default search action
CIS 2009: Beijing, China
- 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers. IEEE Computer Society 2009, ISBN 978-0-7695-3931-7
Artificial Immune Systems and Artificial Neural Systems
- Wei Wang, Pengtao Zhang, Ying Tan, Xingui He:
A Hierarchical Artificial Immune Model for Virus Detection. 1-5 - Rui Chao, Ying Tan:
A Virus Detection System Based on Artificial Immune System. 6-10 - Liling Ma, Zhao Zhang, Xiaohang Zhou, Junzheng Wang:
A Novel Classification Method Based on Artificial Immune System and Quantum Mechanics Theory. 11-14 - Xu Zhang, Li Xu:
An Improved Immune-Based Multi-modal Function Optimization Algorithm. 15-19 - Yutao Qi, Fang Liu, Licheng Jiao:
A Parallel Artificial Immune Model for Optimization. 20-24 - Suxian Zhang, Hai-Lin Liu, Jiechang Wen, Weili Chen:
A New Algorithm Estimating the Mixing Matrix for the Sparse Component Analysis. 25-29 - Runbo Bai, Xiumei Qiu, Maosen Cao:
Factor Sensitivity Analysis for Multivariable Systems Using Bayesian Neural Networks. 30-33 - Rong Guo, Dongchen Shi:
Prediction of C3 Concentration in FCCU Using Neural Estimator Based on Dynamic PCA. 34-37
Data Mining and Statistical Data Analysis
- Nibaldo Rodríguez, Eleuterio Yañez:
Wavelet Smoothing Based Multivariate Polynomial for Anchovy Catches Forecasting. 38-41 - Xuanzi Hu, Jiafu Wan:
Studying of Data Centre Architecture for Prefecture-level City. 42-47 - Veronica C. Estrada, Akihiro Nakao, Enrique Carlos Segura:
Classifying Computer Session Data Using Self-Organizing Maps. 48-53 - Feng Gao, Weiming Fu, YiPing Zhong, Danfeng Zhao:
Large-Scale Hierarchical Text Classification Based on Path Semantic Vector and Prior Information. 54-58 - Yuan Tian:
Discovering Temporal Similarity Pattern Based on Metamorphosis Data. 59-63 - Xiao-dong Shao:
The Application of Improved 3D_Apriori Three-Dimensional Association Rules Algorithm in Reservoir Data Mining. 64-68 - Sulan Zhang, Ping Guo, Jifu Zhang, Xinxin Wang:
A Batch Constructing Method of Weighted Concept Lattice Based on Deviance Analysis. 69-73 - Yun Shen, Trevor P. Martin, Pete Bramhall:
Intelligent Security Data Analysis. 74-78 - Cunli Mao, Lina Li, Zhengtao Yu, Lu Han, Jianyi Guo, Xiong-Li Lei:
Research on Answer Extraction Method for Domain Question Answering System(QA). 79-83 - Cheng Zheng, Yong Fang, Yaping Shen:
The Implementation of the Web Mining Based on XML Technology. 84-87 - Le Peng, Zhi Cai, Guowen Wu:
Predict Ranking of Object Summaries with Hidden Markov Model. 88-91
Evolutionary Computing
- Yuelin Gao, Miaomiao Wang:
Improved Differential Evolution Algorithm with Random Migration Operator. 92-97 - Liping Jia, Yuping Wang:
A Genetic Algorithm for Multiobjective Bilevel Convex Optimization Problems. 98-102 - Guoli Zhang, Mingxin Dou, Siyan Wang:
Hybrid Genetic Algorithm with Particle Swarm Optimization Technique. 103-106 - Hongxia Miao, Honghua Wang, Zhixiang Deng:
Quantum Genetic Algorithm and its Application in Power System Reactive Power Optimization. 107-111 - Jiadong Yang, Hua Xu, Peifa Jia:
Task Scheduling for Heterogeneous Computing Based on Bayesian Optimization Algorithm. 112-117 - Dalian Liu, Xinfeng Wang, Jinling Du:
A Clustering-Based Evolutionary Algorithm for Traveling Salesman Problem. 118-122 - Ning Dong, Yuping Wang:
Multiobjective Differential Evolution Based on Opposite Operation. 123-127 - Yulan Liu:
An Approach for a Class of Bilevel Multiobjective Programming Problem. 128-132 - Yan Liu, Lei Fan, Yuping Wang, Qianli Dong:
Optimization of Logistics Nodes in Dynamic Location with a Multi-objective Evolutionary Algorithm. 133-137 - Jian-hu Cai, Li-Ping Wang:
Study on Dynamic Game Models in a Two-Echelon Supply Chain. 138-141 - Zhiwei He, Mingyu Gao, Jie Xu:
EKF-Ah Based State of Charge Online Estimation for Lithium-ion Power Battery. 142-145
Image Understanding and Knowledge Discovery
- Yaozu An, Yao Lu, Hong Zhao:
Neighborhood-Based Weighted Regularization of Video Sequence Super-Resolution. 146-150 - Dong-Jiang Ji, Wen-Zhang He:
The Correction SART Algorithm Based on Circular Symmetrical Object. 151-154 - Peizhen Wang, Lei Shi, Hengzhi Dong:
Feature Extraction and Matching for Plant Images. 155-159 - Qingzhu Wang, Ke Wang, Donghong An, Bo Chen, Miao Liu, Yingying Ying:
Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient. 160-164 - Xuchao Li, Dongsheng Liu:
Object Detection and Tracking Using Spatiotemporal Wavelet Domain Markov Random Field in Video. 165-170 - Wenyao Zhang, Jing Su:
Extraction of Limit Streamlines in 2D Flow Field Using Virtual Boundary. 171-175 - Dingjun Chen:
The Close-Degree of Covering Rough Sets. 176-179 - Baohua Wang, Hejiang Huang, Xiaolong Wang, Wensheng Chen:
An Ontology-Based NLP Approach to Semantic Annotation of Annual Report. 180-183
Support Vector Machines, Machine Learning, and Learning Algorithms
- Bingxin Xu, Qian Yin, Guangjun Lv:
Using SVM to Organize the Image Database. 184-187 - Min Jiang, Zhiqing Meng, Gengui Zhou:
A New Support Vector Machine Model Based on the Discrete Conditional Value-at-Risk. 188-192 - Juan Zhang, Yi Niu, Huabei Nie:
Web Document Classification Based on Fuzzy k-NN Algorithm. 193-196 - Ying Zhang, Zhe-zhao Zeng:
A New Method for Simultaneous Extraction of All Roots of Algebraic Polynomial. 197-200 - Yang Fan, Shuping He, Fei Liu:
PD-Type Sampled-Data Iterative Learning Control for Nonlinear Systems with Time Delays and Uncertain Disturbances. 201-205
Multi-agent Systems and Neural Networks
- Zaobin Gan, Juxia He, Qian Ding, Vijay Varadharajan:
Trust Relationship Modelling in E-commerce-Based Social Network. 206-210 - Bo Yang, Yong-gang Wu, Cheng Wang:
A Multi-agent and GIS Based Simulation for Emergency Evacuation in Park and Public Square. 211-216 - Jianjun Ni, Chuanbiao Zhang, Li Ren:
An Intelligent Decision Support System of Lake Water Pollution Control Based on Multi-agent Model. 217-221 - Xiaozheng Mou, Wuneng Zhou, Lin Pan, Qingyu Zhu, Jian-An Fang:
Lag Synchronization of Uncertain Chaotic Neural Networks with Mixed Time-Varying Delays Based on Adaptive Control. 222-226 - Jiansheng Wu, Jie Zhou, Yuelin Gao:
Support Vector Regression Based on Particle Swarm Optimization and Projection Pursuit Technology for Rainfall Forecasting. 227-233 - Chengtian Song, Keyong Wang:
Image Target Detection Using Morphological Neural Network. 234-236 - Lixin Xing, Shanqing Gao, Yunfei Chen:
A Novel Control Method Based on Fuzzy Neural Network. 237-239
Swarm Intelligence
- Soumah Yaya, Wang Honghua:
Research on Reduction of Commutation Torque Ripple in Brushless DC Motor Drives Based on Fuzzy Logic Control. 240-243 - Haobin Xie, Feng Liu, Lijuan Li:
A Topology Optimization for Truss Based on Improved Group Search Optimizer. 244-248 - Guang Qin, Feng Liu, Lijuan Li:
A Quick Group Search Optimizer with Passive Congregation and its Convergence Analysis. 249-253 - Jianhua Liu, Xiaoping Fan:
The Analysis and Improvement of Binary Particle Swarm Optimization. 254-258 - Xiuqin Deng:
System Identification Based on Particle Swarm Optimization Algorithm. 259-263 - Chengfu Ye:
Minimal Merrifield-Simmons Index of 5-leaf-trees. 264-267 - Haixing Zhao, Liang Wei:
Reliability Polynomials of Networks with Vertex Failure. 268-271 - Haizhen Ren:
On Orderings of Some Graphs by the Extreme Roots of their Graph Polynomials. 272-276 - Li Guo, Xu Chen:
A Novel Particle Swarm Optimization Based on the Self-Adaptation Strategy of Acceleration Coefficients. 277-281 - Jie Zhang, Yajuan Yang, Quanju Zhang:
The Particle Swarm Optimization Algorithm Based on Dynamic Chaotic Perturbations and its Application to K-Means. 282-286 - Xin Liu, Xinge You, Yiu-ming Cheung:
Texture Image Retrieval Using Non-separable Wavelets and Local Binary Patterns. 287-291 - Wenxue Niu, Yajuan Yang, Xiao Luo, Quanju Zhang:
Research on the Evolution of Supply Chain Based on SWARM. 292-295
Fuzzy Systems and Intelligent Systems
- Xiao-Li Wu, Yan-Kui Liu:
Measuring the Spread of Fuzzy Variable by L-S Integral. 296-300 - Zhiming Wang, Li Zhang, Hong Bao:
PNN Based Motion Detection with Adaptive Learning Rate. 301-306 - Longmei Jie, Hui Wang, DeRong Li, GuoQiang Shao:
Proof of Two Kinds of Fingerprint Feature Extraction CNN. 307-310 - Juyang Zhang, Ningkang Jiang:
A Sound Dynamic Resource-Constrained Scheduling Scheme. 311-314
Pattern Recognition
- Gil Melfe Mateus Santos, Hugo Pedro Martins Carrico Proença:
On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris Images. 315-319 - Pengzhang Liu, Tingzhi Shen, Yu Hu, Sanyuan Zhao:
Face Recognition Using Modular Locality Preserving Projections. 320-324 - Zhao-yi Peng, Yu Zhou, Ping Wang:
Multi-pose Face Detection Based on Adaptive Skin Color and Structure Model. 325-329 - Di Wu, Tianyun Ma, Pengcheng Nie, Zhiping Wang, Zhengjun Qiu, Yong He:
Use of In-Situ Visible and Near-Infrared Spectroscopy for Non-invasive Discrimination of Spirulina Platensis. 330-334 - Xiuzhuang Zhou, Yao Lu:
Efficient Mean Shift Particle Filter for Sperm Cells Tracking. 335-339 - Bingxia Shi, Na Yu, Jia Xu, Quanming Zhao:
Extraction and Recognition Alphabetic and Digital Characters on Industrial Containers. 340-343 - Jian Cao, Kan Li, Chunxiao Gao, Qiongxin Liu:
Efficient Object Recognition Using Corner Features. 344-348 - Sun Junding, Xu Heli:
Contour-Shape Recognition and Retrieval Based on Chain Code. 349-352 - Fulong Wang, Xiaoliang Liu, Cheng Huang:
An Improved Kernel Fisher Discriminant Analysis for Face Recognition. 353-357 - Cai-Kou Chen, Jun Shi, Yiming Yu:
Locally Supervised Discriminant Analysis in Kernel Space. 358-362 - Rong-Hua Li, Zhiping Luo, Guoqiang Han:
Pseudo-inverse Locality Preserving Projections. 363-367 - Fulong Wang, Cheng Huang, Xiaoliang Liu:
A Fusion of Face Symmetry of Two-Dimensional Principal Component Analysis and Face Recognition. 368-371 - Su Xiao, Guoqiang Han, Yan Wo, Zhan Li, Xiangji Chen:
Fast Parameter Estimation in Image Restoration Based on Hierarchical Bayesian Framework. 372-375 - Yun Tian, Mingquan Zhou, Zhongke Wu, Xingce Wang:
A Region-Based Active Contour Model for Image Segmentation. 376-380 - Taijun Wang, Yiu-ming Cheung:
A Locally Gaussian Mixture Based RBF Network for Classification of Chinese Herbal Infrared Spectrum Fingerprint. 381-385
Cryptograph, Watermarking, and Applications
- Jianqin Zhou, Cheng Shangguan, Zemao Zhao:
Computing the m-Tight Error Linear Complexity of Periodic Binary Sequences. 386-390 - Dazu Huang, Zhigang Chen, Xin Li, Jianquan Xie:
Deterministic Secure Bidirectional Quantum Communication. 391-394 - Zhengjun Cao, Olivier Markowitch:
Different Authentication Properties and a Signcryption Scheme Revisited. 395-399 - Wei Gao, Zhenyou Wang, Fei Li, Li'e Chen:
An Efficient Threshold Signature Scheme Without Random Oracles. 400-404 - Lihua Liu, Zhengjun Cao:
Analysis of Two Signature Schemes from CIS'2006. 405-408 - Jiayao Wang, Bin Hu, Quanlai Wang:
The Walsh Spectrum Property of Resilient Boolean Functions. 409-413 - Hua Shao, Xinglan Zhang, Feng Shao:
Cryptanalysis of Short Signature Scheme Without Random Oracles Assumption. 414-417 - Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma:
Predators Combat Good Point Set Scanning-Based Self-Learning Worms. 418-422 - Zuowen Tan:
An Improved Identity-Based Group Signature Scheme. 423-427 - Xiaoming Hu, Zhe Zhang, Taozhi Si:
ID-Based Proxy Re-Encryption Schemes Without Random Oracle. 428-431 - Bo Yang, Zhengming Hu, Zibi Xiao:
Efficient Certificateless Strong Designated Verifier Signature Scheme. 432-436 - Na Wang, Yunjin Wang, Xia Li:
A Novel Robust Watermarking Algorithm Based on DWT and DCT. 437-441 - Ming Mao, Shaohui Chen, Jin Xu:
Construction of the Initial Structure for Preimage Attack of MD5. 442-445 - Ying Qiu, Huafei Zhu:
Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism. 446-450 - Mingqiang Wang, Leibo Li:
A Note on Twin Diffie-Hellman Problem. 451-454 - Zhenyou Wang, Wei Gao, Li'e Chen, Fei Li:
Perfect Subliminal Channel in a Paring-Based Digital Signature. 455-457 - Jiujun Cheng, Fan Zhang, Kuifei Yu, Jian Ma:
The Dynamic and Double Encryption System Based on Two-Dimensional Image. 458-462
Security Management and Intrusion Detection
- Bao Ngoc Tran, Thuc Dinh Nguyen, Tran Dan Thu:
A New S-Box Structure Based on Graph Isomorphism. 463-467 - Zhijin Guan, Yiqing Zhang, Yanming Lu:
Reversible Logic Gate Cascade Network Based on Series Connection. 468-472 - Chengming Qi, Xusheng Chen:
A New Digital Proxy Signature Scheme Based on ECDLP. 473-477 - Da Zhang, Chai Kiat Yeo:
A Distributed Court System for Intrusion Detection in OLSR. 478-482 - Bei Wu, Xing-yuan Chen, Yong-fui Zhang, Xiang-dong Dai:
An Extensible Intra Access Control Policy Conflict Detection Algorithm. 483-488 - (Withdrawn) A Scenario-Based Test Case Generation Framework for Security Policies. 489-493
- Li Cao, Lequan Min, Hongyan Zang:
A Chaos-Based Pseudorandom Number Generator and Performance Analysis. 494-498 - Liping Ji, Haijin Liang, Yitao Song, Xiamu Niu:
A Normal-Traffic Network Covert Channel. 499-503 - Hongyan Zang, Lequan Min, Li Cao:
An Image Encryption and Digital Signature Scheme Based on Generalized Synchronization Theorem. 504-510 - Hongbin Kong, Zhengquan Zeng, Lijun Yan, Jicheng Yang, Shaowen Yao, Nuoya Sheng:
Combine Elliptic Curve Cryptography with Digital Watermark for OWL-Based Ontology Encryption. 511-515
Applied Security
- Mahdi Zamani, Mahnush Movahedi, Mohammad Mehdi Ebadzadeh, Hossein Pedram:
A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents. 516-520 - Mingxi Zhang:
Strict Integrity Policy of Biba Model with Dynamic Characteristics and its Correctness. 521-525 - Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang:
An Algebra for Composing Access Control Policies in Grid. 526-530 - Xudong Li, Chunxia Zhang, Xing Lin, Shuguang Lin:
VAD: A Detail Investigation into Process's Memory. 531-536 - Chao Chen, Ke Wang, Yiqi Dai:
A Novel Architecture for Enterprise Network Security. 537-541 - Kun Yu, Yunyang Yan:
Reputation Measure for Incentive-Compatible Packet Forwarding in Ad Hoc Networks. 542-546 - Kai Yang, Jian-Feng Ma, Zi-hui Miao:
Hybrid Routing Protocol for Wireless Mesh Network. 547-551 - Yaping Chi, Zhaobin Li, Zhonghua Wang, Yong Fang:
An Improved Bytecode Verification Algorithm on Java Card. 552-555 - Xintian Liu, Changhong Liu, Lihui Zhao, Hu Huang, Xiaoyong Zhao, Xinyi Sun:
The Finite Element Method Appling in the Flow Forming. 556-558 - Baoliang Xu, Wenjian Luo, Xufa Wang:
A Preliminary Study on Why Using the Nonself Detector Set for Anomaly Detection in Artificial Immune Systems. 559-564 - Jinling Song, Liming Huang, Qi He, Yan Gao, Xin Liu, Yuxiang Li:
Preserving FDs in K-Anonymization by K-MSDs and Association Generalization. 565-569 - Liming Wu, Junxiu Liu, Ji Zhang, Yuling Luo:
The Intelligent Reconfigurable Measuring Node Based on Wireless Access Network. 570-573