default search action
CIS 2008: Suzhou, China
- 2008 International Conference on Computational Intelligence and Security, CIS 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers. IEEE Computer Society 2008, ISBN 978-0-7695-3508-1
Machine Learning and Algorithms
- Chun Yang, Xiangrong Zhang, Licheng Jiao, Gaimei Wang:
Self-Tuning Semi-Supervised Spectral Clustering. 1-5 - Yu Hu, Tingzhi Shen, Kin-Man Lam, Sanyuan Zhao:
A Novel Example-Based Super-Resolution Approach Based on Patch Classification and the KPCA Prior Model. 6-11 - Yunhui He:
Modified Generalized Discriminant Analysis Using Orthogonalization in Feature Space and Difference Space. 12-15 - Wenli Xie, Zhezhao Zeng:
A Novel Algorithm for Solving Nonlinear Equations. 16-19 - Guimei Li, Zhezhao Zeng:
A Neural-Network Algorithm for Solving Nonlinear Equation Systems. 20-23 - Tao Li, Wenjiang Pei, Shao-ping Wang, Yiu-ming Cheung:
Cooperation Controlled Competitive Learning Approach for Data Clustering. 24-29 - Chuangxin Wang, Zhezhao Zeng:
A Neural-Network Algorithm for the Simultaneous Inclusion of Polynomial Zeros. 30-34
Nature-Inspired Computing
- Khin Haymar Saw Hla, YoungSik Choi, Jong Sou Park:
Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization Algorithm. 35-40 - Mudasser Naseer, Shi-Yin Qin:
Performance Comparison of Nonlinear Dimensionality Reduction Methods for Image Data Using Different Distance Measures. 41-46 - Zhengjia Wu, Liping Zhang, Ying Wang, Kui Wang:
Optimization for Multi-Resource Allocation and Leveling Based on a Self-Adaptive Ant Colony Algorithm. 47-51 - Wenjie Liu, Hanwu Chen, Tinghuai Ma, Wei Tian:
An Efficient Deterministic Secure Quantum Communication Scheme with W State. 52-55 - Junwei Wang, Xingwei Wang, Min Huang:
Tabu Artificial Fish Swarm Algorithm Based Intelligent QoS Multicast Routing Algorithm. 56-60 - Yuelin Gao, Xiaohui An, Jun-min Liu:
A Particle Swarm Optimization Algorithm with Logarithm Decreasing Inertia Weight and Chaos Mutation. 61-65
Intelligent and Fuzzy Systems
- Long Guo, Hongli Wang:
Information Management System of Automobile Chassis Dynamometer Based on Multi Agent Web Serve. 66-70 - Rongyong Zhao, Yongqing Su, Torben Knudsen, Thomas Bak, WenZhong Shen:
Multi-Agent Model for Fatigue Control in Large Offshore Wind Farm. 71-75 - Liying Lang, Yue Hong:
Study on the Core Algorithm of Access Control System Based on Face Recognition. 76-79 - Huan Wang, Mingwu Ren, Jingyu Yang:
Object Tracking Based on Genetic Algorithm and Kalman Filter. 80-85 - Yongping Du, Ming He:
Multi-Strategy to Improve Reading Comprehension. 86-89
Data Mining and Knowledge Discovery
- Chuangxin Yang, Hong Peng, Jiabing Wang:
A New Feature Extraction Approach Based on Sentence Element Analysis. 90-95 - Imen Derbel, Narjes Hachani, Habib Ounelli:
Membership Functions Generation Based on Density Function. 96-101 - Min-qi Zheng, Chongcheng Chen, Jiaxiang Lin, Minghui Fan, Tamas Jansco:
An Algorithm for Spatial Outlier Detection Based on Delaunay Triangulation. 102-107 - Jingde Cheng:
Evolutionary Personal Information Partners. 108-113 - Feng Liu, Zhitang Li:
A Measurement and Modeling Study of P2P IPTV Applications. 114-119
Neural Networks and Distributed Systems
- Rosemarie Velik:
Discrete Fourier Transform Computation Using Neural Networks. 120-123 - Hui Wang, Lequan Min, Jinzhu Liu:
Robust Designs for Fingerprint Feature Extraction CNN with Von Neumann Neighborhood. 124-128 - Jianjun Wang, Zhonghua Li:
Local Stability Analysis of CNNs with Delay and Impulses. 129-133 - Lou Haichuan, Dai Wenzhan, Su Jie:
Control of Time Varying Nonlinear System Based on RBFNN-DMC Algorithm. 134-138 - JianHong Ye, ShiXin Sun, Wen Song, Lijie Wen:
The Operations and Properties of Reproducibility of the Empty Marking. 139-144
Evolutionary Computation
- Gengui Zhou, Zhenyu Cao, Zhiqing Meng, Qi Xu:
A GA-Based Approach on a Repair Logistics Network Design with M/M/s Model. 145-149 - Hai-Lin, Xueqiang Li, Yuqing Chen:
Multi-Objective Evolutionary Algorithm Based on Dynamical Crossover and Mutation. 150-155 - Rongbing Hu, Chaoyuan Yue, Jun Xie:
Joint Optimization of Age Replacement and Spare Ordering Policy Based on Genetic Algorithm. 156-161 - Lei Fan, Yuping Wang:
A Novel Multi-Objective Evolutionary Algorithm Based on External Dominated Clustering. 162-167 - Xueqiang Li, Hai-Lin:
One MOEA Uniformity Measurement Based on Generalized Spherical Transformation. 168-173
Pattern Recognition
- Rui Ma, Yingnan Zhao, Yongquan Xia, Yunyang Yan:
A Touching Pattern-Oriented Strategy for Handwritten Digits Segmentation. 174-179 - Siew Wen Chin, Kah Phooi Seng, Li-Minn Ang:
New H infinity Approach for Face Tracking. 180-184 - Xiao-yan Zhang, Xiao-Juan Wu, Xin Zhou, Xiao-Gang Wang, Yuan-Yuan Zhang:
Automatic Detection and Tracking of Maneuverable Birds in Videos. 185-189 - Junding Sun, Zhaosheng Zhang:
An Effective Method for Mammograph Image Retrieval. 190-193 - Xuehui Xie, Wen-Sheng Chen, Bo Chen, Hui Liu:
Kernel Subspace LDA with Self-Constructed Mercer Kernel for Face Recognition. 194-199 - Yahui Wu, Gang Liu, Jun Guo:
A New Method for Discriminative Model Combination in Speech Recognition. 200-203 - Gege Guo, Ping Guo:
Experimental Study of Discriminant Method with Application to Fault-Prone Module Detection. 204-209 - Na Wang, Xia Li, Yingjie Cui:
Semi-Supervised Dimensionality Reduction with Pairwise Constraints Using Graph Embedding for Face Analysis. 210-214 - Kezheng Lin, Huixin Wang, Sheng Lin:
Face Feature Extraction Based on Uncorrelated Locality Information Projection. 215-219 - Jinyong Cheng, Yihui Liu, Li Bai:
3-D Reconstruction from Medical Images with Improved GVF Snake Model. 220-224 - Yuehui Sun:
Illumination Invariant Using DT-CWT and EMD for Face Recognition. 225-230
Support Vector Machines
- Linsheng Li, Jianning Li:
Chattering-Free Support Vector Regression Sliding Mode Control. 231-234 - Yuan Yuan, Bing Chen, Jiandong Wang, Liming Fang, Tao Xu:
Weighted Margin Multi-Class Core Vector Machines. 235-239 - Xiaoh Wang:
Posterior Probability Reconstruction for Multi-Class Support Vector Machines. 240-243 - Jingwen Tian, Qian Feng:
Modeling of Oil and Water Migration Based on Support Vector Machine. 244-248 - Chongming Wu, Xiaodan Wang, Dongying Bai, Hongda Zhang:
Fast SVM Incremental Learning Based on the Convex Hulls Algorithm. 249-252
Information and Data Security
- Minh-Triet Tran, Doan Khanh Bui, Anh Duc Duong:
Gray S-Box for Advanced Encryption Standard. 253-258 - Mingwei Zhao, Yang Liu, Rongan Jiang:
Research of WaveCluster Algorithm in Intrusion Detection System. 259-263 - Xinshe Li, Lei Zhang, Yu-pu Hu:
A Novel Generation Key Scheme Based on DNA. 264-266 - Jianqin Zhou, Cheng Shangguan:
On the k-error Linear Complexity of Sequences. 267-271 - Xiangdong Li, Qingpu Guo, Qingxian Wang:
Analysis of Offline Fair Exchange Protocols in Strand Spaces. 272-276 - Jiping Niu:
Image Encryption Algorithm Based on Rijndael S-boxes. 277-280 - Changping Liu, Mingyu Fan, Yong Feng, Guangwei Wang:
Dynamic Integrity Measurement Model Based on Trusted Computing. 281-284 - Jun Xiao, Ying Wang:
Semi-Fragile Watermarking Based on Image Gradient. 285-289 - Zhijian Yuan, Yingwen Chen, Yan Jia, Shuqiang Yang:
Counting Evolving Data Stream Based on Hierarchical Counting Bloom Filter. 290-294 - Kai-mei Zheng, Xu Qian:
Reversible Data Hiding for Electrocardiogram Signal Based on Wavelet Transforms. 295-299 - Xiang-wei Zhu, Liang Xiao:
Research of Multiple Watermarks Algorithm in E-commerce Copyright Protection and Tracking. 300-304 - Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Robust Hashing Based on Persistent Points for Video Copy Detection. 305-308
Cryptography, Coding, Security, and Key Management
- Ruili Zhou, Jianfeng Pan, Xiaobin Tan, Hongsheng Xi:
Application of CLIPS Expert System to Malware Detection System. 309-314 - Mohd Fadzli Marhusin, Henry Larkin, Chris Lokan, David Cornforth:
An Evaluation of API Calls Hooking Performance. 315-319 - Purui Su, Lingyun Ying, Dengguo Feng:
Exploring Malware Behaviors Based on Environment Constitution. 320-325 - Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM. 326-330 - Alireza Poorghanad, Ali Sadr, Alireza Kashanipour:
Generating High Quality Pseudo Random Number Using Evolutionary methods. 331-335 - Gang Li, Xiangjun Xin, Wei Li:
An Enhanced Deniable Authentication Protocol. 336-339 - Lina Ge, Shaohua Tang:
Sharing Multi-Secret Based on Circle Properties. 340-344 - Mo Yang, Lina Wang, Yuandong Lei:
Research on Evaluation of Trust Model. 345-349 - Xiongjun Li:
A New Measure of Image Scrambling Degree Based on Grey Level Difference and Information Entropy. 350-354 - Lin Guo, Hua Huang, Lejun Zhang, Yongtian Yang, Jianpei Zhang:
Research on Disaster Tolerance System Based on Network Dataflow. 355-360 - Meng Li, Yiu-ming Cheung:
A Novel Motion Based Lip Feature Extraction for Lip-Reading. 361-365 - Kezheng Lin, Bo Fan, Hong Zhao:
Visual Cryptographic Scheme with High Image Quality. 366-370 - Zerong Deng, Xingcheng Liu, Man Teng:
Modified BP Decoding Algorithms Combined with GA for Low-Density Parity Check Codes. 371-375 - Man Teng, Xingcheng Liu, Zerong Deng:
Improved BP Decoding Algorithm for Nonbinary LDPC Codes Based on Bit-flipping Method. 376-380 - Chunlai Song, Xinchun Yin, Yali Liu:
A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme. 381-384
Steganography, Watermarking, Authentication, and Authorization
- Tong Ming, Yan Tao, Hongbing Ji:
An Efficient Audio Watermark Algorithm with Strong Robustness. 385-389 - Heng Pan, Ke Ke, Chunxiang Gu:
Efficienct ID-Based Proxy Blind Signature Schemes from Pairings. 390-393 - Qiuyu Zhang, Fengman Miao, Zhanting Yuan, Qikun Zhang, Zhi Fan:
Construction of a Dynamic Trust Ontology Model. 394-398 - Sunan Shen, Shaohua Tang:
Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation. 399-404
Network and Wireless Communication Security
- Zhenyu Liu, Shengli Xie, Yue Lai:
A Fast Suffix Matching Method in Network Processor. 405-410 - Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang:
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks. 411-416 - Liqiang Mao, Jianfeng Ma:
Towards Provably Secure On-Demand Distance Vector Routing in MANET. 417-420 - Xin-lei Li, Kangfeng Zheng, Yixian Yang:
A Simulation Platform of DDoS Attack Based on Network Processor. 421-426 - Jian Wan, Jianrong Wu, Xianghua Xu, Yanna Yan:
An Efficient Gradient Mechanism of Directed Diffusion in Wireless Sensor Network. 427-431 - Chi Guo, Lina Wang, Lainv Huang, Lei Zhao:
Study on the Internet Behavior's Activity Oriented to Network Survivability. 432-435 - Xuanxia Yao, Xuefeng Zheng:
A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor Networks. 436-441 - Shaohe Lv, Xiaodong Wang, Xin Zhao, Xingming Zhou:
Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks. 442-446 - Xiaochun Xiao, Tiange Zhang, Gendu Zhang:
An Improved Approach to Access Graph Generation. 447-452
Security Models and Applications
- Yongkai Cai, Shaohua Tang:
Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security Mechanism. 453-457 - Yi Niu, Yichun Peng:
Application of Radial Function Neural Network in Network Security. 458-463 - Jiali Hou, Nengshan Feng, Jinzhi Xiong:
A New Intelligent Security Structure for Host System. 464-469 - Min Zhao, Zhaoshui He, Shengli Xie:
Blind Deconvolution Algorithm for MIMO Channel. 470-474 - Juan Zhang, Yi Niu, Wenbin He:
Using Genetic Algorithm to Improve Fuzzy k-NN. 475-479 - Weibin Zhao, Zhiheng Zhou:
Contours Location Based on Fisher Discrimination Analysis. 480-483 - Xuanzi Hu, Kuanfu Wang:
Application of Data Warehouse Technology in Data Center Design. 484-488 - Quanju Zhang, Jie Zhang, Junhong Feng, Yajuan Yang:
Neurodynamic Analysis for a Class of Nonlinear Fractional Programming. 489-494 - Fang Li, Di Li, Jiafu Wan, Xin Huang:
Towards a Component-Based Model Integration Approach for Embedded Computer Control System. 495-499
Web and Multimedia Security
- Cao Hui, Qin Zheng:
A Trust Evaluation Model for P2P E-Commerce Systems. 500-505 - Xiuhua Men, Shunming Li, Zemin Zuo:
Analysis of Signal Transmission with Temperature-Dependent Electrical Parameters Using FDTD. 506-510 - Yuhua Liu, Chun Yang, Kaihua Xu, Hongcai Chen:
Controlling Mechanism for the Hubs in Peer-to-Peer Networks. 511-515 - Tao Ku, Yunlong Zhu, Kunyuan Hu:
A Novel Complex Event Mining Network for RFID-Enable Supply Chain Information Security. 516-521 - Sophia Xiaoxia Duan, Hepu Deng, Brian J. Corbitt:
The Impacts of Government Policies on the Efficiency of Australian Universities: A Multi-Period Data Envelopment Analysis. 522-527 - Wei-jiang Wang, Ting-zhi Shen, Xue-mei Yan:
An Improved Alternating-Projection Demosaicing Algorithm. 528-533 - Qun Fang, Yi Ji, Guoxin Wu:
A Run-Length Coding Based Dynamic Trust Model in P2P Network. 534-539
Applications
- Jianxi Yang, Jianting Zhou, Fan Wang:
A Study on the Application of GA-BP Neural Network in the Bridge Reliability Assessment. 540-545 - Jie-Chang Wen, Chun-lan He:
Some Notes on Blind Source Separation Using Generalized Eigenvalues. 546-549 - Mengmeng Zhang, Wenkai Liu, Ruobin Wang, Huihui Bai:
A Novel Multiple Description Video Coding Algorithm. 550-553 - Huibin Wang, Chaoying Liu, Lizhong Xu, Min Tang, Xuewen Wu:
Multiple Feature Fusion for Tracking of Moving Objects in Video Surveillance. 554-559 - Ju-tao Hao, Jing-jing Zhao:
Shape Constraint Incorporated Geometric Flows for Blood Vessels Segmentation. 560-563
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.