Search dblp for Publications

export results for "toc:db/conf/cis/cis2009-1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cis/AnLZ09,
  author       = {Yaozu An and
                  Yao Lu and
                  Hong Zhao},
  title        = {Neighborhood-Based Weighted Regularization of Video Sequence Super-Resolution},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {146--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.188},
  doi          = {10.1109/CIS.2009.188},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/AnLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/BaiQC09,
  author       = {Runbo Bai and
                  Xiumei Qiu and
                  Maosen Cao},
  title        = {Factor Sensitivity Analysis for Multivariable Systems Using Bayesian
                  Neural Networks},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {30--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.43},
  doi          = {10.1109/CIS.2009.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/BaiQC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Bo09,
  author       = {Zhao Bo},
  title        = {Predicting Fiber Diameter of Polypropylene {(PP)} Spunbonding Nonwovens
                  Process: {A} Comparison Between Physical and Artifical Neural Network
                  Methods},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {639--642},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.129},
  doi          = {10.1109/CIS.2009.129},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Bo09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CaiW09,
  author       = {Jian{-}hu Cai and
                  Li{-}Ping Wang},
  title        = {Study on Dynamic Game Models in a Two-Echelon Supply Chain},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {138--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.145},
  doi          = {10.1109/CIS.2009.145},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CaiW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CaoLGL09,
  author       = {Jian Cao and
                  Kan Li and
                  Chunxiao Gao and
                  Qiongxin Liu},
  title        = {Efficient Object Recognition Using Corner Features},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {344--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.201},
  doi          = {10.1109/CIS.2009.201},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CaoLGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CaoM09,
  author       = {Zhengjun Cao and
                  Olivier Markowitch},
  title        = {Different Authentication Properties and a Signcryption Scheme Revisited},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {395--399},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.61},
  doi          = {10.1109/CIS.2009.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CaoM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CaoMZ09,
  author       = {Li Cao and
                  Lequan Min and
                  Hongyan Zang},
  title        = {A Chaos-Based Pseudorandom Number Generator and Performance Analysis},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {494--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.203},
  doi          = {10.1109/CIS.2009.203},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CaoMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChaoT09,
  author       = {Rui Chao and
                  Ying Tan},
  title        = {A Virus Detection System Based on Artificial Immune System},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {6--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.106},
  doi          = {10.1109/CIS.2009.106},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChaoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Chen09,
  author       = {Dingjun Chen},
  title        = {The Close-Degree of Covering Rough Sets},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {176--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.94},
  doi          = {10.1109/CIS.2009.94},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Chen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenSY09,
  author       = {Cai{-}Kou Chen and
                  Jun Shi and
                  Yiming Yu},
  title        = {Locally Supervised Discriminant Analysis in Kernel Space},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {358--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.153},
  doi          = {10.1109/CIS.2009.153},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ChenSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenWD09,
  author       = {Chao Chen and
                  Ke Wang and
                  Yiqi Dai},
  title        = {A Novel Architecture for Enterprise Network Security},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {537--541},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.141},
  doi          = {10.1109/CIS.2009.141},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChengCZY09,
  author       = {Xiangran Cheng and
                  Xingyuan Chen and
                  Bin Zhang and
                  Yan Yang},
  title        = {An Algebra for Composing Access Control Policies in Grid},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {526--530},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.190},
  doi          = {10.1109/CIS.2009.190},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChengCZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChengZYM09,
  author       = {Jiujun Cheng and
                  Fan Zhang and
                  Kuifei Yu and
                  Jian Ma},
  title        = {The Dynamic and Double Encryption System Based on Two-Dimensional
                  Image},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {458--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.65},
  doi          = {10.1109/CIS.2009.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChengZYM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChiLWF09,
  author       = {Yaping Chi and
                  Zhaobin Li and
                  Zhonghua Wang and
                  Yong Fang},
  title        = {An Improved Bytecode Verification Algorithm on Java Card},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {552--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.193},
  doi          = {10.1109/CIS.2009.193},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChiLWF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Deng09,
  author       = {Xiuqin Deng},
  title        = {System Identification Based on Particle Swarm Optimization Algorithm},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {259--263},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.167},
  doi          = {10.1109/CIS.2009.167},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Deng09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DingCX09,
  author       = {Jianli Ding and
                  Tantan Chen and
                  Tao Xu},
  title        = {Propagated Analysis of Airport Delays Based on Timed Petri Nets},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {608--614},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.256},
  doi          = {10.1109/CIS.2009.256},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DingCX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DingHY09,
  author       = {Xue{-}wen Ding and
                  Wen{-}Zhang He and
                  Zhao{-}Xuan Yang},
  title        = {Error Concealment Method for Embedded Wavelet codec},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {603--607},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.169},
  doi          = {10.1109/CIS.2009.169},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DingHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DongW09,
  author       = {Ning Dong and
                  Yuping Wang},
  title        = {Multiobjective Differential Evolution Based on Opposite Operation},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {123--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.166},
  doi          = {10.1109/CIS.2009.166},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DongW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/EstradaNS09,
  author       = {Veronica C. Estrada and
                  Akihiro Nakao and
                  Enrique Carlos Segura},
  title        = {Classifying Computer Session Data Using Self-Organizing Maps},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {48--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.266},
  doi          = {10.1109/CIS.2009.266},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/EstradaNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FanCY09,
  author       = {Yiming Fan and
                  Qingzhang Chen and
                  Jianjun Yu},
  title        = {Topology Control Algorithm Based on Bottleneck Node for Large-Scale
                  WSNs},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {592--597},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.11},
  doi          = {10.1109/CIS.2009.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FanCY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FanHL09,
  author       = {Yang Fan and
                  Shuping He and
                  Fei Liu},
  title        = {PD-Type Sampled-Data Iterative Learning Control for Nonlinear Systems
                  with Time Delays and Uncertain Disturbances},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {201--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.211},
  doi          = {10.1109/CIS.2009.211},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FanHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GanHDV09,
  author       = {Zaobin Gan and
                  Juxia He and
                  Qian Ding and
                  Vijay Varadharajan},
  title        = {Trust Relationship Modelling in E-commerce-Based Social Network},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {206--210},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.184},
  doi          = {10.1109/CIS.2009.184},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GanHDV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoFZZ09,
  author       = {Feng Gao and
                  Weiming Fu and
                  YiPing Zhong and
                  Danfeng Zhao},
  title        = {Large-Scale Hierarchical Text Classification Based on Path Semantic
                  Vector and Prior Information},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {54--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.38},
  doi          = {10.1109/CIS.2009.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoFZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoW09,
  author       = {Yuelin Gao and
                  Miaomiao Wang},
  title        = {Improved Differential Evolution Algorithm with Random Migration Operator},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {92--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.56},
  doi          = {10.1109/CIS.2009.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoWLC09,
  author       = {Wei Gao and
                  Zhenyou Wang and
                  Fei Li and
                  Li'e Chen},
  title        = {An Efficient Threshold Signature Scheme Without Random Oracles},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {400--404},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.40},
  doi          = {10.1109/CIS.2009.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoWLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GeHW09,
  author       = {Weiqing Ge and
                  Shisheng Huang and
                  Kaiyuan Wu},
  title        = {The Development and Implementation of Rapid {CRC} Algorithm on Tandem
                  Welding System},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {658--661},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.22},
  doi          = {10.1109/CIS.2009.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GeHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuanZL09,
  author       = {Zhijin Guan and
                  Yiqing Zhang and
                  Yanming Lu},
  title        = {Reversible Logic Gate Cascade Network Based on Series Connection},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {468--472},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.19},
  doi          = {10.1109/CIS.2009.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuanZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoC09,
  author       = {Li Guo and
                  Xu Chen},
  title        = {A Novel Particle Swarm Optimization Based on the Self-Adaptation Strategy
                  of Acceleration Coefficients},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {277--281},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.91},
  doi          = {10.1109/CIS.2009.91},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoS09,
  author       = {Rong Guo and
                  Dongchen Shi},
  title        = {Prediction of {C3} Concentration in {FCCU} Using Neural Estimator
                  Based on Dynamic {PCA}},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {34--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.242},
  doi          = {10.1109/CIS.2009.242},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HeGX09,
  author       = {Zhiwei He and
                  Mingyu Gao and
                  Jie Xu},
  title        = {EKF-Ah Based State of Charge Online Estimation for Lithium-ion Power
                  Battery},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {142--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.47},
  doi          = {10.1109/CIS.2009.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HeGX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HeM09,
  author       = {Wenzhang He and
                  Yunfei Ma},
  title        = {Clarity Algorithm of Images in the Fog and Application},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {583--586},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.33},
  doi          = {10.1109/CIS.2009.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HeM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuW09,
  author       = {Xuanzi Hu and
                  Jiafu Wan},
  title        = {Studying of Data Centre Architecture for Prefecture-level City},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {42--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.14},
  doi          = {10.1109/CIS.2009.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuZS09,
  author       = {Xiaoming Hu and
                  Zhe Zhang and
                  Taozhi Si},
  title        = {ID-Based Proxy Re-Encryption Schemes Without Random Oracle},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {428--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.123},
  doi          = {10.1109/CIS.2009.123},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuaCB09,
  author       = {Zhang Hua and
                  Wang Cheng and
                  Ren Bo},
  title        = {The New Registration Method Used in {ARDK}},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {653--657},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.200},
  doi          = {10.1109/CIS.2009.200},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuaCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuangCLX09,
  author       = {Dazu Huang and
                  Zhigang Chen and
                  Xin Li and
                  Jianquan Xie},
  title        = {Deterministic Secure Bidirectional Quantum Communication},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {391--394},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.177},
  doi          = {10.1109/CIS.2009.177},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuangCLX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiH09,
  author       = {Dong{-}Jiang Ji and
                  Wen{-}Zhang He},
  title        = {The Correction {SART} Algorithm Based on Circular Symmetrical Object},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {151--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.115},
  doi          = {10.1109/CIS.2009.115},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiLSN09,
  author       = {Liping Ji and
                  Haijin Liang and
                  Yitao Song and
                  Xiamu Niu},
  title        = {A Normal-Traffic Network Covert Channel},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {499--503},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.156},
  doi          = {10.1109/CIS.2009.156},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiLSN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiaW09,
  author       = {Liping Jia and
                  Yuping Wang},
  title        = {A Genetic Algorithm for Multiobjective Bilevel Convex Optimization
                  Problems},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {98--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.37},
  doi          = {10.1109/CIS.2009.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiaW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiangMZ09,
  author       = {Min Jiang and
                  Zhiqing Meng and
                  Gengui Zhou},
  title        = {A New Support Vector Machine Model Based on the Discrete Conditional
                  Value-at-Risk},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {188--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.66},
  doi          = {10.1109/CIS.2009.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiangMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JieWLS09,
  author       = {Longmei Jie and
                  Hui Wang and
                  DeRong Li and
                  GuoQiang Shao},
  title        = {Proof of Two Kinds of Fingerprint Feature Extraction {CNN}},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {307--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.69},
  doi          = {10.1109/CIS.2009.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JieWLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JundingH09,
  author       = {Sun Junding and
                  Xu Heli},
  title        = {Contour-Shape Recognition and Retrieval Based on Chain Code},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {349--352},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.67},
  doi          = {10.1109/CIS.2009.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JundingH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/KongZYYYS09,
  author       = {Hongbin Kong and
                  Zhengquan Zeng and
                  Lijun Yan and
                  Jicheng Yang and
                  Shaowen Yao and
                  Nuoya Sheng},
  title        = {Combine Elliptic Curve Cryptography with Digital Watermark for OWL-Based
                  Ontology Encryption},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {511--515},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.99},
  doi          = {10.1109/CIS.2009.99},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/KongZYYYS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiL09,
  author       = {Xuchao Li and
                  Dongsheng Liu},
  title        = {Object Detection and Tracking Using Spatiotemporal Wavelet Domain
                  Markov Random Field in Video},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {165--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.13},
  doi          = {10.1109/CIS.2009.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiLH09,
  author       = {Rong{-}Hua Li and
                  Zhiping Luo and
                  Guoqiang Han},
  title        = {Pseudo-inverse Locality Preserving Projections},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {363--367},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.157},
  doi          = {10.1109/CIS.2009.157},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZLL09,
  author       = {Xudong Li and
                  Chunxia Zhang and
                  Xing Lin and
                  Shuguang Lin},
  title        = {{VAD:} {A} Detail Investigation into Process's Memory},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {531--536},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.130},
  doi          = {10.1109/CIS.2009.130},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Liu09,
  author       = {Yulan Liu},
  title        = {An Approach for a Class of Bilevel Multiobjective Programming Problem},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {128--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.139},
  doi          = {10.1109/CIS.2009.139},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Liu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuC09,
  author       = {Lihua Liu and
                  Zhengjun Cao},
  title        = {Analysis of Two Signature Schemes from CIS'2006},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {405--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.62},
  doi          = {10.1109/CIS.2009.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuF09,
  author       = {Jianhua Liu and
                  Xiaoping Fan},
  title        = {The Analysis and Improvement of Binary Particle Swarm Optimization},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {254--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.261},
  doi          = {10.1109/CIS.2009.261},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuFWD09,
  author       = {Yan Liu and
                  Lei Fan and
                  Yuping Wang and
                  Qianli Dong},
  title        = {Optimization of Logistics Nodes in Dynamic Location with a Multi-objective
                  Evolutionary Algorithm},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {133--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.101},
  doi          = {10.1109/CIS.2009.101},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuFWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuLZHZS09,
  author       = {Xintian Liu and
                  Changhong Liu and
                  Lihui Zhao and
                  Hu Huang and
                  Xiaoyong Zhao and
                  Xinyi Sun},
  title        = {The Finite Element Method Appling in the Flow Forming},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {556--558},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.202},
  doi          = {10.1109/CIS.2009.202},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuLZHZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuSHZ09,
  author       = {Pengzhang Liu and
                  Tingzhi Shen and
                  Yu Hu and
                  Sanyuan Zhao},
  title        = {Face Recognition Using Modular Locality Preserving Projections},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {320--324},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.119},
  doi          = {10.1109/CIS.2009.119},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuSHZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuWD09,
  author       = {Dalian Liu and
                  Xinfeng Wang and
                  Jinling Du},
  title        = {A Clustering-Based Evolutionary Algorithm for Traveling Salesman Problem},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {118--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.80},
  doi          = {10.1109/CIS.2009.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuYC09,
  author       = {Xin Liu and
                  Xinge You and
                  Yiu{-}ming Cheung},
  title        = {Texture Image Retrieval Using Non-separable Wavelets and Local Binary
                  Patterns},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {287--291},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.181},
  doi          = {10.1109/CIS.2009.181},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuYC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MaZZW09,
  author       = {Liling Ma and
                  Zhao Zhang and
                  Xiaohang Zhou and
                  Junzheng Wang},
  title        = {A Novel Classification Method Based on Artificial Immune System and
                  Quantum Mechanics Theory},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {11--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.138},
  doi          = {10.1109/CIS.2009.138},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MaZZW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MaoCX09,
  author       = {Ming Mao and
                  Shaohui Chen and
                  Jin Xu},
  title        = {Construction of the Initial Structure for Preimage Attack of {MD5}},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {442--445},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.214},
  doi          = {10.1109/CIS.2009.214},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MaoCX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MaoLYHGL09,
  author       = {Cunli Mao and
                  Lina Li and
                  Zhengtao Yu and
                  Lu Han and
                  Jianyi Guo and
                  Xiong{-}Li Lei},
  title        = {Research on Answer Extraction Method for Domain Question Answering
                  System(QA)},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {79--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.173},
  doi          = {10.1109/CIS.2009.173},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MaoLYHGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MiaoWD09,
  author       = {Hongxia Miao and
                  Honghua Wang and
                  Zhixiang Deng},
  title        = {Quantum Genetic Algorithm and its Application in Power System Reactive
                  Power Optimization},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {107--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.133},
  doi          = {10.1109/CIS.2009.133},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MiaoWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MouZPZF09,
  author       = {Xiaozheng Mou and
                  Wuneng Zhou and
                  Lin Pan and
                  Qingyu Zhu and
                  Jian{-}An Fang},
  title        = {Lag Synchronization of Uncertain Chaotic Neural Networks with Mixed
                  Time-Varying Delays Based on Adaptive Control},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {222--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.46},
  doi          = {10.1109/CIS.2009.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MouZPZF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NaYX09,
  author       = {Na Wang and
                  Yunjin Wang and
                  Xia Li},
  title        = {A Novel Robust Watermarking Algorithm Based on {DWT} and {DCT}},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {437--441},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.135},
  doi          = {10.1109/CIS.2009.135},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NaYX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NiZR09,
  author       = {Jianjun Ni and
                  Chuanbiao Zhang and
                  Li Ren},
  title        = {An Intelligent Decision Support System of Lake Water Pollution Control
                  Based on Multi-agent Model},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {217--221},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.79},
  doi          = {10.1109/CIS.2009.79},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NiZR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NiuYLZ09,
  author       = {Wenxue Niu and
                  Yajuan Yang and
                  Xiao Luo and
                  Quanju Zhang},
  title        = {Research on the Evolution of Supply Chain Based on {SWARM}},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {292--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.114},
  doi          = {10.1109/CIS.2009.114},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NiuYLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PengCW09,
  author       = {Le Peng and
                  Zhi Cai and
                  Guowen Wu},
  title        = {Predict Ranking of Object Summaries with Hidden Markov Model},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {88--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.154},
  doi          = {10.1109/CIS.2009.154},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PengCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PengZW09,
  author       = {Zhao{-}yi Peng and
                  Yu Zhou and
                  Ping Wang},
  title        = {Multi-pose Face Detection Based on Adaptive Skin Color and Structure
                  Model},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {325--329},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.143},
  doi          = {10.1109/CIS.2009.143},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PengZW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/QiC09,
  author       = {Chengming Qi and
                  Xusheng Chen},
  title        = {A New Digital Proxy Signature Scheme Based on {ECDLP}},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {473--477},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.42},
  doi          = {10.1109/CIS.2009.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/QiC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/QiLJ09,
  author       = {Yutao Qi and
                  Fang Liu and
                  Licheng Jiao},
  title        = {A Parallel Artificial Immune Model for Optimization},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {20--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.118},
  doi          = {10.1109/CIS.2009.118},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/QiLJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/QinLL09,
  author       = {Guang Qin and
                  Feng Liu and
                  Lijuan Li},
  title        = {A Quick Group Search Optimizer with Passive Congregation and its Convergence
                  Analysis},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {249--253},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.100},
  doi          = {10.1109/CIS.2009.100},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/QinLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/QiuZ09,
  author       = {Ying Qiu and
                  Huafei Zhu},
  title        = {Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose
                  Mechanism},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {446--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.39},
  doi          = {10.1109/CIS.2009.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/QiuZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Ren09,
  author       = {Haizhen Ren},
  title        = {On Orderings of Some Graphs by the Extreme Roots of their Graph Polynomials},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {272--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.87},
  doi          = {10.1109/CIS.2009.87},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Ren09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/RodriguezY09,
  author       = {Nibaldo Rodr{\'{\i}}guez and
                  Eleuterio Ya{\~{n}}ez},
  title        = {Wavelet Smoothing Based Multivariate Polynomial for Anchovy Catches
                  Forecasting},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {38--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.224},
  doi          = {10.1109/CIS.2009.224},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/RodriguezY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SantosP09,
  author       = {Gil Melfe Mateus Santos and
                  Hugo Pedro Martins Carrico Proen{\c{c}}a},
  title        = {On the Role of Interpolation in the Normalization of Non-ideal Visible
                  Wavelength Iris Images},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {315--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.113},
  doi          = {10.1109/CIS.2009.113},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SantosP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Shao09,
  author       = {Xiao{-}dong Shao},
  title        = {The Application of Improved 3D{\_}Apriori Three-Dimensional Association
                  Rules Algorithm in Reservoir Data Mining},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {64--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.95},
  doi          = {10.1109/CIS.2009.95},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Shao09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShaoZLLG09,
  author       = {Hui Shao and
                  Hailin Zou and
                  Yincheng Liang and
                  Wenjun Li and
                  Qian Gao},
  title        = {Time Scale Estimation Method Based on Anisotropic Diffusion},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {624--628},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.27},
  doi          = {10.1109/CIS.2009.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShaoZLLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShaoZS09,
  author       = {Hua Shao and
                  Xinglan Zhang and
                  Feng Shao},
  title        = {Cryptanalysis of Short Signature Scheme Without Random Oracles Assumption},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {414--417},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.26},
  doi          = {10.1109/CIS.2009.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShaoZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShenMB09,
  author       = {Yun Shen and
                  Trevor P. Martin and
                  Pete Bramhall},
  title        = {Intelligent Security Data Analysis},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {74--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.10},
  doi          = {10.1109/CIS.2009.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShenMB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShiYXZ09,
  author       = {Bingxia Shi and
                  Na Yu and
                  Jia Xu and
                  Quanming Zhao},
  title        = {Extraction and Recognition Alphabetic and Digital Characters on Industrial
                  Containers},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {340--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.197},
  doi          = {10.1109/CIS.2009.197},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShiYXZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SongHHGLL09,
  author       = {Jinling Song and
                  Liming Huang and
                  Qi He and
                  Yan Gao and
                  Xin Liu and
                  Yuxiang Li},
  title        = {Preserving FDs in K-Anonymization by K-MSDs and Association Generalization},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {565--569},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.142},
  doi          = {10.1109/CIS.2009.142},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SongHHGLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SongW09,
  author       = {Chengtian Song and
                  Keyong Wang},
  title        = {Image Target Detection Using Morphological Neural Network},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {234--236},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.259},
  doi          = {10.1109/CIS.2009.259},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SongW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SunX09,
  author       = {Xiaoli Sun and
                  Chen Xu},
  title        = {Image Denoising and Inpainting Model Based on Taylor Expansion},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {666--670},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.120},
  doi          = {10.1109/CIS.2009.120},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SunX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Tan09,
  author       = {Zuowen Tan},
  title        = {An Improved Identity-Based Group Signature Scheme},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {423--427},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.53},
  doi          = {10.1109/CIS.2009.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Tan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Tian09,
  author       = {Yuan Tian},
  title        = {Discovering Temporal Similarity Pattern Based on Metamorphosis Data},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {59--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.71},
  doi          = {10.1109/CIS.2009.71},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Tian09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TianGZ09,
  author       = {Jingwen Tian and
                  Meijuan Gao and
                  Shi{-}Ru Zhou},
  title        = {The Research of Building Logistics Cost Forecast Based on Regression
                  Support Vector Machine},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {648--652},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.252},
  doi          = {10.1109/CIS.2009.252},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TianGZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TianZWW09,
  author       = {Yun Tian and
                  Mingquan Zhou and
                  Zhongke Wu and
                  Xingce Wang},
  title        = {A Region-Based Active Contour Model for Image Segmentation},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {376--380},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.238},
  doi          = {10.1109/CIS.2009.238},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TianZWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TranNT09,
  author       = {Bao Ngoc Tran and
                  Thuc Dinh Nguyen and
                  Tran Dan Thu},
  title        = {A New S-Box Structure Based on Graph Isomorphism},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {463--467},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.110},
  doi          = {10.1109/CIS.2009.110},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TranNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangC09,
  author       = {Taijun Wang and
                  Yiu{-}ming Cheung},
  title        = {A Locally Gaussian Mixture Based {RBF} Network for Classification
                  of Chinese Herbal Infrared Spectrum Fingerprint},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {381--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.272},
  doi          = {10.1109/CIS.2009.272},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangGCL09,
  author       = {Zhenyou Wang and
                  Wei Gao and
                  Li'e Chen and
                  Fei Li},
  title        = {Perfect Subliminal Channel in a Paring-Based Digital Signature},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {455--457},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.24},
  doi          = {10.1109/CIS.2009.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangGCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangHL09,
  author       = {Fulong Wang and
                  Cheng Huang and
                  Xiaoliang Liu},
  title        = {A Fusion of Face Symmetry of Two-Dimensional Principal Component Analysis
                  and Face Recognition},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {368--371},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.223},
  doi          = {10.1109/CIS.2009.223},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangHW09,
  author       = {Jiayao Wang and
                  Bin Hu and
                  Quanlai Wang},
  title        = {The Walsh Spectrum Property of Resilient Boolean Functions},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {409--413},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.21},
  doi          = {10.1109/CIS.2009.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangHWC09,
  author       = {Baohua Wang and
                  Hejiang Huang and
                  Xiaolong Wang and
                  Wensheng Chen},
  title        = {An Ontology-Based {NLP} Approach to Semantic Annotation of Annual
                  Report},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {180--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.269},
  doi          = {10.1109/CIS.2009.269},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangHWC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangL09,
  author       = {Mingqiang Wang and
                  Leibo Li},
  title        = {A Note on Twin Diffie-Hellman Problem},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {451--454},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.160},
  doi          = {10.1109/CIS.2009.160},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangLH09,
  author       = {Fulong Wang and
                  Xiaoliang Liu and
                  Cheng Huang},
  title        = {An Improved Kernel Fisher Discriminant Analysis for Face Recognition},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {353--357},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.255},
  doi          = {10.1109/CIS.2009.255},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangSD09,
  author       = {Peizhen Wang and
                  Lei Shi and
                  Hengzhi Dong},
  title        = {Feature Extraction and Matching for Plant Images},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {155--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.247},
  doi          = {10.1109/CIS.2009.247},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangSD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangWACLY09,
  author       = {Qingzhu Wang and
                  Ke Wang and
                  Donghong An and
                  Bo Chen and
                  Miao Liu and
                  Yingying Ying},
  title        = {Extracting the Coronary Artery in Angiographic Image Based on a Trous
                  Wavelet of Rotary Gaussian with Adaptive Space Coefficient},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {160--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.239},
  doi          = {10.1109/CIS.2009.239},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangWACLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangZB09,
  author       = {Zhiming Wang and
                  Li Zhang and
                  Hong Bao},
  title        = {{PNN} Based Motion Detection with Adaptive Learning Rate},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {301--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.178},
  doi          = {10.1109/CIS.2009.178},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangZB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangZTH09,
  author       = {Wei Wang and
                  Pengtao Zhang and
                  Ying Tan and
                  Xingui He},
  title        = {A Hierarchical Artificial Immune Model for Virus Detection},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.57},
  doi          = {10.1109/CIS.2009.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangZTH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangZWM09,
  author       = {Fangwei Wang and
                  Yunkai Zhang and
                  Changguang Wang and
                  Jianfeng Ma},
  title        = {Predators Combat Good Point Set Scanning-Based Self-Learning Worms},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {418--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.20},
  doi          = {10.1109/CIS.2009.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangZWM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WeiZLL09,
  author       = {Zhi Wei and
                  Jianhua Zhang and
                  Nan Li and
                  Xu Li},
  title        = {Computation Model of Machining Mechanics of Glass Micromilling},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {587--591},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.183},
  doi          = {10.1109/CIS.2009.183},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/WeiZLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuCZD09,
  author       = {Bei Wu and
                  Xing{-}yuan Chen and
                  Yong{-}fui Zhang and
                  Xiang{-}dong Dai},
  title        = {An Extensible Intra Access Control Policy Conflict Detection Algorithm},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {483--488},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.248},
  doi          = {10.1109/CIS.2009.248},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuCZD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuL09,
  author       = {Xiao{-}Li Wu and
                  Yan{-}Kui Liu},
  title        = {Measuring the Spread of Fuzzy Variable by {L-S} Integral},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {296--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.105},
  doi          = {10.1109/CIS.2009.105},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuLZL09,
  author       = {Liming Wu and
                  Junxiu Liu and
                  Ji Zhang and
                  Yuling Luo},
  title        = {The Intelligent Reconfigurable Measuring Node Based on Wireless Access
                  Network},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {570--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.73},
  doi          = {10.1109/CIS.2009.73},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuLZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuMNWQH09,
  author       = {Di Wu and
                  Tianyun Ma and
                  Pengcheng Nie and
                  Zhiping Wang and
                  Zhengjun Qiu and
                  Yong He},
  title        = {Use of In-Situ Visible and Near-Infrared Spectroscopy for Non-invasive
                  Discrimination of Spirulina Platensis},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {330--334},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.277},
  doi          = {10.1109/CIS.2009.277},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuMNWQH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuZG09,
  author       = {Jiansheng Wu and
                  Jie Zhou and
                  Yuelin Gao},
  title        = {Support Vector Regression Based on Particle Swarm Optimization and
                  Projection Pursuit Technology for Rainfall Forecasting},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {227--233},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.31},
  doi          = {10.1109/CIS.2009.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuZG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XiaoHWLC09,
  author       = {Su Xiao and
                  Guoqiang Han and
                  Yan Wo and
                  Zhan Li and
                  Xiangji Chen},
  title        = {Fast Parameter Estimation in Image Restoration Based on Hierarchical
                  Bayesian Framework},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {372--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.192},
  doi          = {10.1109/CIS.2009.192},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XiaoHWLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XieLL09,
  author       = {Haobin Xie and
                  Feng Liu and
                  Lijuan Li},
  title        = {A Topology Optimization for Truss Based on Improved Group Search Optimizer},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {244--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.102},
  doi          = {10.1109/CIS.2009.102},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XieLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XingGC09,
  author       = {Lixin Xing and
                  Shanqing Gao and
                  Yunfei Chen},
  title        = {A Novel Control Method Based on Fuzzy Neural Network},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {237--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.132},
  doi          = {10.1109/CIS.2009.132},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XingGC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XuFAZ09,
  author       = {Chen Xu and
                  Jianwen Feng and
                  Francis R. Austin and
                  Weiqiang Zhang},
  title        = {Adaptive Synchronization Between Hyperchaotic Lorenz System and Chen
                  System},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {662--665},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.122},
  doi          = {10.1109/CIS.2009.122},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XuFAZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XuLW09,
  author       = {Baoliang Xu and
                  Wenjian Luo and
                  Xufa Wang},
  title        = {A Preliminary Study on Why Using the Nonself Detector Set for Anomaly
                  Detection in Artificial Immune Systems},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {559--564},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.165},
  doi          = {10.1109/CIS.2009.165},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XuLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XuYL09,
  author       = {Bingxin Xu and
                  Qian Yin and
                  Guangjun Lv},
  title        = {Using {SVM} to Organize the Image Database},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {184--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.51},
  doi          = {10.1109/CIS.2009.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XuYL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YanL09,
  author       = {Ziye Yan and
                  Yao Lu},
  title        = {Super Resolution of {MRI} Using Improved {IBP}},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {643--647},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.59},
  doi          = {10.1109/CIS.2009.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YanL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangHX09,
  author       = {Bo Yang and
                  Zhengming Hu and
                  Zibi Xiao},
  title        = {Efficient Certificateless Strong Designated Verifier Signature Scheme},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {432--436},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.191},
  doi          = {10.1109/CIS.2009.191},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangHX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangLS09,
  author       = {Shengyi Yang and
                  Kunqin Li and
                  Jiao Shi},
  title        = {Design and Simulation of the Longitudinal Autopilot of {UAV} Based
                  on Self-Adaptive Fuzzy {PID} Control},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {634--638},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.253},
  doi          = {10.1109/CIS.2009.253},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangMM09,
  author       = {Kai Yang and
                  Jian{-}Feng Ma and
                  Zi{-}hui Miao},
  title        = {Hybrid Routing Protocol for Wireless Mesh Network},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {547--551},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.48},
  doi          = {10.1109/CIS.2009.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangWW09,
  author       = {Bo Yang and
                  Yong{-}gang Wu and
                  Cheng Wang},
  title        = {A Multi-agent and {GIS} Based Simulation for Emergency Evacuation
                  in Park and Public Square},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {211--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.234},
  doi          = {10.1109/CIS.2009.234},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangXJ09,
  author       = {Jiadong Yang and
                  Hua Xu and
                  Peifa Jia},
  title        = {Task Scheduling for Heterogeneous Computing Based on Bayesian Optimization
                  Algorithm},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {112--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.163},
  doi          = {10.1109/CIS.2009.163},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangXJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YayaH09,
  author       = {Soumah Yaya and
                  Wang Honghua},
  title        = {Research on Reduction of Commutation Torque Ripple in Brushless {DC}
                  Motor Drives Based on Fuzzy Logic Control},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {240--243},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.158},
  doi          = {10.1109/CIS.2009.158},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YayaH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Ye09,
  author       = {Chengfu Ye},
  title        = {Minimal Merrifield-Simmons Index of 5-leaf-trees},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {264--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.89},
  doi          = {10.1109/CIS.2009.89},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Ye09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YuY09,
  author       = {Kun Yu and
                  Yunyang Yan},
  title        = {Reputation Measure for Incentive-Compatible Packet Forwarding in Ad
                  Hoc Networks},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {542--546},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.268},
  doi          = {10.1109/CIS.2009.268},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YuY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZamaniMEP09,
  author       = {Mahdi Zamani and
                  Mahnush Movahedi and
                  Mohammad Mehdi Ebadzadeh and
                  Hossein Pedram},
  title        = {A DDoS-Aware {IDS} Model Based on Danger Theory and Mobile Agents},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {516--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.215},
  doi          = {10.1109/CIS.2009.215},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZamaniMEP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZangMC09,
  author       = {Hongyan Zang and
                  Lequan Min and
                  Li Cao},
  title        = {An Image Encryption and Digital Signature Scheme Based on Generalized
                  Synchronization Theorem},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {504--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.220},
  doi          = {10.1109/CIS.2009.220},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZangMC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaiLZ09,
  author       = {Zhengang Zhai and
                  Yao Lu and
                  Hong Zhao},
  title        = {Stereo Matching with Adaptive Arbitrary Support-Pixel Set and Adaptive
                  Support-Weight},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {598--602},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.149},
  doi          = {10.1109/CIS.2009.149},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaiLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaiZ09,
  author       = {Yishu Zhai and
                  Yong Zhang},
  title        = {Contrast Restoration for Fog-Degraded Images},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {619--623},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.243},
  doi          = {10.1109/CIS.2009.243},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaiZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Zhang09,
  author       = {Mingxi Zhang},
  title        = {Strict Integrity Policy of Biba Model with Dynamic Characteristics
                  and its Correctness},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {521--525},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.58},
  doi          = {10.1109/CIS.2009.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Zhang09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangDW09,
  author       = {Guoli Zhang and
                  Mingxin Dou and
                  Siyan Wang},
  title        = {Hybrid Genetic Algorithm with Particle Swarm Optimization Technique},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {103--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.236},
  doi          = {10.1109/CIS.2009.236},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangDW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangGZW09,
  author       = {Sulan Zhang and
                  Ping Guo and
                  Jifu Zhang and
                  Xinxin Wang},
  title        = {A Batch Constructing Method of Weighted Concept Lattice Based on Deviance
                  Analysis},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {69--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.86},
  doi          = {10.1109/CIS.2009.86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangGZW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangJ09,
  author       = {Juyang Zhang and
                  Ningkang Jiang},
  title        = {A Sound Dynamic Resource-Constrained Scheduling Scheme},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {311--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.170},
  doi          = {10.1109/CIS.2009.170},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangL09,
  author       = {Lixia Zhang and
                  Guangran Liu},
  title        = {Study and Design of 3D Virtual Scenes of Virtual Laboratory},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {629--633},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.246},
  doi          = {10.1109/CIS.2009.246},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangLWC09,
  author       = {Suxian Zhang and
                  Hai{-}Lin Liu and
                  Jiechang Wen and
                  Weili Chen},
  title        = {A New Algorithm Estimating the Mixing Matrix for the Sparse Component
                  Analysis},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {25--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.251},
  doi          = {10.1109/CIS.2009.251},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangLWC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangNN09,
  author       = {Juan Zhang and
                  Yi Niu and
                  Huabei Nie},
  title        = {Web Document Classification Based on Fuzzy k-NN Algorithm},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {193--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.28},
  doi          = {10.1109/CIS.2009.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangNN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangS09,
  author       = {Wenyao Zhang and
                  Jing Su},
  title        = {Extraction of Limit Streamlines in 2D Flow Field Using Virtual Boundary},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {171--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.194},
  doi          = {10.1109/CIS.2009.194},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangX09,
  author       = {Xu Zhang and
                  Li Xu},
  title        = {An Improved Immune-Based Multi-modal Function Optimization Algorithm},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {15--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.241},
  doi          = {10.1109/CIS.2009.241},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangXYW09,
  author       = {Jianhua Zhang and
                  Hongsheng Xu and
                  Yang Yu and
                  Zhi Wei},
  title        = {{FEM} Based Numerical Analysis on the Temperature Field in Grind-hardening},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {615--618},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.207},
  doi          = {10.1109/CIS.2009.207},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangXYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangY09,
  author       = {Da Zhang and
                  Chai Kiat Yeo},
  title        = {A Distributed Court System for Intrusion Detection in {OLSR}},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {478--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.52},
  doi          = {10.1109/CIS.2009.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangYZ09,
  author       = {Jie Zhang and
                  Yajuan Yang and
                  Quanju Zhang},
  title        = {The Particle Swarm Optimization Algorithm Based on Dynamic Chaotic
                  Perturbations and its Application to K-Means},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {282--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.111},
  doi          = {10.1109/CIS.2009.111},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangZ09,
  author       = {Ying Zhang and
                  Zhe{-}zhao Zeng},
  title        = {A New Method for Simultaneous Extraction of All Roots of Algebraic
                  Polynomial},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {197--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.77},
  doi          = {10.1109/CIS.2009.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoLZ09,
  author       = {Hong Zhao and
                  Yao Lu and
                  Zhengang Zhai},
  title        = {Example-Based Facial Sketch Hallucination},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {578--582},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.159},
  doi          = {10.1109/CIS.2009.159},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoW09,
  author       = {Haixing Zhao and
                  Liang Wei},
  title        = {Reliability Polynomials of Networks with Vertex Failure},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {268--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.12},
  doi          = {10.1109/CIS.2009.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhengFS09,
  author       = {Cheng Zheng and
                  Yong Fang and
                  Yaping Shen},
  title        = {The Implementation of the Web Mining Based on {XML} Technology},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {84--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.267},
  doi          = {10.1109/CIS.2009.267},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhengFS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhouL09,
  author       = {Xiuzhuang Zhou and
                  Yao Lu},
  title        = {Efficient Mean Shift Particle Filter for Sperm Cells Tracking},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {335--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.264},
  doi          = {10.1109/CIS.2009.264},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhouL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhouSZ09,
  author       = {Jianqin Zhou and
                  Cheng Shangguan and
                  Zemao Zhao},
  title        = {Computing the m-Tight Error Linear Complexity of Periodic Binary Sequences},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {386--390},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.72},
  doi          = {10.1109/CIS.2009.72},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhouSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhuQ09,
  author       = {Huafei Zhu and
                  Ying Qiu},
  title        = {Mixed Commitments Mediated Transcoders: {A} Simple Implementation
                  of Mercurial Mediated Transcoders},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {574--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.36},
  doi          = {10.1109/CIS.2009.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhuQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cis/2009-1,
  title        = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5375794},
  isbn         = {978-0-7695-3931-7},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/2009-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YanD09,
  title        = {A Scenario-Based Test Case Generation Framework for Security Policies},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {489--493},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1109/CIS.2009.221},
  doi          = {10.1109/CIS.2009.221},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YanD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics