default search action
CIS 2018: Hangzhou, China
- 14th International Conference on Computational Intelligence and Security, CIS 2018, Hangzhou, China, November 16-19, 2018. IEEE Computer Society 2018, ISBN 978-1-7281-0169-9
Regular Papers
Intelligent Algorithms
- Asif Mehmood, Muhammad Javed Iqbal, Hassan Dawood, Ping Guo:
Computationally Efficient Low Power Neuron Model for Digital Brain. 1-5 - Qingxia Kong, Zhendong Liu, Xiaobing Tang, Zhaohui Yang, Yaoyao Fu, Hengfei Li:
The Computation of the Barrier Tree for BHG of RNA Folding Structure. 6-9 - Xiaofeng Li, Baoming Qiao, Jie Liu:
Speech Recognition Method Based on Normalized Simplified Artificial Fish Swarm Algorithm. 10-14 - Cai Dai, Yanjun Ji, Juan Li:
An Improvement Evolutionary Algorithm Based on Grid-Based Pareto Dominance for Many-Objective Optimization. 15-19 - Xingyin Wang, Yuping Wang, Junhua Liu, Si Guo, Liwen Liu:
Two-Archive Based Evolutionary Algorithm Using Adaptive Reference Direction and Decomposition for Many-Objective Optimization. 20-24 - Na Wang, Wenyao Zhang, Dawei Li:
GIMI: A New Evaluation Index for 3D Multimodal Medical Image Fusion. 25-29 - Zixian Lin, Hai-Lin Liu, Fangqing Gu:
An Evolutionary Multi- and Many-Objective Optimization Algorithm Based on ISDE + and Region Decomposition. 30-34
Intelligent Computation
- Fanghan Liu, Xiaobing Tang, Zhaohui Yang:
An Encoding Algorithm Based on the Shortest Path Problem. 35-39 - Yuhui Liu, Hecheng Li, Huafei Chen:
A Genetic Algorithm for Solving Linear Integer Bilevel Programming Problems. 40-44 - Min Jiang, Zhiqing Meng, Gengui Zhou, Rui Shen:
A Smoothing Penalty Function Algorithm for Two-Cardinality Sparse Constrained Optimization Problems. 45-49 - Aihong Ren, Xingsi Xue:
A New Solving Method for Fuzzy Bilevel Optimization with Triangular Fuzzy Coefficients. 50-53 - Xiaohua Li:
The Comparing Analysis of Drosophila Optimization and Gravitational Search Algorithm. 54-56 - Jie Zhang, Junhong Feng:
Gene Selection for Single-Cell RNA-Seq Data Based on Information Gain and Genetic Algorithm. 57-61
Intelligent Systems and Complex Systems
- Xiaobo Song, Ning Du, Xiaoli Wang:
Multi-Installment Scheduling for Networked Computing Systems with Server Release and Offline Times. 62-65 - Yunhui Deng, Yong Wang, Xiongsen He, Hao Feng:
An Inter-Domain Transmission Path Selection Approach of Multi-Controller SDN Network Based on FPGA. 66-70 - Junhong Nie, Hanlin Tang, Jingxuan Wei:
Analysis on Convergence of Stochastic Processes in Cloud Computing Models. 71-76 - Wenyi Zeng, Yue Xi, Qian Yin, Ping Guo:
Weighted Dual Hesitant Fuzzy Sets and Its Application in Group Decision Making. 77-82 - Ying Zheng, Hong Bao, Xin-Kai Xu, Nan Ma, Jialei Zhao, Dawei Luo:
A Method of Detect Traffic Police in Complex Scenes. 83-87 - Haokuan Qin, Zhengfeng Ming, Tao Wen, Yuhu Zhao:
Force Calculation for Hybrid Magnetic Levitation System. 88-92 - Jie Guo, Yibin Chen:
An Optical Fiber Warning System Based on Vibration Sensing. 93-95
Pattern Recognition and Knowledge Discovery
- Rehan Mehmood Yousaf, Hafiz Adnan Habib, Hussain Dawood, Sidra Shafiq:
A Comparative Study of Various Edge Detection Methods. 96-99 - Xiaoqiao Zhang, Xiuling Zhou, Ping Guo:
Hyperspectral Image Denoising Based on Low Rank and Expected Patch Log Likelihood. 100-105 - Zhuohao Guo, Weixing Zhou, Luwei Xiao, Xiaohui Hu, Zehao Zhang, Zhou Hong:
Occlusion Face Detection Technology Based on Facial Physiology. 106-109 - Si Chen, Dehui Qiu, Qirun Huo:
Siamese Networks with Discriminant Correlation Filters and Channel Attention. 110-114 - Miaomiao Chen, Fengshan Bai:
Research of X Ray Image Recognition Based on Neural Network. 115-119 - Yang Li, Wensheng Chen, Binbin Pan, Bo Chen:
Class-Cone Based Nonnegative Matrix Factorization for Face Recognition. 120-124 - Junyu Li, Haoliang Yuan, Loi Lei Lai, Yiu-ming Cheung:
Joint Collaborative Representation and Discriminative Projection for Pattern Classification. 125-129 - Xunzhang Li, Yong Wang, Wenlong Ke, Hao Feng:
Real-Time Network Traffic Classification Based on CDH Pattern Matching. 130-134 - Hui Du, Zhihe Wang, Dan Wang, Xiaoli Wang:
Multi-Feature Fusion Method Applied in Texture Image Segmentation. 135-139
Data Mining and Clustering
- Jun Yang, Siyuan Jing:
Acceleration of Feature Subset Selection Using CUDA. 140-144 - Zhihe Wang, Mengying Huang, Hui Du, Hongwu Qin:
A Clustering Algorithm Based on FDP and DBSCAN. 145-149 - Wei Wang, Yanni Yao, Lei Zhu, Xinhong Hei, Yichuan Wang:
A Novel Subgraph Querying Method on Directed Weighted Graphs. 150-154 - Yao Sun, Hong Jia, Jiwu Huang:
Ensemble Clustering with Novel Weighting Strategy. 155-159 - Zhanyuan Yang, Hanfeng Liu, Minping Chen, Xia Li:
Off-Topic Text Detection Based on Neural Networks Combined with Text Features. 160-163 - Bo Zhao, Lin Zhu, Zhiyang Ma, Juyan Ni, Qing Lin, Qian Liu:
Object Detection Based on Multi-Channel Deep CNN. 164-168 - Xiaoyan Guo, Ming Zhang, Yongqiang Dai:
Image of Plant Disease Segmentation Model Based on Pulse Coupled Neural Network with Shuffle Frog Leap Algorithm. 169-173 - Fan Zhang, Yong Wang, Miao Ye:
Network Traffic Classification Method Based on Improved Capsule Neural Network. 174-178 - Xiaoan Liu, Tao Peng:
A SVM and Co-seMLP Integrated Method for Document-Based Question Answering. 179-182
Optimization Theory and Methods
- Xing Wang, Minghua Jiang, Quanju Zhang:
Optimization of Supply Chain Network Based on Uncertainty Demand. 183-186 - Jie Liu:
Improved Sine Cosine Algorithm with Reverse-Learning and Adaptive Tent Chaos Search. 187-190 - Xingsi Xue, Aihong Ren, Dongxu Chen:
An Evolutionary Tabu Search Algorithm for Matching Biomedical Ontologies. 191-195 - Zhendong Liu, Fanghan Liu, Qingxia Kong, Fanchang Hao, Hongluan Zhao:
Algorithm and Scheme in RNA Structure Prediction Including Pseudoknots. 196-200 - Mei Ma, Hecheng Li, Jing Huang:
A Multi-Objective Evolutionary Algorithm Based on Principal Component Analysis and Grid Division. 201-204
Cryptography and Cryptanalysis
- Fan Ding, Yihong Long, Peili Wu:
Study on Secret Sharing for SM2 Digital Signature and Its Application. 205-209 - Hengzhou Xu, Hai Zhu, Mengmeng Xu, Bo Zhang, Sifeng Zhu:
Girth Analysis of Tanner (5, 11) Quasi-Cyclic LDPC Codes. 210-214 - Ruliang Wang, Xiaoli Pei:
Robust Stability Analysis for Uncertain Time-Varying Delay Neutral Systems. 215-218 - Chao Deng:
Research of S50 Based Electronic Label Authentication Algorithm. 219-222
Information Security and Integrity
- Tianwen Huang, Lejun Zhang, Xiaoyan Hu, Xiaoying Lei:
A Data Validation Method Based on IP Covert Channel Packet Ordering. 223-227 - Xiaoyan Hu, Lejun Zhang, Tianwen Huang, Xiaoying Lei:
A Security Evaluation Method for Voice-over-IP Streaming Media Information Hiding. 228-232 - Zhengxin Fu, Sijia Liu, Kun Xia, Bin Yu:
Improved Extended Polynomial-Based Secret Image Sharing Scheme Using QR Code. 233-237 - Weiguo Shen, Wei Wang:
Node Identification in Wireless Network Based on Convolutional Neural Network. 238-241 - Liping Chen, Jun Liu, Weitao Ha:
Cloud Service Risk in the Smart Grid. 242-244 - Changhong Zhu, Xiaoping Liang, Wei Deng:
Automotive ECU Functional Test System Based on PXI. 245-249
Network Security
- Li Ma, Jingjing Qu, Yan Chen, Shiwei Wei:
An Improved Dynamic Clonal Selection Algorithm Using Network Intrusion Detection. 250-253 - Xinzhong Xu, Liancheng Zhang, Juwei Yan:
PN Code Diversification Based Spread Spectrum Flow Watermarking Technology. 254-258 - Mengmeng Xu, Hai Zhu, Hengzhou Xu, Baofeng Wang, Sifeng Zhu:
Joint Optimization of Packet Length and Transmission Energy in Amplify-and-Forward Relay Networks. 259-263 - Weitao Ha:
Cloud Service Selection with Fuzzy C-Means Artificial Immune Network Memory Classifier. 264-268 - Rong Shan, Tao Li:
Reliability Simulation of Mobile Wireless Sensor Networks Based on Support Vector Machines. 269-272
Security Methodologies and Management
- Yanli Wang, Guogang Dang:
Forest Fire Monitoring System and Energy Saving Algorithm. 273-276 - Jie Zhang, Yi Chen, Xinhong Hei, Lei Zhu, Qin Zhao, Yichuan Wang:
A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs. 277-280 - Liwei Tian, Yong Fan:
An Improved Location Algorithm Based on Mobile Anchor Node. 281-285 - Shichang Xuan, Dapeng Man, Wei Wang, Kaiyue Qin, Wu Yang:
Hybrid Classification of WEB Trojan Exploiting Small Volume of Labeled Data Vectors. 286-290 - Yingle Li, Shuyu Li:
A Real-Time Location Privacy Protection Method Based on Space Transformation. 291-295
System Analysis and Modeling
- Hao Jin, Yanru Yao, Liping Yang:
A CUSUM Tests for Stable Index Changes under Heavy-Tailed Sequences. 296-300 - Xinpeng Li, Yong Wang, Hao Feng, Wenlong Ke:
A Parallel Host Log Analysis Approach Based on Spark. 301-305 - Jiading Wang, Hejun Xuan, Yuping Wang, Yuanchao Yang, Sen Liu:
Optimization Model and Algorithm for Routing and Spectrum Assignment in Elastic Optical Networks. 306-310 - Yajuan Yang, Liangliang Zhang, Quanju Zhang:
Constructing Business Simulation Training Platform Based on Workflow Management Systems. 311-315 - Tianxiang Feng, Hongxia Liu, Zhonglin Wan:
The Quality Analysis and Reform of Professional Construction - Illustrated by the Case of Dongguan Polytechnic. 316-320 - Haiye Qiao:
An Algorithm of Segmentation Positioning Analysis Based on CSS. 321-324 - Kangshun Li, Xiaoling Huang, Yueyi Li, Ying Feng:
Design and Implementation of Tracing Shopping Guide System Based on Two Dimensional Code Lighting. 325-329 - Cancan Zhang:
Internal Control Measure of Administrative Institutions Based on AHP and Fuzzy Comprehensive Evaluation. 330-334
Short Papers
Intelligent Algorithms
- CaiHua Qiu:
Implementation of Vehicle Mobile Sales Cloud Management System Based on Intelligent Community. 341-344 - Zhicang Wang, Hecheng Li:
A Novel Multi-Objective Evolutionary Algorithm Based on Linear Programming. 345-348 - Tiejun Chen, Qiang Wang, Hai-Lin Liu:
FIR Digital Filter Design Based on Evolutionary Multi-Objective Algorithm. 349-352 - Qiang Wang, Tingting Lan:
Smart Construct High Girth LDPC Codes Based on Permutation Groups. 353-356
Intelligent Systems and Complex Systems
- Kangshun Li, Yi Wang:
Influence of Distributed Generation Connection on Dynamic Characteristics of Power Grid. 357-361 - Min Li, Fei Liang, Jie Liu:
CFO Algorithm Using Niche and Opposition-Based Learning. 362-365 - Ding Wang:
A New Hybrid Global Optimization Algorithm. 366-368
Pattern Recognition and Knowledge Discovery
- Bo Chen, Shan Huang, Wensheng Chen, Zhengrong Liang:
A Novel Hybrid Active Contour Model for Medical Image Segmentation Driven by Legendre Polynomials. 369-373 - Ying Huang, Yingxu Wang, Yiwang Huang:
Filtering Out Infrequent Events by Expectation from Business Process Event Logs. 374-377 - Qing Wu, Zongxian Qi, Zhicang Wang, Yu Zhang:
An Improved Weighted Local Linear Embedding Algorithm. 378-381 - Qing Wu, Haoyi Zhang, Rongrong Jing, Zhicang Wang:
A Class of Fuzzy Smooth Piecewise Twin Support Vector Machine. 382-385 - Muhan Ma, Yao Yun, Jianwei Yang, Yunjie Chen:
Parametric Estimation of Affine Deformations in Terms of Generic Weighted Centroid. 386-389
Data Mining and Clustering
- Huiyi Zhou, Yong Wang, Miao Ye:
A Method of CNN Traffic Classification Based on Sppnet. 390-394 - Xuening Quan, Wenzhang He:
Image Reconstruction Algorithm Based on Guided Image Filtering in Parallel-Beam CT. 395-398 - Bo Chen, Feifei Xie, Wensheng Chen, Binbin Pan:
A Novel Rician Noise Removal Algorithm Based on Energy Function Minimization Method. 399-403 - Haitao Chen, Wen-Sheng Chen, Binbin Pan, Bo Chen:
A Novel Enhanced Nonnegative Feature Extraction Approach. 404-407 - Qiang Chen:
Massive Data Storage Algorithm Based on Node Performance Evaluation. 408-411
Cryptography and Cryptanalysis
- Hongwei Duan, Runmeng Du, Qiong Wei, Wenli Wang, Xin Liu:
Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted Average. 412-415 - Min-Shiang Hwang, Eko Fajar Cahyadi, Yuen-Cheng Chou, Cheng-Ying Yang:
Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart Card. 416-420 - Zhenhua Liu, Yaohui Liu:
Verifiable and Authenticated Searchable Encryption Scheme with Aggregate Key in Cloud Storage. 421-425 - Huifang Yu:
Certificateless Proxy Signcryption Using Cyclic Multiplication Groups. 426-429
Information Security and Integrity
- Sijia Zhang, Xinyue Zhang, Yijin Wang:
Feedback Numbers of Balanced Hypercubes BH_n. 434-438 - Yi Wang, Zhiping Tan:
Modified RSA Encryption Algorithm Based on Chaos and Its Application in Voice Encryption System. 439-444 - Longqing Zhang, Xinwei Zhang, Liping Bai, YangHong Zhang, ShengFu Lan:
Research on Domain Binding Information Environment System of Flower with GPRS. 445-448 - Yubin Wang, Jinyu Yao, Xiaoxue Yu:
Information Security Protection in Software Testing. 449-452 - Yanfei Yu:
Design of Information System for Fire Risk Evaluation. 453-456
Security Methodologies and Management
- Jing Nie:
Application of Virtualization Platform in Informationization of Higher Vocational Colleges. 457-460 - Xiuni Yang, Yunfeng Yang:
Option Pricing under Stochastic Interest Rates. 461-464 - Yunfeng Yang, Huihui Bai, Yinchun Zheng:
Optimal Consumption and Investment Strategies in a Jump-Diffusion Model. 465-468 - Ge Wen, Hai Liu, Jun Yan, Zhenqiang Wu:
A Privacy Analysis Method to Anonymous Graph Based on Bayes Rule in Social Networks. 469-472 - Lei Yang, Longqing Zhang:
Logistics Tracking Management System Based on Wireless Sensor Network. 473-475
System Analysis and Modeling
- Peng Wu, Qian Yin, Ping Guo:
A Two-Dimensional Sky Background Model for LAMOST Based on Improved KICA. 476-480 - Jie Zhang, Hao Chen, Kai Wang:
Study on Standardization of Detection Data of Atmospheric Microparticle Lidar Based on Metadata. 481-484 - Longqing Zhang, Liping Bai, Xinwei Zhang, YangHong Zhang, Feng Sun:
Planning and Design of the Plant Growth Model Based on Internet of Things. 485-487 - Ya Fan, Yong Wang, Miao Ye:
An Improved Small File Storage Strategy in Ceph File System. 488-491 - Ye Wang, Hua Li, Gongbing Shan:
Acquiring the Distance Data with Inertial Measurement Unit in a Wearable Device for the Training of Hammer Throwers. 492-495 - Dongyi He, Wenxue Niu:
Research on the Practical Teaching Mode Based on Human Resources Professional Competition. 496-499 - Chaozhi Huang, Guobin Yang, Haidong Chen, Xiping Liu:
Inhibitory Effect of Radial Force to Switched Reluctance Motor with Stator Pole Slot. 500-503
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.