


default search action
CIS 2015: Shenzhen, China
- 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-8660-9

Intelligent Computation
- Shanshan Li, Yimin Li:

A Recognition Algorithm for Similar Characters on License Plates Based on Improved CNN. 1-4 - Zhihua Song, Han Zhang, Wanfang Che, Xiaobin Hui:

Algorithm for Distance Constrained Aerial Vehicle Routing Problem: Based on Minimum Spanning Tree and Genetic Computation. 5-9 - Juan Yang, Li Huang:

An Improvement and Application of Genetic BP Neural Network. 10-13 - Hejun Xuan, Yuping Wang, Shanshan Hao, Xiaoli Wang:

Cost-Efficient Divisible Load Scheduling Using Genetic Algorithm. 14-17 - Liping Chen, Weitao Ha, Guojun Zhang:

Evaluation Model of Web Service Health Level on End-to-End Network Based on Artificial Immune. 18-21 - Pengcheng Wen, Yadi Zhang, Yahui Li, Xiaoan Li:

Intelligence Computing Technology for UAV's Autonomy. 22-25 - Xin Lin, Yizhou Tang:

Interbank Offered Rate Forecasting Using PSO-LS-SVM. 26-29 - Chenggang Cui, Feng Tian, Ning Yang, Junfeng Chen:

Memory Based Differential Evolution Algorithms for Dynamic Constrained Optimization Problems. 30-33 - Zhendong Liu, Daming Zhu, Qionghai Dai:

Predicting Algorithm of RNA Folding Structure with Pseudoknots. 34-37 - Hong Li, Li Zhang:

Solving Linear Bilevel Programming Problems Using a Binary Differential Evolution. 38-42 - Yong He, Jiechang Wen, Meihua Huang:

Study on Emergency Relief VRP Based on Clustering and PSO. 43-47 - Dapeng Qu, Shuwen Liu, Di Zhang, Jun Wang, Chengxi Gao:

Teaching-Learning Based Optimization Algorithm Based on Course by Course Improvement. 48-52 - Yushi Guo, Zuqing Huang, Yuxiang Yang:

Waste Electrical Recycling Network Optimum Design under the Carbon Cap Constraint. 53-57
Learning Algorithms
- Hassan Dawood, Hussain Dawood

, Ping Guo
:
A Hybrid Image Feature Descriptor for Classification. 58-61 - Chi-Chun Huang, Hsin-Yun Chang:

A Novel SVM-Based Reduced NN Classification Method. 62-65 - Yu Liu, Xinhong Hei, Jinwei Zhao, Yikun Zhang, Guo Xie

:
Fault Diagnosis Based on Prior Knowledge for Train Air-Conditioning Unit. 66-69 - Aihong Ren, Xingsi Xue:

Improved Electromagnetism-Like Algorithm for Nonlinear Bilevel Programming Problem. 70-73 - Tianxiang Feng, Qiujie Zhang:

Model of Environmental Reason Analysis and Prevention of Stroke on Linear Regression. 74-77 - Chao Wang, Tongge Xu, Xi Qin:

Network Traffic Classification with Improved Random Forest. 78-81 - Jie Liu:

On Locating All Local Minima of Multidimensional Function for Box Constrained. 82-85 - Jing Meng, Hou-Biao Li

:
Recycling BiCG for Families of Shifted Linear Systems. 86-90 - Jing Nie:

Research on Mobile Learning Platform Construction in Higher Vocational Colleges Based on Cloud Computing. 91-94 - Shan Sun, Ruliang Wang:

Robust Stability of Uncertain Nonlinear Delay Segmentation System Based on Delay. 95-99 - Hongxia Liu, Tianxiang Feng:

Study on the Convergence of Solving Linear Equations by Gauss-Seidel and Jacobi Method. 100-103
Intelligent Systems and Complex Systems
- Jinquan Li, Jinhua Zhang:

A 2-Approximation Algorithm for the Single Machine Due Date Assignment Scheduling Problem in Fuzzy Environment to Minimize the Total Costs. 104-108 - Xin Li

:
A Quantity-Flexibility Contract in Two-Stage Decision with Supply Chain Coordination. 109-112 - Wei Wang, Hai Zhu, Xiaoli Wang:

A Robust Quasi-Dense Wide Baseline Matching Method. 113-116 - Hai Zhu, Wei Wang, Xiali Wang, Fei Wei:

An Effective Energy-Based Multi-view Piecewise Planar Stereo Method. 117-120 - Xiaole Cai, Yahui Li, Yadi Zhang, Peng Li:

An Efficient Address Mapping Algorithm for Multichannel Structure SSD. 121-124 - Zhao Fang, Jianjun Zhao, Haifeng Tang, Guangmin Wu:

Design and Implementation of Embedded Remote Control System in High-Precision Time Data Acquisition. 125-128 - Guoqiang Hang, Yang Yang, Xuanchang Zhou, Xiaohui Hu, Danyan Zhang:

Dynamic Quaternary Circuit with Neuron-MOS Transistor. 129-133 - Qin Lin, Yun Xue, Wensheng Chen, Shuqun Ye, Wanli Li, Jingjing Liu:

Parallel Large Average Submatrices Biclustering Based on MapReduce. 134-137 - Yulin Hai, Xiaodong Zhao, Yongqiang Liu:

Reconfigurable Computing Availability and Developing Trends. 138-141
Pattern Recognition and Knowledge Discovery
- Yuejin Bai, Yang Zhang, Zhaohui Li:

3D Video Coding Using Just Noticeable Depth Difference Based on H.265/HEVC. 142-145 - Wei He, Shuang Li, Xiaoping Yang:

A Hybrid Approach for Reducing Textual Formal Context Based on Thesaurus. 146-149 - Jingzhe Wang, Yue Cheng, Jianchun Xie, Wensheng Niu:

A Real-Time Sensor Guided Runway Detection Method for Forward-Looking Aerial Images. 150-153 - Di Li, Yadi Zhang, Pengcheng Wen, Linting Bai:

A Retinex Algorithm for Image Enhancement Based on Recursive Bilateral Filtering. 154-157 - Guanghui Deng, Zengli Liu:

A Wavelet Image Denoising Based on the New Threshold Function. 158-161 - Xiangyu Deng, Zengli Liu:

An Improved Image Denoising Method Applied in Resisting Mixed Noise Based on MCA and Median Filter. 162-166 - Shulei Wu, Liya Dong, Huandong Chen, Jinmei Zhan:

Application of Image Classification Technology in Mangrove Information Extraction. 167-170 - Fuqiang Zhang, Zengli Liu:

Image Denoising Based on the Bivariate Model of Dual Tree Complex Wavelet Transform. 171-174 - Jie Liang, Wenzhang He, Dongjiang Ji, Lina Wang:

Image Reconstruction Algorithm for Modified SART Based on PM Model. 175-178 - Jing Li, Weiwei Wang, Xiaoping Li:

Image Retargeting Based on a New Salient Region Detection Method. 179-182 - Xu Zhao, Fei Deng, Hua Liang, Long Zhou:

Monitoring the Deformation of the Facade of a Building Based on Terrestrial Laser Point-Cloud. 183-186 - Pengfei Xu, Qiguang Miao

, Tiange Liu, Xiaojiang Chen:
Multi-direction Edge Detection Operator. 187-190 - Wensheng Chen, Yang Zhao, Binbin Pan, Chen Xu:

Nonlinear Nonnegative Matrix Factorization Based on Discriminant Analysis with Application to Face Recognition. 191-194 - Huizhen Jia, Quansen Sun, Tonghan Wang:

PCANet for Blind Image Quality Assessment. 195-198 - Yuhui Liu:

Some Properties of (F-K)-Convex Mapping in Vector Spaces. 199-202 - Guanghui Deng, Zengli Liu:

Study of Edge Detection Based on SQI Algorithm and Morphology. 203-205
Data Mining
- Juan Li:

A Feature Subset Selection Algorithm Based on Feature Activity and Improved GA. 206-210 - Chunlong Fan, Chang Liu, Guohui Ding, Li Xu:

A Method of Circle Curve Fitting Based on the Cumulative Error of the Radius Error. 211-214 - Qingtai Xiao

, Shibo Wang, Zhan Zhang, Jianxin Xu:
Analysis of Sunspot Time Series (1749-2014) by Means of 0-1 Test for Chaos Detection. 215-218 - Kaimei Zheng:

Content-Based Image Retrieval for Medical Image. 219-222 - Qin Liu, Zhongwei Ma, Xiaowen Yang, Hongming Zhu:

Identifying Influential Actors in Social Network Platforms. 223-226 - Xiaoping Li, Weiwei Wang, Amir Razi, Tao Li:

Nonconvex Low-Rank Sparse Factorization for Image Segmentation. 227-230 - Xingsi Xue, Jianhua Liu, Pei-Wei Tsai

, Xianyin Zhan, Aihong Ren:
Optimizing Ontology Alignment by Using Compact Genetic Algorithm. 231-234 - Peng Sun, Ziyan Wu

, Haifeng Yang, Zhengfeng Ming, Xin Guo:
Research Methods of Sensors Validation Based on Naive Bayesian Classifier. 235-238 - Yanan Zhang, Yao Lu:

Robust Object Tracking Enhanced by Correction Dictionary. 239-242 - Zhixiang He, Xiaoli Sun, Xiujun Zhang

, Chen Xu:
Saliency Detection via Nonconvex Regularization Based Matrix Decomposition. 243-247
Optimization Theory and New Methods
- Xueyi Liang, Hai-Lin Liu, Qiang Wang:

4G Heterogeneous Networks Base Station Planning Using Evolutionary Multi-objective Algorithm. 248-252 - Hongwei Lin:

A Differential Evolution Algorithm Based on Local Search and Boundary Reflection for Global Optimization. 253-257 - Wei Yue, Yuping Wang:

A Fuzzy Multi-objective Portfolio Selection Model with Transaction Cost and Liquidity. 258-261 - Fei Qin, Jie Liu:

A Hybrid Algorithm for Global Optimization. 262-265 - Jing Li, Baoming Qiao:

A Novel Differential Evolution Algorithm with K-Means and Simplex Search Method for Absolute Value Equations. 266-269 - Cai Dai, Xiujuan Lei:

A Novel Evolutionary Algorithm Based on Decomposition and Adaptive Weight Adjustment for Synthesis Gas Production. 270-273 - Jun Yang, Jingxuan Wei, Jiang Liu:

Adaptive Differential Evolution Algorithm Based on Gradient and Polar Coordinates Search Strategies. 274-277 - Haixia Guo:

Construction of Pooling Designs with Affine Symplectic Space. 278-281 - Haiyan Liu, Shiwei Guan, Fangjie Liu, Yuping Wang:

Cooperative Co-evolution with Formula Based Grouping and CMA for Large Scale Optimization. 282-285 - Shuiqin Dai, Hai-Lin Liu, Lei Chen:

Evolutionary Many-Objective Optimization Algorithm Based on Improved K-Dominance and M2M Population Decomposition. 286-290 - Xiaofang Guo, Xiaoli Wang, Zhen Wei:

MOEA/D with Adaptive Weight Vector Design. 291-294 - Liping Jia, Guocheng Zou, Zhonghua Li:

Target-Vector Based Particle Swarm Optimization for Multi-objective Bilevel Programming Problem. 295-298
Access Control and Protection
- Kaige Qu

, Liji Wu, Xiangmin Zhang:
A Novel Detection Algorithm for Ring Oscillator Network Based Hardware Trojan Detection with Tactful FPGA Implementation. 299-302 - Jianguo Jiang, Xiang Jing, Bin Lv, Meimei Li:

A Novel Multi-classification Intrusion Detection Model Based on Relevance Vector Machine. 303-307 - Fatma Hachmi, Mohamed Limam:

A Two-Stage Process Based on Data Mining and Optimization to Identify False Positives and False Negatives Generated by Intrusion Detection Systems. 308-311 - Haifeng Li, Bo Shuai, Jian Wang, Chaojing Tang:

Protocol Reverse Engineering Using LDA and Association Analysis. 312-316 - Bo Shuai, Haifeng Li, Lei Zhang, Quan Zhang, Chaojing Tang:

Software Vulnerability Detection Based on Code Coverage and Test Cost. 317-321
Cryptography and Cryptanalysis
- Lihui Wang, Qing Li, Gang Zhang, Jun Yu, Zhimin Zhang, Limin Guo, David Wei Zhang:

A New SPA Attack on ECC with Regular Point Multiplication. 322-325 - Yaling Zhang, Liang Yang, Shangping Wang

:
An Efficient Identity-Based Signature Scheme for Vehicular Communications. 326-330 - Liangjian Su, Wei Guo, Zheng Guo:

Combined Attack on Blinded Fault Resistant Exponentiation Algorithm and Efficient Countermeasure. 331-334 - Shifeng Zhang, Shenghui Su:

Design of Parallel Algorithms for Super Long Integer Operation Based on Multi-core CPUs. 335-339 - Bo Yang, Zhao Yang, Nengfei Liu, Shougui Li:

Further Attacks and Improvement of a Certificateless Signature Scheme. 340-344 - Zhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong:

The Design of a Key Expansion Algorithm Based on Dynamic Dislocation Counts. 345-349
Data Security and Integrity
- Limin Guo, Lihui Wang, Dan Liu, Weijun Shan, Zhimin Zhang, Qing Li, Jun Yu:

A Chosen - Plaintext Differential Power Analysis Attack on HMAC - SM3. 350-353 - Limin Guo, Lihui Wang, Qing Li, Jun Yu, Peng Luo:

Differential Power Analysis on Dynamic Password Token Based on SM3 Algorithm, and Countermeasures. 354-357 - Jiani Li, Donghai Tian, Changzhen Hu:

Dynamic Tracking Reinforcement Based on Simplified Control Flow. 358-362 - Jinfeng Li, Tao Wu:

Perceptual Audio Hashing Using RT and DCT in Wavelet Domain. 363-366 - Aymen Akremi

, Hassen Sallay
, Mohsen Rouached, Mohamed-Fouad Sriti, Mohamed Abid, Rafik Bouaziz:
Towards a Built-In Digital Forensics-Aware Framework for Web Services. 367-370
Information System Safety
- Jiachao Chen, Qin Wang, Zheng Guo, Junrong Liu, Haihua Gu:

A Circuit Design of SMS4 against Chosen Plaintext Attack. 371-374 - Xue Wang, Lequan Min, Mei Zhang:

A Generalized Stability Theorem for Continuous Chaos Systems and Design of Pseudorandom Number Generator. 375-380 - Shaohui Zhang, Liji Wu, Xiangmin Zhang, Xingjun Wu, Xiangyu Li, Huajun Fang:

A Template Attack-Resistant Masking Scheme for RC4 Based on FPGA. 381-384 - Jingxi Li, Xin Xu, Lejian Liao, Lu Li:

Concolic Execute Fuzzing Based on Control-Flow Analysis. 385-389 - Caiming Liu, Yan Zhang, Zhonghua Li, Jiandong Zhang, Hongying Qin, Jinquan Zeng:

Dynamic Defense Architecture for the Security of the Internet of Things. 390-393 - Miao Yuan, Guoqiang Bai:

Improving Second-Order DPA Attacks with New Modeled Power Leakages. 394-397 - Qian Lei, Liji Wu, Shaohui Zhang, Xiangmin Zhang, Xiangyu Li, Liyang Pan, Zhimeng Dong:

Software Hardware Co-design for Side-Channel Analysis Platform on Security Chips. 398-401
Network and Wireless Security
- Jing Wang, Ying Yang, Lijuan Chen, Guang Yang, Zhenya Chen, Liqiang Wen:

A Combination of Timing Attack and Statistical Method to Reduce Computational Complexities of SSL/TLS Side-Channel Attacks. 402-406 - Wei Li, Xiufen Yu:

An Online Flow-Level Packet Classification Method on Multi-core Network Processor. 407-411 - Xi Qin, Tongge Xu, Chao Wang:

DDoS Attack Detection Using Flow Entropy and Clustering Technique. 412-415 - Jingbo Jiao, Gangcan Sun, Zhuo Han, Zhongyong Wang:

Exact Physical Layer Security in SIMO Wiretap Channels with Antenna Correlation. 416-419
Security Methodologies and Management
- Miao Ye, Meiling Zhao, Xiaohui Cheng:

A New Minimum Exposure Path Problem and Its Solving Algorithm. 420-423 - Xudong Miao, Yongchun Wang, Xingchen Cao, Binbin Qu, Sheng Jiang, Feng Fang:

A Software Assessment Method Based on Relevance Vulnerability. 424-427 - Yahui Li, Yadi Zhang, Peng Li, Peng Guo:

An Efficient Trusted Chain Model for Real-Time Embedded Systems. 428-432 - Le Wang, Yunmin Sun, Peng Guo, Yadi Zhang:

An Enhanced Reconfiguration Method for the Second Generation Integrated Modular Avionics. 433-436 - Yan Zhang, Caiming Liu, Zhonghua Li, Hongying Qin, Qin Li, Jinquan Zeng:

Immunity-Based Detection for Large-Scale Behavior of Denial of Service. 437-440 - Xiao Liang:

Strategies for Analysis against Redundant Reused Codes in Safety-Critical Software. 441-445
System Analysis and Modeling
- Yingjiu Guo, Xuemei Liu:

A Research on the Localization Technology of Wireless Sensor Networks Employing TI's CC2530 Instrument. 446-449 - Shulei Wu, Zongan Zhang, Huandong Chen, Jinmei Zhan:

Application of an Improved Method of Wavelet Transform in Image Edge Detection. 450-453 - Guo Xie

, Minying Ye, Xinhong Hei, Jinwei Zhao, Fucai Qian:
Data-Based Health State Analysis for the Axle of High Speed Train. 454-457 - Lei Fan, Sha Meng, Yanfang Liang, Xiyang Liu:

Experimental Analysis on CTT-SP Algorithm for Intermediate Data Storage in Scientific Workflow Systems. 458-461 - Baitong Zhou, Zengli Liu:

Method of Multi-resolution and Effective Singular Value Decomposition in Under-determined Blind Source Separation and Its Application to the Fault Diagnosis of Roller Bearing. 462-465 - Wenxue Niu, Congmou Yuan, Dansong Zhang:

Research on Rural Population Flow of China's County Urbanization. 466-469 - Mi Wang, Dong Kang:

Research on Semantic Representation to Promote the Correlation of Instructional Micro Video. 470-473 - Bin Wang, Fan Li, Xinhong Hei, Weigang Ma, Lei Yu:

Research on Storage and Retrieval Method of Mass Data for High-Speed Train. 474-477 - Qian Xu, Yajuan Yang, Quanju Zhang:

Research on the Influence Factors of Entrepreneurial Environment. 478-481 - Qin Zhao, Yuchao Li, Xinhong Hei, Xiaofan Wang:

Toward Automatic Calculation of Construction Quantity Based on Building Information Modeling. 482-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














