


default search action
CIS 2008: Suzhou, China
- 2008 International Conference on Computational Intelligence and Security, CIS 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop Papers. IEEE Computer Society 2008

Machine Learning and Algorithms
- Hongping Hu, Hui Zhang:

Chinese Named Entity Recognition with CRFs: Two Levels. 1-6 - Biyun Hu, Yiming Zhou:

Content Semantic Similarity Boosted Collaborative Filtering. 7-11 - Zhen-you Wang, Dachang Guo:

Expansion Complex Fast-ICA Algorithm Based on Complex Orthogonal Space. 12-15 - Fanman Meng, Hong Peng, Zheng Pei, Jun Wang:

A Novel Blind Image Watermarking Scheme Based on Support Vector Machine in DCT Domain. 16-20 - Zelong Wang, Fengxia Yan, Feng He, Jubo Zhu:

A New SVM Multi-Class Classification Method Based on Error-Correcting Code. 21-24
Nature-Inspired Computing
- Guirong Weng, Yuehuan Wang, Jian Su:

cDNA Microarray Image Processing Using Spot Centroid of Intensity. 25-29 - Nitin Namdeo Pise, Parag A. Kulkarni

:
A Survey of Semi-Supervised Learning Methods. 30-34 - Yong Chen, Xia Liu, Qi Huang, Chang-hua Zhang:

An Artificial Neural Network Based on CIEA. 35-40 - Chun Feng Zhang, Hui Zhao:

An Improved Particle Swarm Optimization Using Particle Reliving Strategy. 41-43 - Liwei Tan:

Particle Swarm Optimization Based on Number-Theoretical Net. 44-47 - Quansheng Dou, Ping Jiang, Zhijun Yu, Zhongzhi Shi:

Convergence Property Analysis for PSO Based on Cluster-Degree. 48-51 - Defu Cheng, Guangyuan Liu, Yuhui Qiu:

Applications of Particle Swarm Optimization and K-Nearest Neighbors to Emotion Recognition from Physiological Signals. 52-56 - Ben Niu, Li Li:

An Improved MCPSO with Center Communication. 57-61 - Xiaolin Wang, Zhenxu Bian, Pengfei Wang, Jianqin Zhou:

A Fast Algorithm to Find Optimal Double-Loop Networks. 62-67
Intelligent and Fuzzy Systems
- Fahimeh Farahnakian, Nasser Mozayani:

Learning through Decision Tree in Simulated Soccer Environment. 68-70 - Hao Xu, Lixin Shen, Xinlian Xie, Qinglian Wang, Yan Liu, Kejia Wang:

Research on the Business Operation Model Based on Semantic Web Service and MAS. 71-75 - Samaneh Yazdani, Mahdi Aliyari Shoorehdeli, Mohammad Teshnehlab:

Identification of Fuzzy Models Using Cartesian Genetic Programming. 76-81 - Li Chen, Xiaoyun Chen, Shanli Hu, Yunguo Lin:

Hybrid Algorithm for Winner Determination Problem in Combinatorial Auctions. 82-86 - Xin-bo Zhang, Ying Lu:

Unstructured Decision-Making Model Base on Grey Fuzzy Number. 87-90 - Feihu Hu, Zefei Geng, Huimin Chen, Linyan Sun:

Research of Multi-Resource and Multi-Objective Emergency Scheduling Based on Fuzzy Ideal Point Method. 91-95 - Yin Zhu, Junli Wang, Huapu Lu:

A Study on Urban Traffic Congestion Dynamic Predict Method Based on Advanced Fuzzy Clustering Model. 96-100 - Xiaojian Liu, Xuejun Liu, Jianxin Li:

A Hybrid Language Combining Business Rules with Object-Orientation. 101-106 - Junjie Zhang, Wenbo Fang:

The Application of Intelligent Learning System Based on Network. 107-110 - Shuhong Xiao, Guangyuan Zheng, Shuquan Chen:

Intelligent Control of the Linear Motor Direct Drive Feed System for CNC Machine Tools. 111-116
Data Mining and Knowledge Discovery
- Jun Gao:

An New Algorithm of Association Rule Mining. 117-121 - Chong Zhou, Yansheng Lu:

Clustering XML Documents Based on Data Type. 122-127 - Cuiling Li, Rongyong Zhao, Yang Xiang, Shanlin Xu:

Data Mining Approach for Ship Virtual Assembly Based on Rough Set Theory. 128-132 - Yuan Zhang, Yue-Jin Lv:

Optimize Algorithm of Decision Tree Based on Rough Sets Hierarchical Attributes. 133-137 - Tianlin Liu, Zhigang Zhang, Liu Xuejuan:

Knowledge Reduction in Incomplete and Fuzzy Objective Information Systems. 138-141 - Yangyao Zhao, Nianbin Wang, Jie Liu:

Automatic Searching Method Based on Domain Taxonomy Ontology. 142-146 - Shurong Tian, Xiaoshu Sun, Biao Li:

Ambiguous Measurements Multitarget Tracking with Random Sets. 147-151
Neural Networks and Distributed Systems
- Yujiong Liu, Shangbo Zhou:

Optimizing Neuron Function Based on Entropy Clustering in Functional Networks. 152-156 - Weidong Li, Ying Ren, Lequan Min

:
Face-Vase Illusion CNN. 157-161 - Chuangxin Wang, Zhezhao Zeng:

A Neural-Network Iteration Formula for the Simultaneous Inclusion of Polynomial Zeros. 162-165 - Anping Yang, Zhezhao Zeng:

A Method of Error Compensation on Sensors Based on Neural Networks Algorithm. 166-169 - Chuanmei Wang, Hengqing Tong:

Curve Forecast Based on BP Neural Networks with Application of Mental Curve Tracing. 170-175 - Li Li, Ben Niu:

Designing Artificial Neural Networks Using MCPSO and BPSO. 176-179 - Shaojuan Su, Yindong Liu:

Research on Ship Concurrent Collaborative Design Based on PDM. 180-185 - Fu'an Dong, Youli Wu, Yangwang Fang:

Comparison Principle and Stability of General Continuous Time Markov Jump System. 186-191 - Tian Jie, Xu Jing, Zhang Huachuan:

Architecture Design of a Network Traffic Simulation System Based on Self-Similar Model. 192-196 - Rong Guo, Weiwei Guo, Dongchen Shi:

Inferential Estimation of Texaco Coal Gasification Quality Using Stacked Neural Networks. 197-200
Evolutionary Computation
- Xiang Li, Yanli Li, Li Zhu:

The Comparative Research of Solving Problems of Equilibrium and Optimizing Multi-Resources with GA and PSO. 201-205 - Xinshun Ma, Xin Tian:

A Hybrid Evolution Genetic Algorithm for Constrained Optimization. 206-209 - Qiang Liu:

Study on Multi-Object Optimization of Logistics Network Based on Genetic Algorithm. 210-214 - Chengming Qi, Shoumei Cui, Yunchuan Sun:

A Two-Stage Hybrid Ant Colony Algorithm for the CVRP. 215-219 - Zhaoquan Cai:

Multi-Direction Searching Ant Colony Optimization for Traveling Salesman Problems. 220-223
Pattern Recognition
- Xin-yu Ouyang, Nan-nan Zhao, Xue-Bo Chen:

IIR Model Identification by the Improving WTLMS. 224-228 - Xiao Zhou, Guilin Zhang:

CFAR Method Based on Half Side Gaussian Model for Small Target Detection. 229-232 - Zhi-Guang Li, Fu-Long Wang, Wei-Zhao Zhu:

A Optimal Kernel Fisher Nonlinear Discriminant Analysis Method and Applied on Face Recognition. 233-237 - Xiaoh Wang:

Hybrid Abnormal Patterns Recognition of Control Chart Using Support Vector Machining. 238-241
Information and Data Security
- Jian Wang, Yanheng Liu, Fang Mei, Jianqi Zhu, Yingge Zhang:

A New Remediation Model Based on Trusted Network. 242-245 - Hassina Bensefia, Mohamed Ahmed-Nacer:

Towards an Adaptive Intrusion Detection System: A Critical and Comparative Study. 246-251 - Baohua Wang, Xinqiang Ma, Danning Li:

A Formal Multilevel Database Security Model. 252-256 - Qiang Liu

, Yun-Fei Jiang, Dongning Rao
, Xindu Chen:
Research of Security Analysis of ARBAC Policy Based on Intelligence Planning. 257-262 - Wenhua Xu, Minying Cheng:

Cancelable Voiceprint Template Based on Chaff-Points-Mixture Method. 263-266 - Zuowen Tan, Qi Wu:

Study of Linearly Cross-Coupled Chaotic Systems for a Random Bit Generator. 267-272 - Jiang Han, Qiuliang Xu, Bo Zhang:

Perfect Concurrent Signature Protocol for Symmetric Participant. 273-277 - Wei Gao, Fei Li, Banghai Xu:

An Abuse-Free Optimistic Fair Exchange Protocol Based on BLS Signature. 278-282 - Xinxin Liu, Shaohua Tang:

Formal Privacy Analysis of an Electronic Voting Scheme. 283-287 - Qingqi Pei, Jianfeng Ma:

ECC-Based Threshold Digital Signature Scheme without a Trusted Party. 288-292 - Hong-Yong Jia, Sihan Qing, Lize Gu, Yixian Yang:

Efficient Universally Composable Password-Based Key Exchange. 293-298 - Yong Ding, Ya-hui Li:

Integration of Signature Encryption and Key Exchange. 299-302 - Lijun Zhun, Futai Zhang:

Efficient ID. 303-307 - Hu Xiong, Zhiguang Qin, Fagen Li:

Simulatability and Security of Certificateless Threshold Signatures without Random Oracles. 308-313 - Xing-Lan Zhang, Quan-min Wang:

An Improved Conference Key Agreement Protocol. 314-318 - Chuansen Yang, Xiaohao Xu, Ruihua Liu, Hongsheng Zhao:

An Improved RAIM Algorithm Based on the Total Least Squares. 319-324 - Kezheng Lin, Bo Fan, Wei Yang:

Robust Audio Watermarking Scheme Based on Wavelet Transforming Stable Feature. 325-329 - Donghui Hu, Lina Wang, Xiaqiu Jiang, Tingting Zhu, Yuntao Yue:

Detecting the MB1 with Higher-Order Statistics. 330-335 - Yan Li, Shengqian Wang, Zhihua Xie:

A Local Watermarking Scheme in the Ridgelet Domain Combining Image Content and JND Model. 336-341
Cryptography, Coding, Security, and Key Management
- Wei Li, Gang Li, Xiangjun Xin:

Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme. 342-346 - Bin Yu, Liguo Fang, Xiaohui Xu:

A Verifiable Visual Cryptography Scheme. 347-350 - Bin Yu, Zhengxin Fu, Liguo Fang:

A Modified Multi-Secret Sharing Visual Cryptography Scheme. 351-354 - Li Hao, Lixin Yu:

A Systematic (48, 32) Code for Correcting Double Errors and Detecting Random Triple Errors. 355-358 - Xiao-Long Ma, Wei Cui, Lize Gu, Yixian Yang, Zhengming Hu:

A Novel ID-Based Verifiably Encrypted Signature without Random Oracle. 359-363 - Lei Zhang, Futai Zhang:

Security Model for Certificateless Aggregate Signature Schemes. 364-368 - Qi Liu, Yin Zhang, Cheng Chen, Shuwang Lv:

Construction and Counting Orthomorphism Based on Transversal. 369-373 - Huaqun Wang, Changhui Deng, Shuping Zhao, Futai Zhang:

Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme. 374-377
Steganography, Watermarking, Authentication, and Authorization
- Jianwei Yang, Quanxiu Wen, Guosheng Cheng:

A Watermarking Scheme Based on Median Filtering. 378-381 - Pekka Jäppinen, Harri Hämäläinen:

Enhanced RFID Security Method with Ownership Transfer. 382-385 - Bin Wang, Jianhui Zhang, Yunfei Guo:

APVP: An Aggregate-Based Path Verification Routing Protocol for the Ad Hoc Networks. 386-390 - Mun-Kyu Lee, Jin O. Park, Jeong Eun Song:

User Authentication Based on Distance Estimation Using Ultrasonic Sensors. 391-394 - Liying Lang, Yue Hong:

The Application of Face Recognition in Network Security. 395-398 - Bo Song, Huaikou Miao, Shengbo Chen:

Modeling Web Browser Interactions and Generating Tests. 399-404
Network and Wireless Communication Security
- Agung Fatwanto, Clive Boughton:

Analysis, Specification and Modeling of Non-Functional Requirements for Translative Model-Driven Development. 405-410 - Lei Sun, Xuandong Xiong:

Research on Certificate Cooperating Signature Scheme in Mobile Ad Hoc Networks. 411-414 - Changhong Liu, Xintian Liu, Hu Huang, Lihui Zhao:

Short-Term Traffic Flow Prediction Methods and the Correlation Analysis of Vehicle Speed and Traffic Flow. 415-418 - Huixian Li, Liaojun Pang:

Improvement on WLAN Multicast Key Management Protocol. 419-424 - Chuanrong Zhang, Yuqing Zhang:

Secure and Efficient Key Management Protocol in Ad Hoc Networks. 425-428 - Hongbo Lin, Yue Li, Baojun Yang:

Varying-Window-Length Time-Frequency Peak Filtering and its Application to Seismic Data. 429-432
Web Security and Data Management
- Shujiang Xu, Yinglong Wang, Jizhi Wang, Min Tian:

Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations. 433-437 - Jinling Song, Guohua Liu, Liming Huang:

K-MSD-WGT: A Local Recoding Algorithm Capturing Attribute Preferences. 438-441 - Qi Xie, Zhonghua Shen, Xiuyuan Yu:

ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing. 442-445 - Ming Meng, Wei Sun:

Short-Term Load Forecasting Based on Rough Set and Wavelet Neural Network. 446-450 - Hai Zhu, Yuping Wang:

Security-Driven Task Scheduling Based on Evolutionary Algorithm. 451-456 - Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang, Kefeng Fan:

A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement. 457-462
Anti-Virus and Biometrics
- Xiukun Li, Xiangqian Wu, Ning Qi, Kuanquan Wang:

A Novel Cryptographic Algorithm Based on Iris Feature. 463-466 - Xiukun Li, Xiangqian Wu, Kuanquan Wang:

Directional Gaussian Derivative Filter Based Palmprint Authentication. 467-471 - Xin Du, Yingjie Yang, Xiaowen Kang:

Research of Applying Information Entropy and Clustering Technique on Network Traffic Analysis. 472-476 - Yong Wang, Zhiguang Qin, Bin Tong, Jing Jin:

Link Farm Spam Detection Based on its Properties. 477-480
Applications
- Yongxia Zuo, Guoqiang Wang, Chuncheng Zuo:

Wavelet Packet Denoising for Pavement Surface Cracks Detection. 481-484 - Yongxia Zuo, Guoqiang Wang, Chuncheng Zuo:

A Novel Image Segmentation Method of Pavement Surface Cracks Based on Fractal Theory. 485-488 - Xiaodong Wang, Xin Zheng, Qian Yin:

Large Scale Terrain Compression and Real-Time Rendering Based on Wavelet Transform. 489-493 - Yuan Ding, Hai-Lin, Xue-fei Cao:

An Intelligent Computation of Coverage and Capacity of Base Station in 3G Mobile Communications Network. 494-497

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














