default search action
CIS 2017: Hong Kong
- 13th International Conference on Computational Intelligence and Security, CIS 2017, Hong Kong, China, December 15-18, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-4822-3
Regular Papers
Intelligent Algorithms and Models 1
- Si-Yuan Jing, Caiming Liu, Gongliang Li, Gaorong Yan, Yan Zhang:
An Efficient Algorithm for Parallel Computation of Rough Entropy Using CUDA. 1-5 - Junhua Liu, Yuping Wang, Xingyin Wang, Xin Sui, Si Guo, Liwen Liu:
An alpha-Dominance Expandation Based Algorithm for Many-Objective Optimization. 6-10 - Xingsi Xue, Aihong Ren:
Using Memetic Algorithm For Matching Process Models. 11-15 - Zhonghua Li, Liping Jia, Caiming Liu:
An Effective Solution to Nonlinear Bilevel Programming Problems Using Improved Particle Swarm Optimization Algorithm. 16-19 - Yongchao Han, Ming Li, Jie Liu:
Improving Hybrid Gravitational Search Algorithm for Adaptive Adjustment of Parameters. 20-24 - Songbai Liu, Qiuzhen Lin, Jianyong Chen:
A Novel Multi-objective Evolutionary Algorithm Based on a Further Decomposition Strategy. 25-29 - Hejun Xuan, Yuping Wang, Shiwei Guan, Zhanqi Xu:
A New Optimization Model and Algorithm for a Network Scheduling Problem in Inter-Datacenters Elastic Optical Networks. 30-34 - Long Zhao, Jingxuan Wei, Minghan Li:
Research on Video Server Placement and Flux Plan Based on GA. 35-38 - Shanfeng Wang, Maoguo Gong, Can Qin, Junwei Yang:
A Multi-objective Framework for Location Recommendation Based on User Preference. 39-43 - Xin Li, Jingxuan Wei, Yang Liu:
A Memetic Particle Swarm Optimization Algorithm to Solve Multi-objective Optimization Problems. 44-48 - Cai Dai, Xiujuan Lei:
An Improvement Based Evolutionary Algorithm with Adaptive Weight Adjustment for Many-Objective Optimization. 49-53 - Li Zhang, Hong Li:
BPSOBDE: A Binary Version of Hybrid Heuristic Algorithm for Multidimensional Knapsack Problems. 54-58
Intelligent Systems with Applications 1
- Qin Zhao, Zhaoxi Ma, Xinhong Hei, Yiyun Zhu, Juntao Niu:
A 3-D Structural Components Automatic Modeling Method Based on BIM. 59-63 - Guangqing Long, Lifeng Xuan, Jianjun Chen:
Extrapolation of Discrete Multi-projection Methods for Fredholm Integral Equations of the Second Kind. 64-68 - Guangjing Li, Hong Bao, Bo Wang, Tao Wu:
Kernelised Rényi Distance for Localization and Mapping of Autonomous Vehicle. 69-72 - Kaijing Shi, Hong Bao, Nan Ma:
Forward Vehicle Detection Based on Incremental Learning and Fast R-CNN. 73-76 - Xinlei Feng, Xiaoli Yang:
New Protocols on Group Consensus of Continuous-Time Multi-agent Systems. 77-81 - Jiabin Lin, Hai-Lin Liu, Chaoda Peng:
The Effect of Feasible Region on Imbalanced Problem in Constrained Multi-objective Optimization. 82-86 - Jing Meng, Yaokun Wu:
Block DGMRES Algorithm for the Drazin-Inverse Solution of Singular Nonsymmetric Linear System with Multiple Right-Hand Sides. 87-90
Pattern Recognition and Knowledge Discovery 1
- Peng Sun, Ziyan Wu, Haifeng Yang, Xiaoxiao Liu, Kang Chen:
Sensors Validation Based on Bayesian Classifiers. 91-96 - Wenping Ma, Yue Wu, Maoguo Gong, Can Qin, Shanfeng Wang:
Local Probabilistic Matrix Factorization for Personal Recommendation. 97-101 - Miao Ye, Hongbing Qiu, Yong Wang, Fan Zhang:
Cell Image Classification Based on the Support Vector Machine and D-S Evidence Theory. 102-106 - Xiaojie Shi:
Research on Flower Image Classification Using Sum-Product Networks. 107-110 - Xiaoma Xu, Renbin Gong, Yinghao Li, Jinnuo Li, Qun Li, Zhenzhen Xu:
Binary Histogram of Oriented Gradients Based Dynamometer Card Recognition. 111-114 - Qiong Shen, Bin Gui, Jianlin Zhu:
Research on Identifying Emotion Sentence Based on Fuzzy Information Granulation. 115-119 - Xiaoting Zhang, Xiaoli Sun, Xiujun Zhang:
Salient Object Detection Via Nonconvex Structured Matrix Decomposition. 120-124 - Jing Gao, Xing-fu Cai:
Image Matching Method Based on Multi-scale Corner Detection. 125-129 - Weitong Li, Yu Cheng, Yuehui Sun, Shaoqiu Xu:
Multi-focus Image Performance Evaluation Method Based on the Extraction and Combination of Multiple Metrics. 130-134 - Qiang Pan, Ping Guo, Xin Xin, Junshuai Liu:
Extracting Company-Specific Keyphrases from News Media. 135-139 - Wenlong Ke, Yong Wang, Xiaochun Lei, Bizhong Wei:
Spark-Based Feature Selection Algorithm of Network Traffic Classification. 140-144 - Xirong Xu, Soomro Pir Dino, Huifeng Zhang, Huijun Jiang, Cong Liu:
Decycling Number of Crossed Cubes CQn. 145-150
Data Mining and Clustering 1
- Bin Gui, Qiong Shen:
Research on Emotional Word Clustering Based on Affinity Propagation. 151-154 - Xiong Li, Che Wang, Liyue Liu, Xuewen Xia:
A Method for Heterogeneity Analysis of Complex Diseases Based on Clustering Algorithm. 155-158 - Shihu Liu, Liping Jia, Fusheng Yu:
On Gradient Weighting Based Fuzzy Clustering for Graph Data. 159-163 - Xinxin Huang, Shu Gong:
Analysis of Big-Data Based Data Mining Engine. 164-168 - Wuning Tong, Yuping Wang, Junkun Zhong, Wei Yan:
A New Weight Based Density Peaks Clustering Algorithm for Numerical and Categorical Data. 169-172 - Ying Li, Xianghong Lin, Xiangwen Wang, Fanqi Shen, Zuzheng Gong:
Credit Risk Assessment Algorithm Using Deep Neural Networks with Clustering and Merging. 173-176 - Huiyi Zhou, Yong Wang, Xiaochun Lei, Yuming Liu:
A Method of Improved CNN Traffic Classification. 177-181 - Jiai He, Panpan Du, Xing Chen:
Parameter Estimation of Communication Signal in Alpha-stable Distribution Noise Environment. 182-186 - Qiang Xiao, Lingyu Wang, Tingwen Huang:
Passivity of Inertial Neural Networks with Delays on Time Scales. 187-191 - Yingzi Fu, Dexin Ren:
Bayesian Spatial Nonparametric Models for Confounding Manifest Variables with an Application to China Earthquake Data. 192-196
Global Optimization Methods 1
- Qunjian Chen, Xiaoliang Ma, Zexuan Zhu, Yiwen Sun:
Evolutionary Multi-tasking Single-Objective Optimization Based on Cooperative Co-evolutionary Memetic Algorithm. 197-201 - Qiang Wang, Tiejun Chen, Hai-Lin Liu:
Resource Allocation for D2D Underlay Communication Systems Using PSO. 202-206 - Meng Han, Sanyang Liu:
An Improved Binary Chicken Swarm Optimization Algorithm for Solving 0-1 Knapsack Problem. 207-210 - Jiangshan Liu, Yumei Zhang, Shulin Bai:
An Adaptive Artifical Bee Colony Algorithms Based on Global Best Guide. 211-215 - Rui Sun:
An Algorithm for Global Optimization Based on CFO-BFGS. 216-218 - Baoming Qiao, Le Gao, Fei Wei:
A New Filled Function Method for the Non-convex Global Optimization. 219-223 - Jiehao Guo, Xingbao Gao, Mengnan Tian:
A Gravitation-Based Chaos Water Cycle Algorithm for Numerical Optimization. 224-228 - Fei Wei, Shugang Li, Jinfeng Xue:
A New Local Searching Strategy for Global Optimization with a Large Number of Local Optimum. 229-232 - Liping Jia, Zhonghua Li:
A Teaching-Learning-Based Optimization with Uniform Design for Solving Constrained Optimization Problems. 233-237
Cryptography and Cryptanalysis 1
- Sihang Pu, Zheng Guo, Junrong Liu, Dawu Gu, Yingxuan Yang, Xiaoke Tang, Jie Gan:
Boolean Matrix Masking for SM4 Block Cipher Algorithm. 238-242 - Lihua Dong, Hui Yang, Yong Zeng:
Analysis and Improvement of True Random Number Generator Based on Autonomous Boolean Network. 243-247 - Kaiyu Zhang, Sen Xu, Dawu Gu, Haihua Gu, Junrong Liu, Zheng Guo, Ruitong Liu, Liang Liu, Xiaobo Hu:
Practical Partial-Nonce-Exposure Attack on ECC Algorithm. 248-252 - Jian Zhao, Hai-Ying Gao:
LSSS Matrix-Based Attribute-Based Encryption on Lattices. 253-257
Information Security and Integrity 1
- Safia Bourahla, Yacine Challal:
Social Networks Privacy Preserving Data Publishing. 258-262 - Chunyan Zhang, Yan Ma, Huili Hu, Miaomiao Ren:
A Kind of Knowledge Metadata Management Model Research Based on Semantic Grid. 263-267 - Jiong Wang, Boquan Li, Yuwei Zeng:
XGBoost-Based Android Malware Detection. 268-272 - Liping Chen, Weitao Ha:
Conformance Checking and QoS Selection Based on CPN for Web Service Composition. 273-276
Network Security 1
- Duo Wu, Yong Wang, Hao Feng, Yiming Huan:
Optimization Design and Realization of Ceph Storage System Based on Software Defined Network. 277-281 - Chaoqun Yang, Xiangyu Li, Yongchang Liu, Shujuan Yin:
Risk-Aware Leakage Resiliency for Wireless Sensor Network Nodes. 282-286 - Ding Li, Yuefei Zhu, Wei Lin:
Traffic Identification of Mobile Apps Based on Variational Autoencoder Network. 287-291 - Lingjie Zhou, Yong Zeng, Yi He, Zhongyuan Jiang, Jianfeng Ma:
Multi-hop Based Centrality of a Path in Complex Network. 292-296 - Longfei Wang, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma:
A Survey of Network Reconstruction on Social Network. 297-301
Security Methodologies and Management 1
- Chunmei Zhang, Yang Li, Zibin Chen:
DPETs: A Differentially Private ExtraTrees. 302-306 - Imen Khabou, Mohsen Rouached, Alexandre Viejo, David Sánchez:
Using Searchable Encryption for Privacy-Aware Orchestrated Web Service Composition. 307-311 - Yinrong Qiao, Yuxing Zhang, Xiao Du:
A Vision-Based GPS-Spoofing Detection Method for Small UAVs. 312-316 - Yi Liu, Ruilin Li, Xingtong Liu, Jian Wang, Chaojing Tang, Hongyan Kang:
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm. 317-321
System Analysis and Modeling
- Jing Chen, Yanan Yu:
Curiosity-Driven Intrinsic Motivation Cognitive Model in Perception-Action Loop. 322-326 - Bo Zhao, Chao Ji, Lidan Li, Qianya Guo, Qian Liu, Jing Zhou:
Scaled Context Region for Correlation Filter Tracking. 327-330 - Lu Jia, Haolan Zhang:
Improving Managerial Efficiency Through Analyzing and Mining Resigned Staff Data. 331-335 - Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong:
Implementing a ARM-Based Secure Boot Scheme for the Isolated Execution Environment. 336-340 - Dan Wu, Yuxiang Yang:
Cost-Sharing Contract of Supply Chain Based on Carbon Emission Control. 341-345 - Zhihua Song, Han Zhang, Ying Wang, Linghui Zhang:
Unmanned Aerial Vehicles Rapid Delivery Routing of the Emergency Rescue in the Complex Mountain Region. 346-349 - Haiyan Zhang, Yajuan Yang:
Optimal Control Model of Pension Funds Under Continuous Time. 350-354 - Ya-Juan Yang, Hong Zhang:
Model Analysis for Estimating Optimal Hedging Ratio of Stock Index Futures. 355-358 - Xiaoli Wang, Haiming Ma, Junfan Lai:
Periodic Multi-installment Load Partition, Distribution and Result Collection. 359-362
Short Papers
Intelligent Algorithms and Models 2
- Yuanjian Zhou, Xiaohui Yang:
A Widely Linear Affine LMS Adaptive Algorithm with Momentum Acceleration for DS-CDMA MAI Suppression. 363-366 - Wentao Huang, Guoqiang Deng, Aimin Tang, Lijie Hao, Guirong Jiang:
Dynamics of a Saturation Incidence SIRS Epidemic Model with Pulses at Different Moments. 367-370 - Wenwen Ye, Jiechang Wen:
Adaptive Fireworks Algorithm Based on Simulated Annealing. 371-375 - Qin Zhao, Qing Tian, Xinhong Hei, Yuchao Li, Zhaoxi Ma:
Toward Automatic Review of Bridge Template Turnover Based on Building Information Modeling. 376-380 - Jing Li, Jie Liu, Meili Wang, Fei Wei:
A New Algorithm for Computing All Solutions of an Absolute Value Equation. 381-384 - Zhongwei Si:
The Asymptotic Growth Behavior of Entire Solutions to Higher Dimensional Polynomial Cauchy-Riemann Equations. 385-389 - Xiangmin Han, Hong Bao, Zuxing Xuan, Feng Pan:
A Predictive Control Algorithm Based on Driving Behavior Data Model. 390-394 - Qingxia Kong, Yaoyao Fu, Zhendong Liu:
Possible Transitions Between Types of Pseudoknots of RNA Structure. 395-399 - Shaoxiong Ma, Qin Zhao, Xinhong Hei, Cunli Chen:
The Method of Integrated Pipeline Intelligent Conversion of BIM Design Model into Fine BIM Construction Model. 400-404 - Jun Yang, Hong Bao, Nan Ma, Zuxing Xuan:
An Algorithm of Curved Path Tracking with Prediction Model for Autonomous Vehicle. 405-408
Intelligent Systems with Applications 2
- Yao Zhang, Min Li:
Motion Segmentation Using Collaborative Low-Rank and Sparse Subspace Clustering. 409-414 - Liang Qiao, Hong Bao, Zuxing Xuan, Qing Yang:
Regression Model of Autonomous Lateral Rectification with Driver Perception. 415-418 - Hui Li, Qin He, Hong Bao, Nan Ma, Guilin Pang:
Segmental Offset-Mapping Parallel Coordinates for Multidimensional Integer Dataset. 419-422 - Xiaohao Liang, Zuqing Huang:
Research on the Pricing Strategy of Manufacturer's Dual Channel under the Closed-Loop Supply Chain. 423-426 - Hui Zhang, Yu Du, Shurong Ning, Yonghua Zhang, Shuo Yang, Chen Du:
Pedestrian Detection Method Based on Faster R-CNN. 427-430 - Lei Li, Lindi Xiao, Meng Zhang, Jingyi Kong, Hui Sun:
Agent-Based Simulation of Evacuation Considering Extreme Weather in Tourist Areas. 431-434 - Guoqiang Deng, Aimin Tang, Miaomiao Xing, Lin Ling, Guirong Jiang, Wentao Huang:
Dynamics of a Stochastic SIS Epidemic Model with Birth Pulses and Pulse Treatments. 435-438 - Gaochang Zhao, Kewei Jie, Jie Liu:
A New Difference Scheme for Hyperbolic Partial Differential Equations. 439-441
Pattern Recognition and Knowledge Discovery 2
- Lejun Zhang, Weijie Zhao, Chunhui Zhao:
Research on Information Propagation Method Based on Individual User Characteristics. 442-446 - Yumin Tian, Lin Deng, Qiang Li:
A KNN Match Based Tracking-Learning-Detection Method with Adjustment of Surveyed Areas. 447-451 - Yiming Wang, Yuan Rao, Lianwei Wu:
A Review of Sentiment Semantic Analysis Technology and Progress. 452-455 - Zhanli Li, Pengrui Yuan, Fang Yang, Hong-an Li:
View-Normalized Gait Recognition Based on Gait Frame Difference Entropy Image. 456-459 - Bin Zhou, Xuemei Duan, Jun Feng:
A Weighted Error Compensation Algorithm for Image Denoising Based on Noise Variance Estimation. 460-464 - Xia Li, Qifan Wen, Kongxin Pan:
Unsupervised Off-Topic Essay Detection Based on Target and Reference Prompts. 465-468 - Zhendong Liu, Qingxia Kong, Yaoyao Fu, Hongchao Ye, Shimin Zhao, Xinhong Su, Kai Jiang, Hui Wang, Kunle Dong, Zhenxiong Song, Yujie Wang:
The Algorithm and Scheme of Prediction in RNA Folding Structure with Pseudoknots. 469-474
Data Mining and Clustering 2
- Chenguang He, Wei Li, David Chik:
Waveform Compensation of ECG Data Using Segment Fitting Functions for Individual Identification. 475-479 - Yier Lin, Julien Le Kernec:
Performance Analysis of Classification Algorithms for Activity Recognition Using Micro-Doppler Feature. 480-483 - Hang Yu, Zhen Wang, Qian Yin, Ping Guo:
A Comprehensive Study of Blind and Non-blind Deconvolution Methods Applied to Spectrum Extraction. 484-487 - Yun Jiang, Xi Liu, Guolei Yan, Jize Xiao:
Modified Binary Cuckoo Search for Feature Selection: A Hybrid Filter-Wrapper Approach. 488-491 - Ruliang Wang, Yang Xuan:
A Research on the Improvement of Dual Optimization on BP Neural Network. 492-495 - Junfeng Chen, Zhoudong Hua, Jingyu Wang, Shi Cheng:
A Convolutional Neural Network with Dynamic Correlation Pooling. 496-499 - Dong Ding, Junhuai Li, Huaijun Wang, Zhu Liang:
Student Behavior Clustering Method Based on Campus Big Data. 500-503
Global Optimization Methods 2
- Yanzhi Ren, Sanyang Liu:
Modified Particle Swarm Optimization Algorithm for Engineering Structural Optimization Problem. 504-507 - Aihong Ren, Xingsi Xue:
Solution Strategy for Bilevel Linear Programming in Fuzzy Random Circumstances. 508-511 - Xiaolin Yang, Bin Zhou, Jun Feng:
A New Filled Function Method with Unconstrained Global Optimization. 512-515 - Juan Li, Ning Dong:
Gravitational Search Algorithm with a New Technique. 516-519 - Baoming Qiao, Liping Yang, Jie Liu, Yanru Yao:
A Mixed Conjugate Gradient Method for Unconstrained Optimization Problem. 520-523
Cryptography and Cryptanalysis 2
- Sen Xu, Haihua Gu, Lingyun Wang, Zheng Guo, Junrong Liu, Xiangjun Lu, Dawu Gu:
Efficient and Constant Time Modular Inversions Over Prime Fields. 524-528 - Mengmeng Xu, Liji Wu, Xiangmin Zhang:
Side Channel Attack on SM4 Algorithm with Ensemble Method. 529-532 - Gaofeng Yang, Yihong Long:
Ciphertext Number Full Operations Based on Paillier Algorithm. 533-536
Information Security and Integrity 2
- Lap Q. Trieu, Trung-Nguyen Tran, Mai-Khiem Tran, Minh-Triet Tran:
Document Sensitivity Classification for Data Leakage Prevention with Twitter-Based Document Embedding and Query Expansion. 537-542 - Jiaxi Ye, Bin Zhang, Ziqing Ye, Chao Feng, Chaojing Tang:
Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases Prioritizing. 543-547 - Bin Zhang, Jiaxi Ye, Chao Feng, Chaojing Tang:
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing. 548-552 - Cong Peng, Qingjin Deng, Zhi-an Huang, Yiwen Sun, Zexuan Zhu:
G-FQZip: Lossless Reference-Based Compression of FASTQ Files Using GPUs. 553-556 - Wantong Zheng, Chunfu Jia:
CombinedPWD: A New Password Authentication Mechanism Using Separators Between Keystrokes. 557-560 - Ying Liu, Yihong Long, Xu Zhou, Fengli Li:
Secure System Logon Based on IBC and Mobile Terminal. 561-565
Network Security 2
- Wenlin Meng, Wenfeng Zhu, Chi Zhang, Junrong Liu, Zheng Guo, Dawu Gu, Wei Fan, Haifeng Zhang, Yidong Yuan:
An Implementation of Trojan Side-Channel with a Masking Scheme. 566-569 - Weitao Ha:
Reliability Prediction for Web Service Composition. 570-573 - Mengli Liu, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma:
Centrality Based Privacy Preserving for Weighted Social Networks. 574-577 - Bo Huo, Yihong Long, Jinglin Wu:
A Secure Web Email System Based on IBC. 578-581
Security Methodologies and Management 2
- Yindong Chen, Liping Li, Ziran Chen:
An Approach to Verifying Data Integrity for Cloud Storage. 582-585 - Juhani Anttila, Kari Jussila:
Challenges for the Comprehensive and Integrated Information Security Management. 586-589 - Wan Lei, Lihui Wang, Weijun Shan, Kun Jiang, Qing Li:
A Frequency-Based Leakage Assessment Methodology for Side-Channel Evaluations. 590-593
System Analysis and Modeling
- Ha V. Hoang, Minh-Triet Tran:
DeepSense-Inception: Gait Identification from Inertial Sensors with Inception-like Architecture and Recurrent Network. 594-598 - Muhammad Waqar, Hassan Dawood, Ping Guo, Muhammad Bilal Shahnawaz, Mustansar Ali Ghazanfar:
Prediction of Stock Market by Principal Component Analysis. 599-602 - Na Wang, Wenyao Zhang, Wen Zhao:
Evaluation of Fiber Tracking Results from UKF Tractography Methods. 603-606 - Yu Li, Rui Ma, Honghao Zhao, Shi Qiu, Ziyang Hu:
Predicting the Change on Stock Market Index Using Emotions of Market Participants with Regularization Methods. 607-610 - Dongyi He, Xing Wang:
Construction of 'One-Two-Six-Two' Practical Teaching System of Human Resource Management Specialty. 611-614 - Jie Liu, Fei Liang:
Optimal Allocation of Water Resources Based on Central Force Optimization. 615-618 - Hai Sun:
Research on Field Patterns in Circular-Shaped Microshield Lines. 619-621
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.