:
Unsupervised Image Change Detection Based on 2-D Fuzzy Entropy. 248-252 - Shunbin Liu, Huicheng Zheng:
Motion Analysis Based on Spatial-Temporal Visual Attention. 253-257 - Xiaofeng Feng, Xiong Shi, Jun Chen:
A New Volume Rendering Algorithm of Data Field. 258-260 - Xiong Shi, Xiaofeng Feng, Jun Chen:
The Research on Multi-viewpoint Navigation Based on Spherical Panoramic Images. 261-264 - Li-Hua Ye, Rong Zhu, Jie Xu:
A Novel Image Classification Method Based on Double Manifold Learning. 265-269 - Huorong Ren, Chunxiao Li, Haizhen Wang:
An Improved DLDA Based Method- Nonparametric DLDA. 270-274 - Cheng Chen, Wei Song, Jiacai Zhang, Zhiping Hu, He Xu:
An Adaptive Feature Extraction Method for Motor-Imagery BCI Systems. 275-279 - Caikou Chen, Jingyu Yangzhou:
Essence of Two-Dimensional Principal Component Analysis. 280-282 - Cuiqun He, Guodong Liu, Zhihua Xie:
Infrared Face Recognition Based on Blood Perfusion and Weighted Block-DCT in Wavelet Domain. 283-287 - Wei Wang, Wen-Sheng Chen:
DST Feature Based Locality Preserving Projections for Face Recognition. 288-292
Access Control and Block/Stream Ciphers
- Qiang Tang, Arjan Jeckmans:
Efficient Client Puzzle Schemes to Mitigate DoS Attacks. 293-297 - Fen Li, Quan Liu, Qingqi Pei, Liaojun Pang:
On Trust Degree-Based Usage Control in DRM System. 298-301 - Weimin Shi, Changgen Peng:
A Protocol of Secure Multi-party Multiplication Based on Bilinear Pairing. 302-305 - Gaozu Wang, Weihuai Li, Wenbin Li:
Research on Validity Evaluation of Mandatory Access Control Policy under LSM Framework. 306-309 - Xiangwu Ding, Junyin Wei:
A Scheme for Confidentiality Protection of OpenID Authentication Mechanism. 310-314 - Fengrong Zhang, Yupu Hu, Hua Ma, Min Xie:
Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree. 315-319 - Junrong Liu, Dawu Gu, Zheng Guo:
Correlation Power Analysis Against Stream Cipher MICKEY v2. 320-324
Cryptosystems and Cryptanalysis
- Xueming Wang, Lichen Weng:
Game-Based Analysis and Improvement of a Fair Contract Signing Protocol. 325-328 - Asaf Shabtai, Yuval Fledel, Yuval Elovici:
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning. 329-333 - Li Yang, Jianfeng Ma, Junwei Zhang:
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms. 334-338 - Ping Wei, Xu An Wang, Xiaoyuan Yang:
Proxy Re-encryption from CLE to CBE. 339-342 - Jie Wang, Yongquan Cai, Jingyang He:
A New Threshold Signature Scheme to Withstand the Conspiracy Attack. 343-346 - Xiufeng Zhao, Dawei Wei, Hao Wang:
Asymmetric Group Key Agreement with Traitor Traceability. 347-351 - Han Jiang, Qiuliang Xu, Chenghui Zhang:
Convertible Perfect Concurrent Signature Protocol. 352-356 - Junbing Li, Wei Ji:
Tripartite Key Agreement Protocols Based on Digital Certification. 357-361 - Gaoli Wang, Shaohui Wang:
Differential Fault Analysis on PRESENT Key Schedule. 362-366 - Gaoli Wang, Shaohui Wang:
Improved Differential Cryptanalysis of Serpent. 367-371 - Hao Wang, Qiuliang Xu, Han Jiang, Xiufeng Zhao:
A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model. 372-376 - Xu An Wang, Ping Wei, Minqing Zhang:
New CCA-Secure Proxy Re-encryption Scheme without Random Oracles. 377-381 - Yali Jiang, Fanyu Kong, Xiuling Ju:
Lattice-Based Proxy Signature. 382-385 - Fei Ren, Zhiguang Qin, Jinfeng Yang:
A New Technique of Anti-tampering Technology Based on AVS Video. 386-389 - He Shang, Mingqiang Wang:
Some New Optimal Pairings. 390-393 - Jing Zhang, Pingan Wang:
Non-Adjacent Form Recursive Algorithm on Elliptic Curves Cryptograph. 394-397
Security Management
- Yang Cui, Li Qian, Wu Jie, Zhang Jianqi:
Target-Acquisition-Performance-Model-Based Quality Metric for Multisensor Image Fusion. 398-400 - Stergios G. Tsiafoulis, Vasilios Zorkadis:
A Neural Network Clustering Based Algorithm for Privacy Preserving Data Mining. 401-405 - Xiaotian Wu, Wei Sun:
Data Hiding in Block Truncation Coding. 406-410 - Tomer Shimshon, Robert Moskovitch, Lior Rokach, Yuval Elovici:
Continuous Verification Using Keystroke Dynamics. 411-415 - Tieming Chen, Xiaoming Pan, Yiguang Xuan, Jixia Ma, Jie Jiang:
A Naive Feature Selection Method and Its Application in Network Intrusion Detection. 416-420 - Lin Dong, Daoshun Wang, Min Ku, Yiqi Dai:
(2, n) Secret Image Sharing Scheme with Ideal Contrast. 421-424 - Hong-bo Li, Yan-ling Hao:
Risk Assessment Model of Ship Integrated Navigation System Based on Fuzzy Artificial Neural Network. 425-428 - Fei Ren, Zhiguang Qin, Xianhong Liu:
A Method to Prevent CW Sharing in DTV CAS. 429-432 - Yuenan Li:
Energy Based Robust Video Hash Algorithm. 433-436 - Liwen Zhang, Ming Shao:
Chaotic Synchronization with Single-Ring Erbium-Doped Fiber Laser Systems. 437-440 - Fen Li, Quan Liu, Liaojun Pang, Qingqi Pei:
Identity Authentication Based on Fuzzy Vault and Digital Certificate. 441-445 - Lei Li, Quan Liu, Xuemei Jiang:
USB Key-Based Dual-Factor Dynamic Authentication Scheme. 446-449 - Jie Wang, Yongquan Cai:
Game Analysis of Non-trusted Threshold Authentication Scheme. 450-453
Network & Wireless Security
- Yingying Liu, Hongmei Liu:
The Bipanconnectivity and Hamiltonian-Connectivity of Enhanced Hypercube. 454-456 - Liping Chen, Guojun Zhang, Weitao Ha:
A Reliable Service Quality Evaluation Model in the Web Services Community. 457-460 - Weitao Ha, Li-Ping Chen:
An Adaptive Evaluation Model of Web Service Based on Artificial Immune Network. 461-464 - Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao:
A Sheme of Mobile Platform Based on Trusted Computing. 465-468 - Xuena Peng, Yingyou Wen, Hong Zhao:
Securing GPRS Tunnel Protocol in 3G Core Network. 469-473 - Wenjuan Zhang, Zhaohui Li, Yonghui Hu, Wei Xia:
Cluster Features of Bluetooth Mobile Phone Virus and Research on Strategies of Control & Prevention. 474-477 - Hongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng:
A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks. 478-482 - Xiaohui Zhao, Liaojun Pang, Jingjuan Bi, Qingqi Pei, Huixian Li:
Secure Communication Model of WSN Based on Secret Sharing. 483-487 - JiangHong Guo, ZhiChu Zhong:
Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor Networks. 488-492 - Yan-Xiao Li, Lian Qin, Qian Liang:
Research on Wireless Sensor Network Security. 493-496 - Bing Chen, Shenggui Zhang:
Computing the Scattering Number of Bicyclic Graphs. 497-500 - Zhanlan Li:
On the Reliability of Unicyclic Networks with Vertex Failure. 501-505 - Ruliang Wang, Huiying Jiang:
Observer-Based Adaptive Neural Network Robust Control of Nonlinear Time-Delay Systems with Unmodeled Dynamics. 506-510 - Ruliang Wang, Chaoyang Chen:
Robust Adaptive Neural Control for a Class of Stochastic Nonlinear Systems. 511-514 - Ruliang Wang, Kunbo Mei:
Analysis of Fuzzy Membership Function Generation with Unsupervised Learning Using Self-Organizing Feature Map. 515-518 - Jianlan Guo, Yuqiang Chen, Xuanzi Hu:
Implementation and Improvement of Simulated Annealing Algorithm in Neural Net. 519-522 - Hui Liu, Hui Li, Zhanxin Ma:
Efficient and Secure Authentication Protocol for VANET. 523-527 - Tieming Chen, Liang Ge, Xiaohao Wang, Jiamei Cai:
TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks. 528-532 - Wei Wang, Nianke Zong, Jie Tang, Sangarapillai Lambotharan:
Soft Information Improvement for PN Sequence Iterative Acquisition. 533-536 - Chuanrong Zhang, Lianqing Zheng, Mingwen Xia, Yuqing Zhang:
Secure Signcryption Scheme Based on a Hybrid Encryption. 537-540
Security Models and Methodologies
- Fang Pu, Linlang Liu, Yu Shen, Qiying Cao:
P2P-Based Semantic Policy Infrastucture for Pervasive Computing. 541-545 - Junjian Chen, Jingning Liu, Dan Feng:
Design and Implementation of Object-Oriented Encryption Storage System Based on Trusted Computing Platform. 546-550 - Mona Hosseinkhani Loorak, Ebrahim Tarameshloo, Mehdi Shajari:
AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme. 551-555 - Meng Yue, Xiaofeng Wu:
The Approach of ACARS Data Encryption and Authentication. 556-560 - Jian Lin, Yi Sun, Weiqiang Wang:
Violence Detection in Movies with Auditory and Visual Cues. 561-565
Other Applications
- Xiaohua Diao, Shiying Kang:
Study on Commercial Bank Branches Performance Evaluation Using Self-Adaptive RBFNN and UDM. 566-569 - Huiyan Liu, Wenzhang He, Rui Liu:
An Improved Fog-Degrading Image Enhancement Algorithm Based on the Fuzzy Contrast. 570-573 - Yujian Li, Dedong Zhang, Zhen Yang:
An Automatic Evaluation Method for Chinese Name Recognition. 574-576 - Weiguang Liu, Hailing Lai:
Probability Based Approach for Target Detection and Pose Estimation in Infrared Images. 577-581 - Shibin Xiao, Zhu Shi, Kun Liu, Xueqiang Lv:
A Kind of Vector Space Representation Model Based on Semantic in the Field of English Standard Information. 582-585 - Dingde Jiang, Xingwei Wang, Zhengzheng Xu, Zhenhua Chen:
An Approach to Maximum Lifetime Multicast Delivery in Wireless Ad-Hoc Networks. 586-590 - Xuecheng Wang, Risheng Yang, Minyan Lu, Haifeng Li:
Discrete Bayesian-Based Scheme of Software Reliability Demonstration Testing with Decreasing Function for the Safety Critical Software. 591-595 - Hongye Song:
Generalized Additive Models of DEA and Generalized Non-Dominated Solution in Multi-objective Programming. 596-600 - Shao-juan Su, Yin-dong Liu, Xiao-Ming Liu:
Ship 3D Collaborate Design Integration System Research. 601-605 - Dong Qu, Ping Chen, Jing Yang:
An Efficient Solver for Differential Equations with Random Inputs. 606-610 - Wang Yu, Xu Feng:
Capability Simulating Model for Complex Communication Network. 611-613 - Ren Liang, Li Bing:
Outward Foreign Direct Investment and Industry Structural Optimization: Analysis and Testing on Data of Republic of Korea. 614-618 - Zhenzhen Zhang, Defu Zhang:
Research on Game Algorithm for Zhang Chess. 619-623 - Jingang Niu, Shenghui Su:
Design Verification of BJUT Library Management System with PVS. 624-628 - Haixing Zhao, Zhuma Gao, Jun Yin:
A Method to Find Chromatically Unique Multipartite Graphs. 629-633 - Xin Li, Enhong Chen:
Graph-Based Answer Passage Ranking for Question Answering. 634-638 - Wei Zhang, Ranran Du, Minhui Pang, Qiuhong Wang:
Automatic Speech Corpus Construction from Broadcasting Speech Databases. 639-643 - Shiyu Wang, Sulin Pang:
A Reputation Calculation Model in E-Shopping Websites. 644-648 - Manqi Wu, Sulin Pang:
Stock Index Futures Margin Level Settings by Hill Estimation and Empirical Analysis. 649-653 - Duanquan Xu, Jiangshan Zhang, Baochuan Pang:
A Digital Watermarking Scheme Used for Authentication of Surveillance Video. 654-658 - Yuqiang Chen, Jianlan Guo, Xuanzi Hu:
The Research of Internet of Things' Supporting Technologies Which Face the Logistics Industry. 659-663 - Wenxue Niu, Zhenghong Wei, Quanju Zhang:
A Non-Linear Model for Evaluating Professional Manager's Incentive Effect. 664-666 - Tianxiang Feng, Dingxiu He, Hongxia Liu:
Computer Realization of Solving Tri-diagonal Equations by Gauss-Seidel Method. 667-670 - Meng Hou, Zeng-li Liu, Haiyan Quan, Yong-de Zhang:
Research of Signal Frequency Domain Resolution Based-EMD. 671-675 - Gao-chang Zhao, Xiao-Lin Yang:
A BCH Code with the Distance 11 for Sensornets. 676-679 - Wu Zeng, Xiubao Jiang, Zhengquan Xu, Long Zhou:
Image Denoising Using Nonseparable Wavelet and SURE-LET. 680-684
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.