default search action
CIS 2012: Guangzhou, China
- Eighth International Conference on Computational Intelligence and Security, CIS 2012, Guangzhou, China, November 17-18, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-4725-9
- Shuqing Jiao:
A Filled Function Method with One Parameter for Box Constraint. 1-4 - Xiao Zhi Gao, Ying Wu, Xiaolei Wang, Xianlin Huang, Kai Zenger, Xiaofeng Wang:
A Modified PSO Method Based on Cultural Algorithm and Quantum Computing. 5-10 - Xiaofang Guo, Xiaoli Wang, Mingzhao Wang, Yuping Wang:
A New Objective Reduction Algorithm for Many-Objective Problems: Employing Mutual Information and Clustering Algorithm. 11-16 - Zhenghai Ai:
A New TOPSIS with Triangular Fuzzy Number and Uncertain Weight Based on Cosines Similar Degree. 17-21 - Xiao Zhi Gao, Xiaolei Wang, Kai Zenger, Xiaofeng Wang:
A Niching Harmony Search Method for Multi-modal Optimization. 22-27 - Tao Wen, Zhengfeng Ming, Youqing Liu, Jinxin Gu:
A Study on Magnetic Force of the Large Displacement Hybrid Suspension System Based on Finite Element Method. 28-30 - Guiyu Li, JiongCheng Li, Henghui Xiao, Shengpei Ding:
A Weak Filled Function Algorithm for Unconstrained Searching Optimization. 31-34 - Jie Liu, Yanfeng He:
Ant Colony Algorithm for Waste Collection Vehicle Arc Routing Problem with Turn Constraints. 35-39 - Shuqing Jiao:
A Filled Function with Two Parameters for Unconstrained Global Optimization. 40-43 - Guoxi Han, Jun He, Jianqing Qi:
An Optimization Design Method of Integrated Radar and Jammer Signal Modulated by Bi-phase Sequences of Chaos. 44-47 - Huan Xu, Jiechang Wen:
Differential Evolution Algorithm for the Optimization of the Vehicle Routing Problem in Logistics. 48-51 - Chunyan Liu, Conghui Zhu, Tiejun Zhao, Dequan Zheng:
Extracting Main Content of a Topic on Online Social Network by Multi-document Summarization. 52-55 - Ruimin Jia, Dengxu He:
Hybrid Artificial Bee Colony Algorithm for Solving Nonlinear System of Equations. 56-60 - Guojian Cheng, Yao An, Zhe Wang, Kai Zhu:
Oil Well Placement Optimization Using Niche Particle Swarm Optimization. 61-64 - Ning Dong, Fei Wei, Yuping Wang:
Preference Based Multiobjective Evolutionary Algorithm for Constrained Optimization Problems. 65-70 - Zhenhua Li, Hai-Lin Liu:
Preference-Based Evolutionary Multi-objective Optimization. 71-76 - Qiang Wang, Hai-Lin Liu, JiongCheng Li:
Resource Allocation for OFDM System Based on Evolutionary Algorithm. 77-81 - Xiangyou Li:
Saddle-point Condition for Fractional Programming. 82-85 - Ajit Narayanan, Yi Chen, Shaoning Pang, Ban Tao:
The Effects of Different Representations on Malware Motif Identification. 86-90 - Xue Hong-Jun, Chen Tao, Xue Li-Min:
A Method for Judging Web-page Type. 91-93 - Leilei Yang, Guiquan Liu, Qi Liu, Lei Zhang, Enhong Chen:
Analyzing Sequence Data Based on Conditional Random Fields with Co-training. 94-98 - Bin Li, Tianfei Wang, Liping Jia:
Application of Improved Logarithm Logistic Models in Population Prediction. 99-102 - Jie Zhang, Xingsi Xue, Yuping Wang:
Class Assignment Algorithms for Performance Measure of Clustering Algorithms. 103-106 - Hairong Zhao, Wuneng Zhou, Yan Gao:
Energy Efficient and Cluster Based Routing Protocol for WSN. 107-111 - Jarno M. A. Tanskanen, Xiao Zhi Gao, Jing Wang, Ping Guo, Jari A. K. Hyttinen, Vassil S. Dimitrov:
Experimental Comparison of Geometric, Arithmetic and Harmonic Means for EEG Event Related Potential Detection. 112-116 - Yilong Liu, Guohua Liu:
Finding the Provenance of k-anonymous Data and Adding It to Association-rule Mining. 117-122 - Xiaoying Pan, Hao Chen:
Multi-Agent Evolutionary Clustering Algorithm Based on Manifold Distance. 123-127 - Zhongwei Si, Lina Liang, Jinyuan Du:
The Hilbert Boundary Value Problem in the Unit Ball in Clifford Analysis. 128-131 - Dong-Jiang Ji, Wen-Zhang He, Xiao-Bing Zou:
TV OS-SART with Fractional Order Integral Filtering. 132-135 - Xin Wan, Xinfang Zhang, Liang Chen, Hao Jin:
TVPDc: A Model for Secure Managing Virtual Infrastructure in IaaS Cloud. 136-141 - Bin You, Xiao-Ran Liu, Ning Li, Yue-Song Yan:
Using Information Content to Evaluate Semantic Similarity on HowNet. 142-145 - Er-Dun Zhao, Yong-Qiang Qi, Xing-Xing Xiang, Yi Chen:
A Data Placement Strategy Based on Genetic Algorithm for Scientific Workflows. 146-149 - Junwei Wang, Haifeng Wang:
A Fuzzy Decision Based Intelligent QoS Multicast Routing Algorithm. 150-153 - Shuang Feng, Yingqiu Ma, Jinquan Li:
A Kind of Nonlinear and Non-convex Optimization Problems under Mixed Fuzzy Relational Equations Constraints with Max-min and Max-average Composition. 154-158 - Dan Zhang, Longmei Jie, GuoQiang Shao:
A New Plan Recognition Algorithm and its Implementation. 159-162 - Wen Wang, Zhicheng Zhao:
A Robust Instance-based Video Search Method by Re-ranking for Multiple Visual Codebooks. 163-167 - Ze Tang, Jianwen Feng, Yi Zhao:
Cluster Synchronization of Complex Networks with Non-delayed and Delayed Coupling under Pinning Control. 168-172 - Tianxiang Feng:
Computer Realization of Solving n-order Incomplete Four Angles Problem. 173-176 - Liu Yang, Junwen Deng, Yuyao Song:
Design of Computer Measurement and Control System of Test Device for Grain Drying Based on Virtual Instrument. 177-182 - Jing Nie:
Design the Desktop Backup System Based on Cloud Computing. 183-185 - Lingling Hu, Dazhou Wu, Xu Xu, Jie Yao:
DTMS: A Driving Training Management System Based on the Internet of Things. 186-189 - Xin-Lei Feng, Liping Jia:
Further Research on Group Consensus of Multi-agent Systems. 190-194 - Bo Yang, Pengfei Zhao, Shuqiu Ping, Jing Huang:
Improving the Recommendation of Collaborative Filtering by Fusing Trust Network. 195-199 - Guoqiang Hang, Yonghui Liao, Yang Yang, Danyan Zhang, Xiaohui Hu:
Neuron-MOS Based Schmitt Trigger with Controllable Hysteresis. 200-203 - Yi Zhao, Jianwen Feng, Jingyi Wang:
On Synchronizability of Kleinberg Small World Networks. 204-208 - Qian Yin, Ruiyi Luo, Ping Guo:
Parallelization and Optimization of Molecular Dynamics Simulation on Many Integrated Core. 209-213 - Peng Sun, Xin Guo, Kang Chen, Ziyan Wu:
Research on Data Recording in Seismic PSD Experiment. 214-218 - Weijun Dai, Ji Ge:
Research on Vision-based Intelligent Vehicle Safety Inspection and Visual Surveillance. 219-222 - Peng Sun, Xin Guo:
Study on Numerical Integration Algorithm for PSD Test. 223-227 - Zhonghua Li, Chunhui He:
The AIS-SoL Optimization: An Artificial Immune System with Social Learning. 228-232 - Xingtong Zhu, Bo Xu:
Urban Water Consumption Forecast Based on QPSO-RBF Neural Network. 233-236 - Yang Liu, Liji Wu, Yun Niu, Xiangmin Zhang, Zhiqiang Gao:
A High-Speed SHA-1 IP Core for 10 Gbps Ethernet Security Processor. 237-241 - Yujing Si, Ji Xu, Zhen Zhang, Jielin Pan, Yonghong Yan:
An Improved Mandarin Voice Input System Using Recurrent Neural Network Language Model. 242-246 - Zhibin Li, Lingling Wang, Haichuan Lou:
Analysis and Forecasting on the Relationship between Port Logistics Capacity and Coastal Marine Economic Growth Based on PKNN in Case of Zhejiang Province. 247-251 - Xiao Zhi Gao, Jing Wang, Jarno M. A. Tanskanen, Rongfang Bie, Ping Guo:
BP Neural Networks with Harmony Search Method-based Training for Epileptic EEG Signal Classification. 252-257 - Ziping Zhao, Xirong Ma:
Prediction of Prosodic Word Boundaries in Chinese TTS Based on Maximum Entropy Markov Model and Transformation Based Learning. 258-261 - Siming Ma, Wuneng Zhou, Shicao Luo, Rui Chen:
Projective Synchronization Control of Delayed Recurrent Neural Networks with Markovian Jumping Parameters. 262-266 - Ruliang Wang, Dongmei Gao:
Robust Stability of Uncertain Neutral Systems with Time-varying and Distributed Delays. 267-270 - Xueqin Kou, Lichen Gu:
Ultrasonic Target Recognition Based on Wavelet Packet and Neural Network. 271-274 - Zhi Liu, Qi Hua Chen, Xiang Pan, Yipan Feng:
3D Model Retrieval Method Based on Single View. 275-279 - Siyuan Wu, Zhicheng Zhao:
A Multi Modal Content-Based Copy Detection Approach. 280-283 - Sun Xiao-li, Xu Chen, Li Min:
An Adaptive Image Denoising Model Based on Nonlocal Diffusion Tensor. 284-287 - Lei Xia, Lejun Zhang, Jianpei Zhang, Jing Yang, Lin Guo:
An Improved Community Detection Algorithm Based on Local Information in Social Networks. 288-292 - Kai Yan, Kefeng Feng, Ying Wang, Bo Pan:
Based on Image Salient Features Network Image Retrieval Method. 293-297 - Dong Kang, Haihua Xing, Shulei Wu, Juntao Chen, Jinmei Zhan:
Design of University Teacher's Files Management System. 298-300 - Juguo Wang, Yun Pu, Guoqi Li:
Fault Model Libraries for Safety Analysis and their Ontology-based Reuse. 301-304 - Peipei Pan, Xin Zheng, Qingqing Xu, Ping Guo:
Image Completion with Automatic Structure Propagation. 305-309 - Wei-Qiang Zhang, Yi-Mei Song, Jiqiang Feng:
Image Denoising Based on Wave Atoms and Cycle Spinning. 310-313 - Qiguang Miao, Jingjing Lou, Pengfei Xu:
Image Fusion Based on NSCT and Bandelet Transform. 314-317 - Yanjuan Shuai, Rui Liu, Wenzhang He:
Image Haze Removal of Wiener Filtering Based on Dark Channel Prior. 318-322 - Zhenhong Li, Jianwei Yang, Rushi Lan, Xiaoxia Feng:
Multilayer-Pseudopolar Fractional Fourier Transform Approach for Image Registration. 323-327 - Yan-Fei Yu:
Optimization for Fire Station Location Planning Based on Travel Time of Fire Vehicles. 328-331 - Haifeng Zhang, Zhaohui Zhang, Hongtao Yang, Li Wu, Linao Tang, Qing Zhu, Sen Dong, Maoyuan Qin, Yangjie Lei:
Real-Time Auto-Focus System Design Based on Climbing Algorithm and its FPGA Implementation. 332-335 - Haihua Xing, Shulei Wu, Dong Kang, Juntao Chen, Jinmei Zhan:
Research of Web Portable Technology Application. 336-338 - Jun Li, Tao Meng, Lixin Zhang, Shao-Ping Zhao:
Research on Evaluation Method Used to Quality Performance of Missile Weapon Based on Rough Set Rule Extraction. 339-344 - Minguang Song, Ping Guo:
Scene Recognition via Combining Information of Neighbors. 345-349 - Dongmei Fu, Xiao Yu, Tingting Wang:
Segmentation Algorithm Study for Infrared Images with Occluded Target Based on Artificial Immune System. 350-353 - Xin Zheng, Qingqing Xu, Peipei Pan, Ping Guo:
Statistical Image Upsampling Method Based on CUDA. 354-358 - Tiancheng Zhang, Xiaonan Yu, Dejun Yue, Yu Gu, Ge Yu:
Study of an RFID Based Object-Relationship Recognition System. 359-363 - Xin Liu, S. Y. Cheng, X. W. Zhang, X. R. Yang, Ba Thach Nguyen, Sukhan Lee:
Unsupervised Segmentation in 3D Planar Object Maps Based on Fuzzy Clustering. 364-368 - Xin Li, Zenggang Zhou, Xiaoyuan Li, Yan Wan:
Vehicle Segmentation and Speed Detection Based on Binocular Stereo Vision. 369-373 - Zhi-Tao Cui, Ke Jian:
A New Algorithm to Estimate Mixing-Matrix of Underdetermined Blind Signal Separation. 374-377 - Guangqing Long, Xiaoyuan Huang, Aimei Tan:
A Product Integration Method for Eigenvalue Problems of a Class of Non-compact Operators. 378-381 - Jianqiao Shen, Huabei Lie:
A Special XQuery Program Dealing with Nested Loop Structure. 382-386 - Ruizhong Wang:
Analyses the Financial Data of Stocks Based Rough Set Theory. 387-390 - Guoxu Zhou, Zhaoshui He, Yu Zhang, Qibin Zhao, Andrzej Cichocki:
Canonical Polyadic Decomposition: From 3-way to N-Way. 391-395 - Yuanlong Wang, Ping Guo:
Fast Multiple Scattering in Participating Media with Beamlet Decomposition. 396-400 - Fan Lei, Yao Lu, Wei Huang, Lujun Yu, Lin Jia:
Fast Static Particle Swarm Optimization Based Feature Selection for Face Detection. 401-405 - Feng Yu, Hong-wei Xuan, Dequan Zheng:
Key-Phrase Extraction Based on a Combination of CRF Model with Document Structure. 406-410 - Tianfei Wang, Bin Li, Jin Zou, Feng Sun, Zhihe Zhang:
New Bounds of the Nordhaus-Gaddum Type of the Laplacian Matrix of Graphs. 411-414 - Jian-Hui Yang, Wei Dou:
Prediction of Gold Price Based on WT-SVR and EMD-SVR Model. 415-419 - Yuenan Li:
Robust Image Hash Function Based on Polar Harmonic Transforms and Feature Selection. 420-424 - Pei-Lin Liu, Jian-Hai Jin:
Ship CAE Modeling Based on Tribon XML File. 425-428 - Jianhui Yang, Bin Yang:
Study on Portfolio La-VaR Analysis Based on Copula-Kernel Model. 429-434 - Xia Wang, Qian Yin, Ping Guo:
Text-independent Speaker Identification Using Fisher Discrimination Dictionary Learning Method. 435-438 - Shuangyan Quan, Jing Zhang:
The Algebraic Method with Computerized Symbolic Computation for Travelling Wave Solutions of the Generalized KP-BBM Equation. 439-441 - Kan Yuan, Dawu Gu, Zheng Guo, Sigang Bao:
A Highly Efficient Correlation Power Analysis on PRINT Cipher. 442-446 - Chang-Ji Wang, Jian-Fa Luo:
A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext. 447-451 - Dexin Yang, Baolin Xu, Bo Yang, Jianping Wang:
A Novel Biometric Authentication Scheme with Privacy Preserving. 452-456 - Heyu Yin, Qiuliang Xu:
A Permanent Secure QKD Protocol Realized with Asymmetric Key Authentication. 457-460 - Yuxi Tan, Lei Tang, Zhinian Gao, Peng Sun, Xiaoyuan Yang, Yu Li:
A Rotation Resistant Image Watermarking Algorithm via Circle. 461-463 - Fengqing Tian, Haili Xue, Xue Haiyang:
A Secure Public Key Encryption from Computational Linear Diffe-Hellman Problem. 464-468 - Xu An Wang, Liqiang Wu, Jinting Nie, Wei Wang:
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. 469-472 - Xiaoming Hu, WenAn Tan, Cunli Jiang:
Cryptanalysis and Improvement of HIBS without Random Oracle. 473-476 - Fengli Zhang, Qinyi Li, Hu Xiong:
Efficient Revocable Key-Policy Attribute Based Encryption with Full Security. 477-481 - Sheng Li, Dawu Gu, Zhouqian Ma, Zhiqiang Liu:
Fault Analysis of the Piccolo Block Cipher. 482-486 - Zhouqian Ma, Dawu Gu:
Improved Differential Fault Analysis of SOSEMANUK. 487-491 - Tao Shi, Wei Wang, Qiuliang Xu:
Improved Impossible Differential Cryptanalysis of SMS4. 492-496 - Wei Gao, Zhenyou Wang, Fei Li:
On Generic Construction for Private Designated Verifier Signatures. 497-499 - Wei Gao, Zhenyou Wang:
One-round Tripartite Authenticated Batch-Keys Agreement Protocol from Paring. 500-502 - Yingni Duan, Haifeng Zhang, Hong Lv, Junchu Fang:
Research on the First Class M Subsequence. 503-506 - Xu An Wang, Jinting Nie, Wei Wang:
Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes. 507-510 - Jie Yu, Qingqi Pei:
A Multi-server Architecture Authentication Protocol Using Smart Card. 511-515 - Minda Yu, Qiuliang Xu:
A Simple and Effective Scheme of Ciphertext-Policy ABE. 516-519 - Qiang Li, Ligu Zhu, Saifeng Zeng, Wenqian Shang:
An Improved File System Synchronous Algorithm. 520-524 - Xingxiang Liu:
Constitution of Linear Combinations of Idempotent Matrices and its Properties. 525-529 - Mengmeng Ling, Liji Wu, Xiangyu Li, Xiangmin Zhang, Jinsong Hou, Yong Wang:
Design of Monitor and Protect Circuits against FIB Attack on Chip Security. 530-533 - Ying Cao, Jiachen Liu, Qiguang Miao, Weisheng Li:
Osiris: A Malware Behavior Capturing System Implemented at Virtual Machine Monitor Layer. 534-538 - Pekka Jäppinen:
Probabilistic Authentication with Very Lightweight Short Hash. 539-543 - Yichun Peng, Yi Niu, Qiwei Hu:
Research on Intrusion Detection System Based on IRBF. 544-548 - Fan Sheng-Li, Mei Yu, Gangyi Jiang, Feng Shao, Zongju Peng:
A Digital Watermarking Algorithm Based on Region of Interest for 3D Image. 549-552 - Awad Kh. Al-Asmari, Ahmed S. Salama, Abdullah M. Iliyasu, Mohammed A. Al-Qodah:
A DWT Ordering Scheme for Hiding Data in Images Using Pixel Value Difference. 553-557 - Nan Luo, Quan Wang, Kefeng Zhang:
A Print-Scan Modeling Scheme Based on BP Neural Network. 558-562 - Tiancheng Zhang, Yifang Yin, Dejun Yue, Qian Ma, Ge Yu:
A Simulation Platform for RFID Application Deployment Supporting Multiple Scenarios. 563-567 - Yetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:
Constructing the On/Off Covert Channel on Xen. 568-572 - Ruimei Wang, Shengxiong Wang, Tianzhen Wu, Xiling Zhang:
Customers E-trust for Online Retailers: A Case in China. 573-577 - Lin Liu, Kun Jia:
Detecting Spam in Chinese Microblogs - A Study on Sina Weibo. 578-581 - Hailin Hao, Shenghui Su:
Digital Copyright Protection Scheme Based on JUNA Lightweight Digital Signatures. 582-586 - Weimin Wei, Liping Sun:
Innovative Teaching and Learning Experiences in Network Attacks and Defense. 587-590 - Yinping Zhou, Yulong Shen, Qingqi Pei, Xining Cui, Yahui Li:
Security Information Flow Control Model and Method in MILS. 591-595 - Xiaodong Ding, Quan Wang, Pengfei Yang, Haijing Zhou, Yuyan Huang, Haitao Weng, Zhongbin Pan:
Security System for Internal Network Printing. 596-600 - Liping Chen:
Services Selection of QoS-based Skyline Computation for Web Service Composition. 601-604 - (Withdrawn) Services Selection of Transactional Property for Web Service Composition. 605-608
- Weiquan Xian, Houkui Wang, Haoyi He, Donghong Zheng:
The Analysis of University Network Information Security System Based on Level Protection Model. 609-614 - Lanxiang Chen, Zhen Peng:
The Design Principles for User-centered Remote Data Possession Checking. 615-618 - Jianlan Guo, Yuqiang Chen, Chongjie Dong:
The development and implementation of a network-faxing service system. 619-622 - Dongliang Xue, Xiaolong Wu, Yunwei Gao, Ying Song, Xinhui Tian, Zhaopeng Li:
TrustVP: Construction and Evolution of Trusted Chain on Virtualization Computing Platform. 623-630 - Congli Wang, Zhibin Chen, Mingxi Xue, Chao Zhang:
A Novel Blind Evaluation Method on Image Scrambling Degree. 631-635 - Yang Cai, Qiuliang Xu, Zhihua Zheng:
A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme. 636-640 - Anh-Tu Hoang, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
An Indexed Bottom-up Approach for Publishing Anonymized Data. 641-645 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem. 646-652 - Jun Guo, Liji Wu, Xiangming Zhang, Xiangyu Li:
Design and Implementation of a Fault Attack Platform for Smart IC Card. 653-656 - Litao Wang, Changlin Zhou, Bin Yu:
Laboratory Test and Mechanism Analysis on Electromagnetic Compromising Emanations of PS/2 Keyboard. 657-660 - Yan Cao, Qiang Wei, Qingxian Wang:
The Method for Parallel Approach to Sensitive Point Based on Dynamic Symbolic Execution. 661-665 - Jie Cui, Qiaoyan Wen:
Analysis on Operating Mechanism of SecurityKISS. 666-669 - Lu Zhang, Qingqi Pei, Hongning Li:
Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network. 670-673 - Fen Li, Tong Li, Chunrui Zhang, Yong Wang, Jiang Song:
Length Identification of Unknown Data Frame. 674-677 - Huixian Li, Jinshun Hu, Liwei He, Liaojun Pang:
Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard. 678-682 - Yong Zeng, Xin Wang, Lihua Dong, Jianfeng Ma, Zhihong Liu:
Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks. 683-686 - Tao Wen, Zhengfeng Ming, Mengchu Zhou:
Adaptive Finite Element Analysis in the Application of Electromagnetic Mechanics. 687-689 - Jing Wang, Xiao Zhi Gao, Jarno M. A. Tanskanen, Ping Guo:
Epileptic EEG Signal Classification with ANFIS Based on Harmony Search Method. 690-694 - Jianlan Guo, Yijun Liu, Yuqiang Chen:
Research on reliable on-chip network using asynchronous logic. 695-698 - Yibo Li, Jian-Qiang Peng, Rui Wang, Bang-Hong Zhao:
The Comparison of Individual Differences in Occupational Differentiation of Peasants in China - The Perspective Based on Differences in Degree of Specialization. 699-703
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.