


default search action
CIS 2010: Nanning, Guangxi Zhuang Autonomous Region, China
- Muren Liu, Yuping Wang, Ping Guo:

2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-9114-8
Fuzzy and Intelligent Systems
- Wenbin Pan, Yanquan Zhou:

Chinese Sentiment Orientation Analysis. 1-5 - Juguo Wang, Guoqi Li, Yun Pu:

A Scenario-Based Architecture for Reliability Design of Artificial Intelligent Software. 6-9 - Yihui Liu, Katherine Martin, Andrew Sparkes, Ross D. King

:
The Analysis of Yeast Cell Morphology Using a Robot Scientist. 10-14 - Yong-lin Liu, Mei-ying Ren:

IMP-Filters of R0-Algebras. 15-17 - Yanmei Chai, Tian Xia, Jianming Zhu, Haifeng Li:

Intelligent Digital Photo Management System Using Ontology and SWRL. 18-22 - Yating Wang, Wuneng Zhou, Jinliang Liu

, Da Luo:
New Results on H∞ Filter Design for Continue-Time Systems with Time-Varying Delay. 23-27 - Hong Yao, Wuneng Zhou:

Synchronization Algorithm for Multi-hop in Wireless Sensor Networks. 28-32 - Yuxia Qin, Lanshen Guo, Jian Wang:

Tool Wear Detection Based on Wavelet Packet and BP Neural Network. 33-36 - Li Xiao:

Neural Network Method for Solving Linear Fractional Programming. 37-41
Data Mining
- Viacheslav Wolfengagen

:
Semantic Modeling: Computational Models of the Concepts. 42-46 - Wei Yang:

A Fast HITON_PC Algorithm. 47-50 - Zhiqing Meng, Baosheng Shao, Min Jiang:

An Algorithm of Dynamic Associate Rule Based on Sliding Windows. 51-54 - Yu Tu, Yubao Liu, Zhijie Li:

Online Segmentation Algorithm for Time Series Based on BIRCH Clustering Features. 55-59 - Junjie Yang, Hai-Lin:

A New Clustering Algorithm Based on Normalized Signal for Sparse Component Analysis. 60-63 - Qi Luo:

Dynamic Fluzzy Clustering Algorithm for Web Documents Mining. 64-67 - Hong-guo Cai, Chang-an Yuan, Jin-Guang Luo, Jin-de Huang:

A Novel GEP-Based Multiple-Layers Association Rule Mining Algorithm. 68-72 - Wei Li, Xuemei Wu, Yayun Sun, Quanju Zhang:

Credit Card Customer Segmentation and Target Marketing Based on Data Mining. 73-76 - Suxian Zhang, Hai-Lin Liu:

A Improved Fuzzy K-Subspace Clustering and Its Application in Multiple Dominant Sparse Component Analysis. 77-80 - Huaipeng Li, Sulin Pang:

The Study of Credit Risk Evaluation Based on DEA Method. 81-85 - Shengen Li, Ling Song, Qiang Lv, Yuejun Li:

An Efficient Semantic Similarity Search on XML Documents. 86-90
Evolutionary Computation
- Juan Zou, Jinhua Zheng:

Research on Feature Extraction Based on Genetic Algorithm in Text Categorization. 91-94 - Xue-fei Yao, Hai-Lin:

The Comparison of Two Kinds of Reproduction in Multiobjective Optimization. 95-99 - Hecheng Li, Yuping Wang:

A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems Using Genetic Algorithms. 100-103 - Jiechang Wen, Xuefei Yao:

A New Kind of Handling Constraint Method for Optimization. 104-108 - Xiaofeng Feng, Xiong Shi, Jun Chen:

An Algorithm of Collision Detection Based on Hybrid Model. 109-112 - Qing-dao-er-ji Ren, Yuping Wang, Xiaojing Si:

An Improved Genetic Algorithm for Job Shop Scheduling Problem. 113-116 - Yajuan Yang, Pingan Wang, Wenxue Niu:

Industrial Clusters Evolution Research Based on the SGA. 117-121 - Jinling Du, Dalian Liu:

Hybrid Genetic Algorithm for the Multi-objective Flexible Scheduling Problem. 122-126 - Da Li, Jin Wu, Jiacai Zhang:

An EOG Artifacts Correction Method Based on Subspace Independent Component Analysis. 127-131 - Zhiqing Meng, Min Jiang, Chuangyin Dang

:
Evolutionary Algorithm for Zero-One Constrained Optimization Problems Based on Objective Penalty Function. 132-136 - Fangqing Gu, Hai-Lin Liu:

A Novel Weight Design in Multi-objective Evolutionary Algorithm. 137-141 - Yibo Hu:

A New Evolutionary Algorithm Based on Simplex Crossover and PSO Mutation for Constrained Optimization Problems. 142-146 - Dalian Liu, Chunfeng Xing, Xuehai Shang:

A New Genetic Algorithm and Its Convergence for Constrained Optimization Problems. 147-150 - Guoqiang Chen, Xiaofang Guo:

A Genetic Algorithm Based on Modularity Density for Detecting Community Structure in Complex Networks. 151-154 - Na Li, Qing-dao-er-ji Ren:

The Application of Dominant-Recessive Diploid Codes in MOGA. 155-159 - Xiaoshu Ma, Jing Huo, Qun Wang:

A Multi-objective Genetic Algorithm Approach Based on the Uniform Design Metmod. 160-164 - Yun Shang, Jian Chen, Qun Wang:

Improved Electromagnetism-Like Mechanism Algorithm for Constrained Optimization Problem. 165-169 - Yuelin Gao, Jingke Zhou, Songwei Jia

:
A New Multi-objective Differential Evolution Algorithm. 170-173 - Lei Fan, Yuping Wang, Meijuan Wang:

A New Genetic Algorithm with Elliptical Crossover for Constrained Multi-objective Optimization Problems. 174-178 - Huidang Zhang, Yifei Zhang:

The Particle Swarm Optimization with Decaying ICMIC for Shortest Path Computation in Computer Networks. 179-183 - Zhangjun Wu, Zhiwei Ni, Lichuan Gu, Xiao Liu

:
A Revised Discrete Particle Swarm Optimization for Cloud Workflow Scheduling. 184-188 - Jiansheng Wu, Enhong Chen:

A Novel Hybrid Particle Swarm Optimization for Feature Selection and Kernel Optimization in Support Vector Regression. 189-194 - Hongwei Lin, Yuping Wang, Cai Dai:

A Swarm Intelligence Algorithm Based on Boundary Mutation. 195-199 - Zhengjia Wu, Wen Wang, Jin Zhou, Fen-fen Ren, Cheng Zhang:

Research on Double Objective Optimization of Master Production Schedule Based on Ant Colony Algorithm. 200-204 - Changyou Liu, Kaifeng Guo:

Airport Taxi Scheduling Optimization Based on Genetic Algorithm. 205-208 - Xiaoying Pan, Hao Chen:

A Multi-agent Social Evolutionary Algorithm for Resource-Constrained Project Scheduling. 209-213
Support Vector Machines and Learning Algorithms
- Xiuyu Wang, Xingwu Jiang, Xiaogang Dong, Qinghuai Liu:

Existence of the Solution for General Complementarity Problems. 214-217 - Xuejun Gao, Zhenyou Wang:

Prediction Discrete Data Used BP Network Based on AGO. 218-222 - Shu-Juan Peng:

Motion Segmentation Using Central Distance Features and Low-Pass Filter. 223-226 - Zhenyou Wang, Xuejun Gao:

Performance Analysis Based on Transform Matrix of MLE in CICA. 227-229 - Tian Tian, Hua Duan, Guoping He:

Privacy-Preserving Classification on Horizontally Partitioned Data. 230-233 - Jinhong Di, Hongyan Hua:

An Improved Side Information Generation Scheme for Wyner-Ziv Video Coding. 234-237
Pattern Recognition
- Wenyao Zhang, Bo Sun, Yi Wang:

A Streamline Placement Method Highlighting Flow Field Topology. 238-242 - Bin Li, Maohua Wang, Li Li:

A Real-Time Pineapple Matching System Based on Speeded-Up Robust Features. 243-247 - Wenbang Sun, Hexin Chen, Haiyan Tang, Di Wu:

Unsupervised Image Change Detection Based on 2-D Fuzzy Entropy. 248-252 - Shunbin Liu, Huicheng Zheng:

Motion Analysis Based on Spatial-Temporal Visual Attention. 253-257 - Xiaofeng Feng, Xiong Shi, Jun Chen:

A New Volume Rendering Algorithm of Data Field. 258-260 - Xiong Shi, Xiaofeng Feng, Jun Chen:

The Research on Multi-viewpoint Navigation Based on Spherical Panoramic Images. 261-264 - Li-Hua Ye, Rong Zhu, Jie Xu:

A Novel Image Classification Method Based on Double Manifold Learning. 265-269 - Huorong Ren

, Chunxiao Li, Haizhen Wang:
An Improved DLDA Based Method- Nonparametric DLDA. 270-274 - Cheng Chen, Wei Song, Jiacai Zhang, Zhiping Hu, He Xu:

An Adaptive Feature Extraction Method for Motor-Imagery BCI Systems. 275-279 - Caikou Chen

, Jingyu Yangzhou:
Essence of Two-Dimensional Principal Component Analysis. 280-282 - Cuiqun He, Guodong Liu, Zhihua Xie:

Infrared Face Recognition Based on Blood Perfusion and Weighted Block-DCT in Wavelet Domain. 283-287 - Wei Wang, Wen-Sheng Chen:

DST Feature Based Locality Preserving Projections for Face Recognition. 288-292
Access Control and Block/Stream Ciphers
- Qiang Tang

, Arjan Jeckmans:
Efficient Client Puzzle Schemes to Mitigate DoS Attacks. 293-297 - Fen Li, Quan Liu, Qingqi Pei, Liaojun Pang:

On Trust Degree-Based Usage Control in DRM System. 298-301 - Weimin Shi, Changgen Peng:

A Protocol of Secure Multi-party Multiplication Based on Bilinear Pairing. 302-305 - Gaozu Wang, Weihuai Li, Wenbin Li:

Research on Validity Evaluation of Mandatory Access Control Policy under LSM Framework. 306-309 - Xiangwu Ding, Junyin Wei:

A Scheme for Confidentiality Protection of OpenID Authentication Mechanism. 310-314 - Fengrong Zhang, Yupu Hu, Hua Ma, Min Xie:

Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree. 315-319 - Junrong Liu, Dawu Gu, Zheng Guo:

Correlation Power Analysis Against Stream Cipher MICKEY v2. 320-324
Cryptosystems and Cryptanalysis
- Xueming Wang, Lichen Weng:

Game-Based Analysis and Improvement of a Fair Contract Signing Protocol. 325-328 - Asaf Shabtai, Yuval Fledel, Yuval Elovici:

Automated Static Code Analysis for Classifying Android Applications Using Machine Learning. 329-333 - Li Yang, Jianfeng Ma, Junwei Zhang:

Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms. 334-338 - Ping Wei, Xu An Wang

, Xiaoyuan Yang:
Proxy Re-encryption from CLE to CBE. 339-342 - Jie Wang, Yongquan Cai, Jingyang He:

A New Threshold Signature Scheme to Withstand the Conspiracy Attack. 343-346 - Xiufeng Zhao, Dawei Wei, Hao Wang:

Asymmetric Group Key Agreement with Traitor Traceability. 347-351 - Han Jiang, Qiuliang Xu, Chenghui Zhang:

Convertible Perfect Concurrent Signature Protocol. 352-356 - Junbing Li, Wei Ji:

Tripartite Key Agreement Protocols Based on Digital Certification. 357-361 - Gaoli Wang, Shaohui Wang:

Differential Fault Analysis on PRESENT Key Schedule. 362-366 - Gaoli Wang, Shaohui Wang:

Improved Differential Cryptanalysis of Serpent. 367-371 - Hao Wang, Qiuliang Xu, Han Jiang, Xiufeng Zhao:

A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model. 372-376 - Xu An Wang

, Ping Wei, Minqing Zhang:
New CCA-Secure Proxy Re-encryption Scheme without Random Oracles. 377-381 - Yali Jiang, Fanyu Kong, Xiuling Ju:

Lattice-Based Proxy Signature. 382-385 - Fei Ren, Zhiguang Qin, Jinfeng Yang:

A New Technique of Anti-tampering Technology Based on AVS Video. 386-389 - He Shang, Mingqiang Wang:

Some New Optimal Pairings. 390-393 - Jing Zhang, Pingan Wang:

Non-Adjacent Form Recursive Algorithm on Elliptic Curves Cryptograph. 394-397
Security Management
- Yang Cui, Li Qian, Wu Jie, Zhang Jianqi:

Target-Acquisition-Performance-Model-Based Quality Metric for Multisensor Image Fusion. 398-400 - Stergios G. Tsiafoulis, Vasilios Zorkadis:

A Neural Network Clustering Based Algorithm for Privacy Preserving Data Mining. 401-405 - Xiaotian Wu, Wei Sun:

Data Hiding in Block Truncation Coding. 406-410 - Tomer Shimshon, Robert Moskovitch, Lior Rokach, Yuval Elovici:

Continuous Verification Using Keystroke Dynamics. 411-415 - Tieming Chen, Xiaoming Pan, Yiguang Xuan, Jixia Ma, Jie Jiang:

A Naive Feature Selection Method and Its Application in Network Intrusion Detection. 416-420 - Lin Dong, Daoshun Wang, Min Ku, Yiqi Dai:

(2, n) Secret Image Sharing Scheme with Ideal Contrast. 421-424 - Hong-bo Li, Yan-ling Hao:

Risk Assessment Model of Ship Integrated Navigation System Based on Fuzzy Artificial Neural Network. 425-428 - Fei Ren, Zhiguang Qin, Xianhong Liu:

A Method to Prevent CW Sharing in DTV CAS. 429-432 - Yuenan Li:

Energy Based Robust Video Hash Algorithm. 433-436 - Liwen Zhang, Ming Shao:

Chaotic Synchronization with Single-Ring Erbium-Doped Fiber Laser Systems. 437-440 - Fen Li, Quan Liu, Liaojun Pang, Qingqi Pei:

Identity Authentication Based on Fuzzy Vault and Digital Certificate. 441-445 - Lei Li, Quan Liu, Xuemei Jiang:

USB Key-Based Dual-Factor Dynamic Authentication Scheme. 446-449 - Jie Wang, Yongquan Cai:

Game Analysis of Non-trusted Threshold Authentication Scheme. 450-453
Network & Wireless Security
- Yingying Liu, Hongmei Liu:

The Bipanconnectivity and Hamiltonian-Connectivity of Enhanced Hypercube. 454-456 - Liping Chen, Guojun Zhang, Weitao Ha:

A Reliable Service Quality Evaluation Model in the Web Services Community. 457-460 - Weitao Ha, Li-Ping Chen:

An Adaptive Evaluation Model of Web Service Based on Artificial Immune Network. 461-464 - Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao:

A Sheme of Mobile Platform Based on Trusted Computing. 465-468 - Xuena Peng, Yingyou Wen, Hong Zhao:

Securing GPRS Tunnel Protocol in 3G Core Network. 469-473 - Wenjuan Zhang, Zhaohui Li, Yonghui Hu, Wei Xia:

Cluster Features of Bluetooth Mobile Phone Virus and Research on Strategies of Control & Prevention. 474-477 - Hongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng

:
A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks. 478-482 - Xiaohui Zhao, Liaojun Pang, Jingjuan Bi, Qingqi Pei, Huixian Li:

Secure Communication Model of WSN Based on Secret Sharing. 483-487 - JiangHong Guo, ZhiChu Zhong:

Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor Networks. 488-492 - Yan-Xiao Li, Lian Qin, Qian Liang:

Research on Wireless Sensor Network Security. 493-496 - Bing Chen, Shenggui Zhang:

Computing the Scattering Number of Bicyclic Graphs. 497-500 - Zhanlan Li:

On the Reliability of Unicyclic Networks with Vertex Failure. 501-505 - Ruliang Wang, Huiying Jiang:

Observer-Based Adaptive Neural Network Robust Control of Nonlinear Time-Delay Systems with Unmodeled Dynamics. 506-510 - Ruliang Wang, Chaoyang Chen

:
Robust Adaptive Neural Control for a Class of Stochastic Nonlinear Systems. 511-514 - Ruliang Wang, Kunbo Mei:

Analysis of Fuzzy Membership Function Generation with Unsupervised Learning Using Self-Organizing Feature Map. 515-518 - Jianlan Guo, Yuqiang Chen, Xuanzi Hu:

Implementation and Improvement of Simulated Annealing Algorithm in Neural Net. 519-522 - Hui Liu, Hui Li, Zhanxin Ma:

Efficient and Secure Authentication Protocol for VANET. 523-527 - Tieming Chen, Liang Ge, Xiaohao Wang, Jiamei Cai:

TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks. 528-532 - Wei Wang, Nianke Zong, Jie Tang, Sangarapillai Lambotharan:

Soft Information Improvement for PN Sequence Iterative Acquisition. 533-536 - Chuanrong Zhang, Lianqing Zheng, Mingwen Xia, Yuqing Zhang:

Secure Signcryption Scheme Based on a Hybrid Encryption. 537-540
Security Models and Methodologies
- Fang Pu, Linlang Liu, Yu Shen, Qiying Cao

:
P2P-Based Semantic Policy Infrastucture for Pervasive Computing. 541-545 - Junjian Chen, Jingning Liu, Dan Feng:

Design and Implementation of Object-Oriented Encryption Storage System Based on Trusted Computing Platform. 546-550 - Mona Hosseinkhani Loorak, Ebrahim Tarameshloo, Mehdi Shajari:

AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme. 551-555 - Meng Yue, Xiaofeng Wu:

The Approach of ACARS Data Encryption and Authentication. 556-560 - Jian Lin, Yi Sun, Weiqiang Wang:

Violence Detection in Movies with Auditory and Visual Cues. 561-565
Other Applications
- Xiaohua Diao, Shiying Kang:

Study on Commercial Bank Branches Performance Evaluation Using Self-Adaptive RBFNN and UDM. 566-569 - Huiyan Liu, Wenzhang He, Rui Liu:

An Improved Fog-Degrading Image Enhancement Algorithm Based on the Fuzzy Contrast. 570-573 - Yujian Li, Dedong Zhang, Zhen Yang:

An Automatic Evaluation Method for Chinese Name Recognition. 574-576 - Weiguang Liu, Hailing Lai:

Probability Based Approach for Target Detection and Pose Estimation in Infrared Images. 577-581 - Shibin Xiao, Zhu Shi, Kun Liu, Xueqiang Lv:

A Kind of Vector Space Representation Model Based on Semantic in the Field of English Standard Information. 582-585 - Dingde Jiang, Xingwei Wang, Zhengzheng Xu, Zhenhua Chen:

An Approach to Maximum Lifetime Multicast Delivery in Wireless Ad-Hoc Networks. 586-590 - Xuecheng Wang, Risheng Yang, Minyan Lu, Haifeng Li:

Discrete Bayesian-Based Scheme of Software Reliability Demonstration Testing with Decreasing Function for the Safety Critical Software. 591-595 - Hongye Song:

Generalized Additive Models of DEA and Generalized Non-Dominated Solution in Multi-objective Programming. 596-600 - Shao-juan Su, Yin-dong Liu, Xiao-Ming Liu:

Ship 3D Collaborate Design Integration System Research. 601-605 - Dong Qu, Ping Chen, Jing Yang:

An Efficient Solver for Differential Equations with Random Inputs. 606-610 - Wang Yu, Xu Feng:

Capability Simulating Model for Complex Communication Network. 611-613 - Ren Liang, Li Bing:

Outward Foreign Direct Investment and Industry Structural Optimization: Analysis and Testing on Data of Republic of Korea. 614-618 - Zhenzhen Zhang

, Defu Zhang:
Research on Game Algorithm for Zhang Chess. 619-623 - Jingang Niu, Shenghui Su:

Design Verification of BJUT Library Management System with PVS. 624-628 - Haixing Zhao, Zhuma Gao, Jun Yin:

A Method to Find Chromatically Unique Multipartite Graphs. 629-633 - Xin Li, Enhong Chen:

Graph-Based Answer Passage Ranking for Question Answering. 634-638 - Wei Zhang, Ranran Du, Minhui Pang, Qiuhong Wang:

Automatic Speech Corpus Construction from Broadcasting Speech Databases. 639-643 - Shiyu Wang, Sulin Pang:

A Reputation Calculation Model in E-Shopping Websites. 644-648 - Manqi Wu, Sulin Pang:

Stock Index Futures Margin Level Settings by Hill Estimation and Empirical Analysis. 649-653 - Duanquan Xu, Jiangshan Zhang, Baochuan Pang:

A Digital Watermarking Scheme Used for Authentication of Surveillance Video. 654-658 - Yuqiang Chen, Jianlan Guo, Xuanzi Hu:

The Research of Internet of Things' Supporting Technologies Which Face the Logistics Industry. 659-663 - Wenxue Niu, Zhenghong Wei, Quanju Zhang:

A Non-Linear Model for Evaluating Professional Manager's Incentive Effect. 664-666 - Tianxiang Feng, Dingxiu He, Hongxia Liu:

Computer Realization of Solving Tri-diagonal Equations by Gauss-Seidel Method. 667-670 - Meng Hou, Zeng-li Liu, Haiyan Quan, Yong-de Zhang:

Research of Signal Frequency Domain Resolution Based-EMD. 671-675 - Gao-chang Zhao, Xiao-Lin Yang:

A BCH Code with the Distance 11 for Sensornets. 676-679 - Wu Zeng, Xiubao Jiang, Zhengquan Xu, Long Zhou:

Image Denoising Using Nonseparable Wavelet and SURE-LET. 680-684

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














