


default search action
CIS 2012: Guangzhou, China
- Eighth International Conference on Computational Intelligence and Security, CIS 2012, Guangzhou, China, November 17-18, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-4725-9

- Shuqing Jiao:

A Filled Function Method with One Parameter for Box Constraint. 1-4 - Xiao Zhi Gao, Ying Wu, Xiaolei Wang, Xianlin Huang, Kai Zenger, Xiaofeng Wang:

A Modified PSO Method Based on Cultural Algorithm and Quantum Computing. 5-10 - Xiaofang Guo, Xiaoli Wang, Mingzhao Wang, Yuping Wang:

A New Objective Reduction Algorithm for Many-Objective Problems: Employing Mutual Information and Clustering Algorithm. 11-16 - Zhenghai Ai

:
A New TOPSIS with Triangular Fuzzy Number and Uncertain Weight Based on Cosines Similar Degree. 17-21 - Xiao Zhi Gao, Xiaolei Wang, Kai Zenger, Xiaofeng Wang:

A Niching Harmony Search Method for Multi-modal Optimization. 22-27 - Tao Wen, Zhengfeng Ming, Youqing Liu, Jinxin Gu:

A Study on Magnetic Force of the Large Displacement Hybrid Suspension System Based on Finite Element Method. 28-30 - Guiyu Li, JiongCheng Li, Henghui Xiao, Shengpei Ding:

A Weak Filled Function Algorithm for Unconstrained Searching Optimization. 31-34 - Jie Liu, Yanfeng He:

Ant Colony Algorithm for Waste Collection Vehicle Arc Routing Problem with Turn Constraints. 35-39 - Shuqing Jiao:

A Filled Function with Two Parameters for Unconstrained Global Optimization. 40-43 - Guoxi Han, Jun He, Jianqing Qi:

An Optimization Design Method of Integrated Radar and Jammer Signal Modulated by Bi-phase Sequences of Chaos. 44-47 - Huan Xu, Jiechang Wen:

Differential Evolution Algorithm for the Optimization of the Vehicle Routing Problem in Logistics. 48-51 - Chunyan Liu, Conghui Zhu, Tiejun Zhao, Dequan Zheng:

Extracting Main Content of a Topic on Online Social Network by Multi-document Summarization. 52-55 - Ruimin Jia, Dengxu He:

Hybrid Artificial Bee Colony Algorithm for Solving Nonlinear System of Equations. 56-60 - Guojian Cheng, Yao An, Zhe Wang

, Kai Zhu:
Oil Well Placement Optimization Using Niche Particle Swarm Optimization. 61-64 - Ning Dong, Fei Wei, Yuping Wang:

Preference Based Multiobjective Evolutionary Algorithm for Constrained Optimization Problems. 65-70 - Zhenhua Li, Hai-Lin Liu:

Preference-Based Evolutionary Multi-objective Optimization. 71-76 - Qiang Wang, Hai-Lin Liu, JiongCheng Li:

Resource Allocation for OFDM System Based on Evolutionary Algorithm. 77-81 - Xiangyou Li:

Saddle-point Condition for Fractional Programming. 82-85 - Ajit Narayanan, Yi Chen, Shaoning Pang

, Ban Tao:
The Effects of Different Representations on Malware Motif Identification. 86-90 - Xue Hong-Jun, Chen Tao, Xue Li-Min:

A Method for Judging Web-page Type. 91-93 - Leilei Yang, Guiquan Liu, Qi Liu, Lei Zhang, Enhong Chen:

Analyzing Sequence Data Based on Conditional Random Fields with Co-training. 94-98 - Bin Li, Tianfei Wang, Liping Jia:

Application of Improved Logarithm Logistic Models in Population Prediction. 99-102 - Jie Zhang

, Xingsi Xue, Yuping Wang:
Class Assignment Algorithms for Performance Measure of Clustering Algorithms. 103-106 - Hairong Zhao, Wuneng Zhou, Yan Gao:

Energy Efficient and Cluster Based Routing Protocol for WSN. 107-111 - Jarno M. A. Tanskanen

, Xiao Zhi Gao, Jing Wang, Ping Guo
, Jari A. K. Hyttinen
, Vassil S. Dimitrov:
Experimental Comparison of Geometric, Arithmetic and Harmonic Means for EEG Event Related Potential Detection. 112-116 - Yilong Liu, Guohua Liu:

Finding the Provenance of k-anonymous Data and Adding It to Association-rule Mining. 117-122 - Xiaoying Pan, Hao Chen:

Multi-Agent Evolutionary Clustering Algorithm Based on Manifold Distance. 123-127 - Zhongwei Si, Lina Liang, Jinyuan Du:

The Hilbert Boundary Value Problem in the Unit Ball in Clifford Analysis. 128-131 - Dong-Jiang Ji, Wen-Zhang He, Xiao-Bing Zou:

TV OS-SART with Fractional Order Integral Filtering. 132-135 - Xin Wan, Xinfang Zhang, Liang Chen, Hao Jin:

TVPDc: A Model for Secure Managing Virtual Infrastructure in IaaS Cloud. 136-141 - Bin You, Xiao-Ran Liu, Ning Li, Yue-Song Yan:

Using Information Content to Evaluate Semantic Similarity on HowNet. 142-145 - Er-Dun Zhao, Yong-Qiang Qi, Xing-Xing Xiang, Yi Chen:

A Data Placement Strategy Based on Genetic Algorithm for Scientific Workflows. 146-149 - Junwei Wang, Haifeng Wang:

A Fuzzy Decision Based Intelligent QoS Multicast Routing Algorithm. 150-153 - Shuang Feng, Yingqiu Ma, Jinquan Li:

A Kind of Nonlinear and Non-convex Optimization Problems under Mixed Fuzzy Relational Equations Constraints with Max-min and Max-average Composition. 154-158 - Dan Zhang, Longmei Jie, GuoQiang Shao:

A New Plan Recognition Algorithm and its Implementation. 159-162 - Wen Wang, Zhicheng Zhao:

A Robust Instance-based Video Search Method by Re-ranking for Multiple Visual Codebooks. 163-167 - Ze Tang, Jianwen Feng, Yi Zhao:

Cluster Synchronization of Complex Networks with Non-delayed and Delayed Coupling under Pinning Control. 168-172 - Tianxiang Feng:

Computer Realization of Solving n-order Incomplete Four Angles Problem. 173-176 - Liu Yang, Junwen Deng, Yuyao Song:

Design of Computer Measurement and Control System of Test Device for Grain Drying Based on Virtual Instrument. 177-182 - Jing Nie:

Design the Desktop Backup System Based on Cloud Computing. 183-185 - Lingling Hu, Dazhou Wu, Xu Xu, Jie Yao:

DTMS: A Driving Training Management System Based on the Internet of Things. 186-189 - Xin-Lei Feng, Liping Jia:

Further Research on Group Consensus of Multi-agent Systems. 190-194 - Bo Yang, Pengfei Zhao, Shuqiu Ping, Jing Huang:

Improving the Recommendation of Collaborative Filtering by Fusing Trust Network. 195-199 - Guoqiang Hang, Yonghui Liao, Yang Yang, Danyan Zhang, Xiaohui Hu:

Neuron-MOS Based Schmitt Trigger with Controllable Hysteresis. 200-203 - Yi Zhao, Jianwen Feng, Jingyi Wang

:
On Synchronizability of Kleinberg Small World Networks. 204-208 - Qian Yin, Ruiyi Luo, Ping Guo

:
Parallelization and Optimization of Molecular Dynamics Simulation on Many Integrated Core. 209-213 - Peng Sun, Xin Guo, Kang Chen, Ziyan Wu

:
Research on Data Recording in Seismic PSD Experiment. 214-218 - Weijun Dai, Ji Ge:

Research on Vision-based Intelligent Vehicle Safety Inspection and Visual Surveillance. 219-222 - Peng Sun, Xin Guo:

Study on Numerical Integration Algorithm for PSD Test. 223-227 - Zhonghua Li, Chunhui He:

The AIS-SoL Optimization: An Artificial Immune System with Social Learning. 228-232 - Xingtong Zhu, Bo Xu:

Urban Water Consumption Forecast Based on QPSO-RBF Neural Network. 233-236 - Yang Liu, Liji Wu, Yun Niu, Xiangmin Zhang, Zhiqiang Gao:

A High-Speed SHA-1 IP Core for 10 Gbps Ethernet Security Processor. 237-241 - Yujing Si, Ji Xu, Zhen Zhang, Jielin Pan, Yonghong Yan:

An Improved Mandarin Voice Input System Using Recurrent Neural Network Language Model. 242-246 - Zhibin Li, Lingling Wang, Haichuan Lou:

Analysis and Forecasting on the Relationship between Port Logistics Capacity and Coastal Marine Economic Growth Based on PKNN in Case of Zhejiang Province. 247-251 - Xiao Zhi Gao, Jing Wang, Jarno M. A. Tanskanen

, Rongfang Bie, Ping Guo
:
BP Neural Networks with Harmony Search Method-based Training for Epileptic EEG Signal Classification. 252-257 - Ziping Zhao, Xirong Ma:

Prediction of Prosodic Word Boundaries in Chinese TTS Based on Maximum Entropy Markov Model and Transformation Based Learning. 258-261 - Siming Ma, Wuneng Zhou, Shicao Luo, Rui Chen:

Projective Synchronization Control of Delayed Recurrent Neural Networks with Markovian Jumping Parameters. 262-266 - Ruliang Wang, Dongmei Gao:

Robust Stability of Uncertain Neutral Systems with Time-varying and Distributed Delays. 267-270 - Xueqin Kou, Lichen Gu:

Ultrasonic Target Recognition Based on Wavelet Packet and Neural Network. 271-274 - Zhi Liu, Qi Hua Chen, Xiang Pan, Yipan Feng:

3D Model Retrieval Method Based on Single View. 275-279 - Siyuan Wu, Zhicheng Zhao:

A Multi Modal Content-Based Copy Detection Approach. 280-283 - Sun Xiao-li, Xu Chen, Li Min:

An Adaptive Image Denoising Model Based on Nonlocal Diffusion Tensor. 284-287 - Lei Xia, Lejun Zhang, Jianpei Zhang, Jing Yang, Lin Guo:

An Improved Community Detection Algorithm Based on Local Information in Social Networks. 288-292 - Kai Yan, Kefeng Feng, Ying Wang, Bo Pan:

Based on Image Salient Features Network Image Retrieval Method. 293-297 - Dong Kang, Haihua Xing, Shulei Wu, Juntao Chen, Jinmei Zhan:

Design of University Teacher's Files Management System. 298-300 - Juguo Wang, Yun Pu, Guoqi Li:

Fault Model Libraries for Safety Analysis and their Ontology-based Reuse. 301-304 - Peipei Pan, Xin Zheng, Qingqing Xu, Ping Guo

:
Image Completion with Automatic Structure Propagation. 305-309 - Wei-Qiang Zhang, Yi-Mei Song, Jiqiang Feng:

Image Denoising Based on Wave Atoms and Cycle Spinning. 310-313 - Qiguang Miao

, Jingjing Lou, Pengfei Xu:
Image Fusion Based on NSCT and Bandelet Transform. 314-317 - Yanjuan Shuai, Rui Liu, Wenzhang He:

Image Haze Removal of Wiener Filtering Based on Dark Channel Prior. 318-322 - Zhenhong Li, Jianwei Yang, Rushi Lan, Xiaoxia Feng:

Multilayer-Pseudopolar Fractional Fourier Transform Approach for Image Registration. 323-327 - Yan-Fei Yu:

Optimization for Fire Station Location Planning Based on Travel Time of Fire Vehicles. 328-331 - Haifeng Zhang, Zhaohui Zhang, Hongtao Yang, Li Wu, Linao Tang, Qing Zhu, Sen Dong, Maoyuan Qin, Yangjie Lei:

Real-Time Auto-Focus System Design Based on Climbing Algorithm and its FPGA Implementation. 332-335 - Haihua Xing, Shulei Wu, Dong Kang, Juntao Chen, Jinmei Zhan:

Research of Web Portable Technology Application. 336-338 - Jun Li, Tao Meng, Lixin Zhang, Shao-Ping Zhao:

Research on Evaluation Method Used to Quality Performance of Missile Weapon Based on Rough Set Rule Extraction. 339-344 - Minguang Song, Ping Guo

:
Scene Recognition via Combining Information of Neighbors. 345-349 - Dongmei Fu, Xiao Yu, Tingting Wang:

Segmentation Algorithm Study for Infrared Images with Occluded Target Based on Artificial Immune System. 350-353 - Xin Zheng, Qingqing Xu, Peipei Pan, Ping Guo

:
Statistical Image Upsampling Method Based on CUDA. 354-358 - Tiancheng Zhang, Xiaonan Yu, Dejun Yue, Yu Gu, Ge Yu:

Study of an RFID Based Object-Relationship Recognition System. 359-363 - Xin Liu, S. Y. Cheng, X. W. Zhang, X. R. Yang, Ba Thach Nguyen, Sukhan Lee:

Unsupervised Segmentation in 3D Planar Object Maps Based on Fuzzy Clustering. 364-368 - Xin Li, Zenggang Zhou, Xiaoyuan Li, Yan Wan:

Vehicle Segmentation and Speed Detection Based on Binocular Stereo Vision. 369-373 - Zhi-Tao Cui, Ke Jian:

A New Algorithm to Estimate Mixing-Matrix of Underdetermined Blind Signal Separation. 374-377 - Guangqing Long, Xiaoyuan Huang, Aimei Tan:

A Product Integration Method for Eigenvalue Problems of a Class of Non-compact Operators. 378-381 - Jianqiao Shen, Huabei Lie:

A Special XQuery Program Dealing with Nested Loop Structure. 382-386 - Ruizhong Wang:

Analyses the Financial Data of Stocks Based Rough Set Theory. 387-390 - Guoxu Zhou

, Zhaoshui He, Yu Zhang
, Qibin Zhao, Andrzej Cichocki
:
Canonical Polyadic Decomposition: From 3-way to N-Way. 391-395 - Yuanlong Wang, Ping Guo

:
Fast Multiple Scattering in Participating Media with Beamlet Decomposition. 396-400 - Fan Lei, Yao Lu, Wei Huang, Lujun Yu, Lin Jia:

Fast Static Particle Swarm Optimization Based Feature Selection for Face Detection. 401-405 - Feng Yu, Hong-wei Xuan, Dequan Zheng:

Key-Phrase Extraction Based on a Combination of CRF Model with Document Structure. 406-410 - Tianfei Wang, Bin Li, Jin Zou, Feng Sun

, Zhihe Zhang:
New Bounds of the Nordhaus-Gaddum Type of the Laplacian Matrix of Graphs. 411-414 - Jianhui Yang, Wei Dou:

Prediction of Gold Price Based on WT-SVR and EMD-SVR Model. 415-419 - Yuenan Li:

Robust Image Hash Function Based on Polar Harmonic Transforms and Feature Selection. 420-424 - Pei-Lin Liu, Jian-Hai Jin:

Ship CAE Modeling Based on Tribon XML File. 425-428 - Jianhui Yang, Bin Yang:

Study on Portfolio La-VaR Analysis Based on Copula-Kernel Model. 429-434 - Xia Wang, Qian Yin, Ping Guo

:
Text-independent Speaker Identification Using Fisher Discrimination Dictionary Learning Method. 435-438 - Shuangyan Quan, Jing Zhang:

The Algebraic Method with Computerized Symbolic Computation for Travelling Wave Solutions of the Generalized KP-BBM Equation. 439-441 - Kan Yuan, Dawu Gu, Zheng Guo, Sigang Bao:

A Highly Efficient Correlation Power Analysis on PRINT Cipher. 442-446 - Chang-Ji Wang, Jian-Fa Luo:

A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext. 447-451 - Dexin Yang, Baolin Xu, Bo Yang, Jianping Wang:

A Novel Biometric Authentication Scheme with Privacy Preserving. 452-456 - Heyu Yin, Qiuliang Xu:

A Permanent Secure QKD Protocol Realized with Asymmetric Key Authentication. 457-460 - Yuxi Tan, Lei Tang, Zhinian Gao, Peng Sun, Xiaoyuan Yang, Yu Li:

A Rotation Resistant Image Watermarking Algorithm via Circle. 461-463 - Fengqing Tian, Haili Xue, Xue Haiyang:

A Secure Public Key Encryption from Computational Linear Diffe-Hellman Problem. 464-468 - Xu An Wang

, Liqiang Wu, Jinting Nie, Wei Wang:
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. 469-472 - Xiaoming Hu, WenAn Tan, Cunli Jiang:

Cryptanalysis and Improvement of HIBS without Random Oracle. 473-476 - Fengli Zhang, Qinyi Li, Hu Xiong:

Efficient Revocable Key-Policy Attribute Based Encryption with Full Security. 477-481 - Sheng Li, Dawu Gu, Zhouqian Ma, Zhiqiang Liu:

Fault Analysis of the Piccolo Block Cipher. 482-486 - Zhouqian Ma, Dawu Gu:

Improved Differential Fault Analysis of SOSEMANUK. 487-491 - Tao Shi, Wei Wang, Qiuliang Xu:

Improved Impossible Differential Cryptanalysis of SMS4. 492-496 - Wei Gao, Zhenyou Wang, Fei Li:

On Generic Construction for Private Designated Verifier Signatures. 497-499 - Wei Gao, Zhenyou Wang:

One-round Tripartite Authenticated Batch-Keys Agreement Protocol from Paring. 500-502 - Yingni Duan, Haifeng Zhang, Hong Lv, Junchu Fang:

Research on the First Class M Subsequence. 503-506 - Xu An Wang

, Jinting Nie, Wei Wang:
Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes. 507-510 - Jie Yu, Qingqi Pei:

A Multi-server Architecture Authentication Protocol Using Smart Card. 511-515 - Minda Yu, Qiuliang Xu:

A Simple and Effective Scheme of Ciphertext-Policy ABE. 516-519 - Qiang Li, Ligu Zhu, Saifeng Zeng, Wenqian Shang:

An Improved File System Synchronous Algorithm. 520-524 - Xingxiang Liu:

Constitution of Linear Combinations of Idempotent Matrices and its Properties. 525-529 - Mengmeng Ling, Liji Wu, Xiangyu Li, Xiangmin Zhang, Jinsong Hou, Yong Wang:

Design of Monitor and Protect Circuits against FIB Attack on Chip Security. 530-533 - Ying Cao, Jiachen Liu, Qiguang Miao

, Weisheng Li:
Osiris: A Malware Behavior Capturing System Implemented at Virtual Machine Monitor Layer. 534-538 - Pekka Jäppinen:

Probabilistic Authentication with Very Lightweight Short Hash. 539-543 - Yichun Peng, Yi Niu, Qiwei Hu:

Research on Intrusion Detection System Based on IRBF. 544-548 - Fan Sheng-Li, Mei Yu, Gangyi Jiang, Feng Shao, Zongju Peng:

A Digital Watermarking Algorithm Based on Region of Interest for 3D Image. 549-552 - Awad Kh. Al-Asmari, Ahmed S. Salama

, Abdullah M. Iliyasu
, Mohammed A. Al-Qodah
:
A DWT Ordering Scheme for Hiding Data in Images Using Pixel Value Difference. 553-557 - Nan Luo, Quan Wang, Kefeng Zhang:

A Print-Scan Modeling Scheme Based on BP Neural Network. 558-562 - Tiancheng Zhang, Yifang Yin

, Dejun Yue, Qian Ma, Ge Yu:
A Simulation Platform for RFID Application Deployment Supporting Multiple Scenarios. 563-567 - Yetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:

Constructing the On/Off Covert Channel on Xen. 568-572 - Ruimei Wang, Shengxiong Wang, Tianzhen Wu, Xiling Zhang:

Customers E-trust for Online Retailers: A Case in China. 573-577 - Lin Liu, Kun Jia:

Detecting Spam in Chinese Microblogs - A Study on Sina Weibo. 578-581 - Hailin Hao, Shenghui Su:

Digital Copyright Protection Scheme Based on JUNA Lightweight Digital Signatures. 582-586 - Weimin Wei, Liping Sun:

Innovative Teaching and Learning Experiences in Network Attacks and Defense. 587-590 - Yinping Zhou, Yulong Shen, Qingqi Pei, Xining Cui, Yahui Li:

Security Information Flow Control Model and Method in MILS. 591-595 - Xiaodong Ding, Quan Wang, Pengfei Yang, Haijing Zhou, Yuyan Huang, Haitao Weng, Zhongbin Pan:

Security System for Internal Network Printing. 596-600 - Liping Chen:

Services Selection of QoS-based Skyline Computation for Web Service Composition. 601-604 - (Withdrawn) Services Selection of Transactional Property for Web Service Composition. 605-608

- Weiquan Xian, Houkui Wang, Haoyi He, Donghong Zheng:

The Analysis of University Network Information Security System Based on Level Protection Model. 609-614 - Lanxiang Chen, Zhen Peng:

The Design Principles for User-centered Remote Data Possession Checking. 615-618 - Jianlan Guo, Yuqiang Chen, Chongjie Dong:

The development and implementation of a network-faxing service system. 619-622 - Dongliang Xue, Xiaolong Wu, Yunwei Gao, Ying Song, Xinhui Tian, Zhaopeng Li:

TrustVP: Construction and Evolution of Trusted Chain on Virtualization Computing Platform. 623-630 - Congli Wang, Zhibin Chen, Mingxi Xue, Chao Zhang:

A Novel Blind Evaluation Method on Image Scrambling Degree. 631-635 - Yang Cai, Qiuliang Xu, Zhihua Zheng:

A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme. 636-640 - Anh-Tu Hoang

, Minh-Triet Tran
, Anh Duc Duong, Isao Echizen:
An Indexed Bottom-up Approach for Publishing Anonymized Data. 641-645 - Raja Naeem Akram

, Konstantinos Markantonakis
, Keith Mayes:
Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem. 646-652 - Jun Guo, Liji Wu, Xiangming Zhang, Xiangyu Li:

Design and Implementation of a Fault Attack Platform for Smart IC Card. 653-656 - Litao Wang, Changlin Zhou, Bin Yu:

Laboratory Test and Mechanism Analysis on Electromagnetic Compromising Emanations of PS/2 Keyboard. 657-660 - Yan Cao, Qiang Wei, Qingxian Wang:

The Method for Parallel Approach to Sensitive Point Based on Dynamic Symbolic Execution. 661-665 - Jie Cui, Qiaoyan Wen:

Analysis on Operating Mechanism of SecurityKISS. 666-669 - Lu Zhang, Qingqi Pei, Hongning Li:

Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network. 670-673 - Fen Li, Tong Li, Chunrui Zhang, Yong Wang, Jiang Song:

Length Identification of Unknown Data Frame. 674-677 - Huixian Li, Jinshun Hu, Liwei He, Liaojun Pang:

Mutual Authentication and Ownership Transfer Scheme Conforming to EPC-C1G2 Standard. 678-682 - Yong Zeng, Xin Wang, Lihua Dong, Jianfeng Ma, Zhihong Liu:

Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks. 683-686 - Tao Wen, Zhengfeng Ming, Mengchu Zhou:

Adaptive Finite Element Analysis in the Application of Electromagnetic Mechanics. 687-689 - Jing Wang, Xiao Zhi Gao, Jarno M. A. Tanskanen

, Ping Guo
:
Epileptic EEG Signal Classification with ANFIS Based on Harmony Search Method. 690-694 - Jianlan Guo, Yijun Liu, Yuqiang Chen:

Research on reliable on-chip network using asynchronous logic. 695-698 - Yibo Li, Jian-Qiang Peng, Rui Wang, Bang-Hong Zhao:

The Comparison of Individual Differences in Occupational Differentiation of Peasants in China - The Perspective Based on Differences in Degree of Specialization. 699-703

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














