default search action
16th CIS 2020: Nanning, China
- 16th International Conference on Computational Intelligence and Security, CIS 2020, Nanning, China, November 27-30, 2020. IEEE 2020, ISBN 978-1-6654-0445-7
- Aihua Zheng, Naipeng Ye, Xiao Wang, Xiao Song:
3R: Word and Phoneme Edition based Data Augmentation for Lexical Punctuation Prediction. 1-5 - Runjia Wu, Fangqing Gu, Jie Huang:
A multi-critic deep deterministic policy gradient UAV path planning. 6-10 - Fei Xie, Yanning Zhang, Xinming Guo, Wei Zhang, Zhaoyong Zhou, Pengfei Xu:
Linear Elements Separation via Vision System Feature and Seed Spreading from Topographic Maps. 11-15 - Caixu Xu, Guo Hui, He Jie:
Binary Image Geometric Calculation Algorithm Based on SNAM Representation. 16-19 - Liefa Liao, Zhiming Li:
Deep Hashing Using N-pair Loss for Image Retrieval. 20-24 - Liefa Liao, Saisai Zhang:
A Flower Classification Method Combining DenseNet Architecture with SVM. 25-29 - Tianjiao Liang, Hong Bao:
A optimized YOLO method for object detection. 30-34 - Yijian Zhang, Zhou Yuan, Jianwei Yang:
Generalized orthogonal moment. 35-39 - Chang Lu, Xiaochun Lei, Junlin Xie, Xiaolong Wang, XiangBoge Mu:
Panoptic Feature Pyramid Network Applications In Intelligent Traffic. 40-43 - Yiming Zhang:
A Modified Contracting BFGS Update for Unconstrained Optimization. 44-48 - Lei Yang, Xiaotian Jia, Ganming Liu:
Multi-objective Ant Colony Algorithm Based on Pheromone Weight. 49-53 - Mengmeng Xu, Hai Zhu, Hengzhou Xu, Jiongjiong Song, Zhen Luo:
Reliable Routing Design in Predictable Wireless Networks with Unreliable Links. 54-58 - Jinli Zhang, Jiexin Li, Mingjiao Cai, Dining Li, Qiang Wang:
The 5G NOMA networks planning based on the multi-objective evolutionary algorithm. 59-62 - Peng Zhou, Ye Lu, Dong Cheng, Chuanqi Li:
Electro-optic Combination Coherent Communication System Based On OCDMA Theory. 63-67 - Choujun Zhan, Songyan Li, Jianbin Li, Yijing Guo, Quansi Wen, WeiSheng Wen:
Prediction of Air Quality in Major Cities of China by Deep Learning. 68-72 - Kun Ming:
Chinese Coreference Resolution via Bidirectional LSTMs using Word and Token Level Representations. 73-76 - Han Zhang, Zhihua Song, Boyu Feng, Zhongliang Zhou, Fuxian Liu:
Technology of Image Steganography and Steganalysis Based on Adversarial Training. 77-80 - Huaichang Qu, Haifeng Zhao, Xin Wang:
Domain-Specific Chinese Transformer-XL Language Model with Part-of-Speech Information. 81-85 - Ping Cai, Xingyuan Chen, Hongjun Wang, Peng Jin:
The errors analysis of natural language generation - A case study of Topic-to-Essay generation. 86-89 - Zhen Wang, Zhenting Zhang:
Graph-based Bayesian Meta Relation Extraction. 90-94 - Xianguang Liu, Wenfei Wang, Xiaojie Zhang, Han Zhang, Zhihua Song, Zhongliang Zhou:
Intelligent decision-making based on neural network and simulation in two Islands air defense operation. 95-99 - Jian Shi, Yi Xin, Benlian Xu, Mingli Lu, Jinliang Cong:
A Deep Framework for Cell Mitosis Detection in Microscopy Images. 100-103 - Chuanzi Li, Jining Feng, Li Hu, Junhong Li, Haibin Ma:
Review of Image Classification Method Based on Deep Transfer Learning. 104-108 - Zhixuan Wu, Nan Ma, Yiu-ming Cheung, Jiahong Li, Qin He, Yongqiang Yao, Guoping Zhang:
Improved Spatio-Temporal Convolutional Neural Networks for Traffic Police Gestures Recognition. 109-115 - Lingling Li, Xianlong Chen, Yiling Xu:
Machine Translation Based on Domain Adaptive Language Model. 116-120 - Xingsi Xue, Jiawei Lu, Junfeng Chen:
Ternary Compound Matching of Biomedical Ontologies with Compact Multi-Objective Evolutionary Algorithm Based on Adaptive Objective Space Decomposition. 121-125 - Yalin Chen, Zhijun Li, Bin Dong, Shuangyang Zuo:
Sliding Mode Control of Truss Bridge Structure with GMMAs. 126-130 - Jie Song, Qifeng Luo, Jichang Nie:
Research and Application of Multi-Round Dialogue Intent Recognition Method. 131-135 - Xiaolong Wang, Junyan Chen, Yongqing Tang, Jie Gao, Xingbo Wang, Pufan Zhan:
Meter Recognition And Reading System Based On Machine Car. 136-139 - Kaihao Lin, Junyan Chen, Aoge Chen, Hu Huang:
Application of the EfficientDet Algorithm in Traffic Flow Statistics. 140-143 - Zhendong Liu, Yurong Yang, Dongyan Li, Xiaofeng Li, Xinrong Lv, Xi Chen:
Design and Implementation of the Optimization Algorithm in the Layout of Parking Lot Guidance. 144-148 - Yang Li:
Performance Analysis of Scheduling Algorithms in Apache Hadoop. 149-154 - Benyang Deng, Xiaochun Lei, Miao Ye:
Safety helmet detection method based on YOLO v4. 155-158 - Ya-Juan Yang, Liang-Liang Zhang, Yi Niu, Ouan-Ju Zhang:
A Brief Review of Two Classical Models for Asset Allocating. 159-163 - Hai-Dong Li, Lan Zhang:
Research on the Transformation and Development Strategy of Guangdong Independent College Based on SWOT-AHP. 164-168 - Cheng-Jun Wang, Han-Ming Xu, Ming-Hua Jiang:
Research on the Dimensions and Influencing Factors of Enterprise Humanism Management - An Empirical Study Based on the Questionnaire of Dongguan Enterprises. 169-173 - Le Yu, Lun Yu:
Analysis on Developing Dongguan's Badminton Training Market. 174-178 - Yong-Ting He, Zhi-Gang Tang:
Analysis on the Impact of China's Foreign Trade Pattern in the process of the Reduction of Carbon Emission Intensity in China. 179-185 - Huihui Qian, Wen-Sheng Chen, Binbin Pan, Bo Chen:
Kernel Non-Negative Matrix Factorization Using Self-Constructed Cosine Kernel. 186-190 - Bizhong Wei, Jian Dai, Liqiang Deng, Haiyan Huang:
An Optimization Method for Elasticsearch Index Shard Number. 191-195 - Zhongwei Si:
A kind of problem for hypermonogenic functions in Clifford analysis. 196-200 - Kai Li, Chang Liu, Yang Hu, Changshuan Wang, Wei Peng, Qiang Gao, Yun Zhang, Tongsheng Shu, Wensheng Wang, Chengwen Lei, Lin Liu, Junfeng Chen:
Numerical Analysis of Influence of Medicine Cover Structure on Cutting Depth. 201-205 - Kai Li, Chang Liu, Yang Hu, Changshuan Wang, Wei Peng, Qiang Gao, Yun Zhang, Tongsheng Shu, Wensheng Wang, Chengwen Lei, Lin Liu, Junfeng Chen:
Energy Accumulating Cutting Technology in Steel Plate Cutting of Reservoir Gate. 206-209 - Dehua He, Ruliang Wang:
New Equivalent Circuit of Oil-Paper Insulation and Its Parameters Identification. 210-212 - Qinghua Meng, Youli Long, Ruiyang Wang, Fuxian He, Xuheng Lu, Xin Huang:
Design of Intelligent Fighting Robot Construction. 213-216 - Si-Yuan Jing, Jun Yang:
Efficient attribute reduction based on rough sets and differential evolution algorithm. 217-222 - Zhihe Wang, Shuyan Wang, Hui Du, Hao Guo:
Fuzzy C-means clustering algorithm for automatically determining the number of clusters. 223-227 - Di Wang, Zuoquan Zhang:
Enterprise Credit Risk Assessment Using Feature Selection Approach and Ensemble Learning Technique. 228-233 - Hui Du, Yiyang Ni:
The Improvement on Self-Adaption Select Cluster Centers Based on Fast Search and Find of Density Peaks Clustering. 234-237 - Liping Jia, Zhonghua Li:
Emotional Analysis on the Public Sentiment of Students Returning to University under COVID-19. 238-242 - Xiao-Yun Lu, Hecheng Li:
A novel additive consistency for intuitionistic fuzzy preference relations. 243-247 - Haiyan Huang, Bizhong Wei, Jian Dai, Wenlong Ke:
Data Preprocessing Method For The Analysis Of Incomplete Data On Students In Poverty. 248-252 - Liefa Liao, Fan Zhang:
Beetle Antennae Search Algorithm for Community Detection in Complex Network. 253-258 - Jun Hu, Qingfu Zhang, Yong-Chang Jiao:
A Novel Hybrid Tabu Search Algorithm With Binary Differential Operator for Knapsack Problems. 259-263 - Cuo Wanma, Hecheng Li, Erping Song:
A Differential Evolution Algorithm with Adaptive Strategies for Constrained Optimization Problem. 264-268 - Erping Song, Hecheng Li, Cuo Wanma:
An Improved Differential Evolution for Constrained Multi-Objective Optimization Problems. 269-273 - Hui Wang, Xiaobo Song, Zhihao Tong, Xiaoli Wang:
Order of Servers for Periodic Multi-Installment Scheduling. 274-277 - Wenlong Cao, Fan Huang, Mengce Zheng, Honggang Hu:
Attacking FPGA-based Dual Complementary AES Implementation Using HD and SD Models. 278-282 - Guangfu Wu, Yingjun Wang:
The security and privacy of blockchain-enabled EMR storage management scheme. 283-287 - Wei Deng, XinLun Zhang, Zhe Jiang:
A Mobile Application of Face Recognition Based on Android Platform. 288-292 - Qian Guan, Yuxiang Yang:
Reverse logistics network design model for used power battery under the third-party recovery mode. 293-297 - De Li, Yuhang Hu, Jinyan Wang:
SLFB-CNN: An interpretable neural network privacy protection framework. 298-302 - Jun Yang, Siyuan Jing, Liping Jia:
RVBT: A Remote Voting Scheme Based on Three-Ballot. 303-307 - Caiming Liu, Yan Zhang, Qin Li, Luxin Xiao:
Full Coverage Detection of Immune Detector for Public Data Set. 308-312 - Jie Chen, Xian Su, WeiSheng Wen, Hao-Tian Wu:
Credit Platform Construction of Vocational Education Group Based on Blockchain. 313-317 - Rui Sun, Liming Li, Xingjie Chen, Ji Wang, Xiao-dong Chai, Shubin Zheng:
Unsupervised learning based target localization method for pantograph video. 318-323 - Chunman Yan, Yuyao Zhang:
Image Super-Resolution Reconstruction Based on Online dictionary learning Algorithm. 324-327 - Lei Yang, Neng Li, Yitian Chen, Haoran Chen, Zhihao Chen, Decai Liang:
The Covariance Matrix Evolution Strategy Algorithm Based On Cloud Model And Cholesky Factor. 328-332 - HuChunAn, WenHao:
A differential evolution SAF-DE algorithm which jumps out of local optimal. 333-337 - Yaling Zhang, Jiale Li, Shibo Bai:
Chinese Sentiment Classification Model of Neural Network Based on Particle Swarm Optimization. 338-341 - Gang Hu, Chuhan Zhou, Xiaojie Zhang, Han Zhang, Zhihua Song, Zhongliang Zhou:
A Neural Network-Based Intelligent Decision-Making in the Air-Offensive Campaign with Simulation. 342-346 - Wei Ding, Ji Han, Dijin Wang:
The seismic electromagnet signal recognition using convolutional neural network. 347-350 - Zhendong Liu, Yurong Yang, Xinrong Lv, Dongyan Li, Xi Chen, Xiaofeng Li:
Predicting Algorithms and Complexity in RNA Structure Based on BHG. 351-355 - Meng Wang, Yihong Long:
SM9 Digital Signature with Non-repudiation. 356-361 - Tao Yu, Zhen Liu, Yuaning Liu, Huaibin Wang, Nodir Adilov:
A New Feature Selection Method for Intrusion Detection System Dataset - TSDR method. 362-365 - Xing Zhang, Xiaotong Cui, Kefei Cheng, Liang Zhang:
A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks. 366-369 - Cen Caichun, He Jie, Guo Hui:
Connected Domain Algorithm Based on Asymmetric Square NAM. 370-373 - Yang Chen, Xiaoyong Li:
A High Accuracy DNS Tunnel Detection Method Without Feature Engineering. 374-377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.