


default search action
CIS 2017: Hong Kong
- 13th International Conference on Computational Intelligence and Security, CIS 2017, Hong Kong, China, December 15-18, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-4822-3

Regular Papers
Intelligent Algorithms and Models 1
- Si-Yuan Jing, Caiming Liu, Gongliang Li, Gaorong Yan, Yan Zhang:

An Efficient Algorithm for Parallel Computation of Rough Entropy Using CUDA. 1-5 - Junhua Liu, Yuping Wang, Xingyin Wang, Xin Sui, Si Guo, Liwen Liu:

An alpha-Dominance Expandation Based Algorithm for Many-Objective Optimization. 6-10 - Xingsi Xue, Aihong Ren:

Using Memetic Algorithm For Matching Process Models. 11-15 - Zhonghua Li, Liping Jia, Caiming Liu:

An Effective Solution to Nonlinear Bilevel Programming Problems Using Improved Particle Swarm Optimization Algorithm. 16-19 - Yongchao Han, Ming Li, Jie Liu:

Improving Hybrid Gravitational Search Algorithm for Adaptive Adjustment of Parameters. 20-24 - Songbai Liu

, Qiuzhen Lin
, Jianyong Chen:
A Novel Multi-objective Evolutionary Algorithm Based on a Further Decomposition Strategy. 25-29 - Hejun Xuan, Yuping Wang, Shiwei Guan, Zhanqi Xu:

A New Optimization Model and Algorithm for a Network Scheduling Problem in Inter-Datacenters Elastic Optical Networks. 30-34 - Long Zhao, Jingxuan Wei, Minghan Li

:
Research on Video Server Placement and Flux Plan Based on GA. 35-38 - Shanfeng Wang

, Maoguo Gong, Can Qin, Junwei Yang:
A Multi-objective Framework for Location Recommendation Based on User Preference. 39-43 - Xin Li, Jingxuan Wei, Yang Liu:

A Memetic Particle Swarm Optimization Algorithm to Solve Multi-objective Optimization Problems. 44-48 - Cai Dai, Xiujuan Lei:

An Improvement Based Evolutionary Algorithm with Adaptive Weight Adjustment for Many-Objective Optimization. 49-53 - Li Zhang, Hong Li:

BPSOBDE: A Binary Version of Hybrid Heuristic Algorithm for Multidimensional Knapsack Problems. 54-58
Intelligent Systems with Applications 1
- Qin Zhao, Zhaoxi Ma

, Xinhong Hei, Yiyun Zhu, Juntao Niu:
A 3-D Structural Components Automatic Modeling Method Based on BIM. 59-63 - Guangqing Long, Lifeng Xuan, Jianjun Chen:

Extrapolation of Discrete Multi-projection Methods for Fredholm Integral Equations of the Second Kind. 64-68 - Guangjing Li, Hong Bao

, Bo Wang, Tao Wu:
Kernelised Rényi Distance for Localization and Mapping of Autonomous Vehicle. 69-72 - Kaijing Shi, Hong Bao

, Nan Ma:
Forward Vehicle Detection Based on Incremental Learning and Fast R-CNN. 73-76 - Xinlei Feng, Xiaoli Yang:

New Protocols on Group Consensus of Continuous-Time Multi-agent Systems. 77-81 - Jiabin Lin, Hai-Lin Liu, Chaoda Peng:

The Effect of Feasible Region on Imbalanced Problem in Constrained Multi-objective Optimization. 82-86 - Jing Meng, Yaokun Wu:

Block DGMRES Algorithm for the Drazin-Inverse Solution of Singular Nonsymmetric Linear System with Multiple Right-Hand Sides. 87-90
Pattern Recognition and Knowledge Discovery 1
- Peng Sun, Ziyan Wu

, Haifeng Yang, Xiaoxiao Liu, Kang Chen:
Sensors Validation Based on Bayesian Classifiers. 91-96 - Wenping Ma, Yue Wu

, Maoguo Gong, Can Qin, Shanfeng Wang
:
Local Probabilistic Matrix Factorization for Personal Recommendation. 97-101 - Miao Ye, Hongbing Qiu, Yong Wang, Fan Zhang:

Cell Image Classification Based on the Support Vector Machine and D-S Evidence Theory. 102-106 - Xiaojie Shi:

Research on Flower Image Classification Using Sum-Product Networks. 107-110 - Xiaoma Xu, Renbin Gong, Yinghao Li, Jinnuo Li, Qun Li, Zhenzhen Xu:

Binary Histogram of Oriented Gradients Based Dynamometer Card Recognition. 111-114 - Qiong Shen, Bin Gui, Jianlin Zhu:

Research on Identifying Emotion Sentence Based on Fuzzy Information Granulation. 115-119 - Xiaoting Zhang, Xiaoli Sun, Xiujun Zhang

:
Salient Object Detection Via Nonconvex Structured Matrix Decomposition. 120-124 - Jing Gao, Xing-fu Cai:

Image Matching Method Based on Multi-scale Corner Detection. 125-129 - Weitong Li, Yu Cheng, Yuehui Sun, Shaoqiu Xu:

Multi-focus Image Performance Evaluation Method Based on the Extraction and Combination of Multiple Metrics. 130-134 - Qiang Pan, Ping Guo

, Xin Xin, Junshuai Liu:
Extracting Company-Specific Keyphrases from News Media. 135-139 - Wenlong Ke, Yong Wang, Xiaochun Lei

, Bizhong Wei:
Spark-Based Feature Selection Algorithm of Network Traffic Classification. 140-144 - Xirong Xu, Soomro Pir Dino, Huifeng Zhang, Huijun Jiang, Cong Liu:

Decycling Number of Crossed Cubes CQn. 145-150
Data Mining and Clustering 1
- Bin Gui, Qiong Shen:

Research on Emotional Word Clustering Based on Affinity Propagation. 151-154 - Xiong Li, Che Wang, Liyue Liu, Xuewen Xia

:
A Method for Heterogeneity Analysis of Complex Diseases Based on Clustering Algorithm. 155-158 - Shihu Liu

, Liping Jia, Fusheng Yu:
On Gradient Weighting Based Fuzzy Clustering for Graph Data. 159-163 - Xinxin Huang, Shu Gong:

Analysis of Big-Data Based Data Mining Engine. 164-168 - Wuning Tong, Yuping Wang, Junkun Zhong, Wei Yan:

A New Weight Based Density Peaks Clustering Algorithm for Numerical and Categorical Data. 169-172 - Ying Li, Xianghong Lin, Xiangwen Wang, Fanqi Shen, Zuzheng Gong:

Credit Risk Assessment Algorithm Using Deep Neural Networks with Clustering and Merging. 173-176 - Huiyi Zhou, Yong Wang, Xiaochun Lei

, Yuming Liu:
A Method of Improved CNN Traffic Classification. 177-181 - Jiai He, Panpan Du, Xing Chen:

Parameter Estimation of Communication Signal in Alpha-stable Distribution Noise Environment. 182-186 - Qiang Xiao, Lingyu Wang, Tingwen Huang:

Passivity of Inertial Neural Networks with Delays on Time Scales. 187-191 - Yingzi Fu, Dexin Ren:

Bayesian Spatial Nonparametric Models for Confounding Manifest Variables with an Application to China Earthquake Data. 192-196
Global Optimization Methods 1
- Qunjian Chen, Xiaoliang Ma, Zexuan Zhu, Yiwen Sun:

Evolutionary Multi-tasking Single-Objective Optimization Based on Cooperative Co-evolutionary Memetic Algorithm. 197-201 - Qiang Wang, Tiejun Chen, Hai-Lin Liu:

Resource Allocation for D2D Underlay Communication Systems Using PSO. 202-206 - Meng Han, Sanyang Liu:

An Improved Binary Chicken Swarm Optimization Algorithm for Solving 0-1 Knapsack Problem. 207-210 - Jiangshan Liu, Yumei Zhang, Shulin Bai:

An Adaptive Artifical Bee Colony Algorithms Based on Global Best Guide. 211-215 - Rui Sun:

An Algorithm for Global Optimization Based on CFO-BFGS. 216-218 - Baoming Qiao, Le Gao, Fei Wei:

A New Filled Function Method for the Non-convex Global Optimization. 219-223 - Jiehao Guo, Xingbao Gao, Mengnan Tian:

A Gravitation-Based Chaos Water Cycle Algorithm for Numerical Optimization. 224-228 - Fei Wei, Shugang Li, Jinfeng Xue:

A New Local Searching Strategy for Global Optimization with a Large Number of Local Optimum. 229-232 - Liping Jia, Zhonghua Li:

A Teaching-Learning-Based Optimization with Uniform Design for Solving Constrained Optimization Problems. 233-237
Cryptography and Cryptanalysis 1
- Sihang Pu, Zheng Guo, Junrong Liu, Dawu Gu, Yingxuan Yang, Xiaoke Tang, Jie Gan:

Boolean Matrix Masking for SM4 Block Cipher Algorithm. 238-242 - Lihua Dong, Hui Yang, Yong Zeng:

Analysis and Improvement of True Random Number Generator Based on Autonomous Boolean Network. 243-247 - Kaiyu Zhang, Sen Xu, Dawu Gu, Haihua Gu, Junrong Liu, Zheng Guo, Ruitong Liu, Liang Liu, Xiaobo Hu:

Practical Partial-Nonce-Exposure Attack on ECC Algorithm. 248-252 - Jian Zhao, Hai-Ying Gao:

LSSS Matrix-Based Attribute-Based Encryption on Lattices. 253-257
Information Security and Integrity 1
- Safia Bourahla, Yacine Challal

:
Social Networks Privacy Preserving Data Publishing. 258-262 - Chunyan Zhang, Yan Ma, Huili Hu, Miaomiao Ren:

A Kind of Knowledge Metadata Management Model Research Based on Semantic Grid. 263-267 - Jiong Wang, Boquan Li, Yuwei Zeng

:
XGBoost-Based Android Malware Detection. 268-272 - Liping Chen, Weitao Ha:

Conformance Checking and QoS Selection Based on CPN for Web Service Composition. 273-276
Network Security 1
- Duo Wu, Yong Wang, Hao Feng, Yiming Huan:

Optimization Design and Realization of Ceph Storage System Based on Software Defined Network. 277-281 - Chaoqun Yang, Xiangyu Li, Yongchang Liu, Shujuan Yin:

Risk-Aware Leakage Resiliency for Wireless Sensor Network Nodes. 282-286 - Ding Li

, Yuefei Zhu, Wei Lin:
Traffic Identification of Mobile Apps Based on Variational Autoencoder Network. 287-291 - Lingjie Zhou, Yong Zeng, Yi He, Zhongyuan Jiang, Jianfeng Ma:

Multi-hop Based Centrality of a Path in Complex Network. 292-296 - Longfei Wang, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma:

A Survey of Network Reconstruction on Social Network. 297-301
Security Methodologies and Management 1
- Chunmei Zhang, Yang Li, Zibin Chen:

DPETs: A Differentially Private ExtraTrees. 302-306 - Imen Khabou, Mohsen Rouached, Alexandre Viejo

, David Sánchez
:
Using Searchable Encryption for Privacy-Aware Orchestrated Web Service Composition. 307-311 - Yinrong Qiao, Yuxing Zhang, Xiao Du:

A Vision-Based GPS-Spoofing Detection Method for Small UAVs. 312-316 - Yi Liu, Ruilin Li, Xingtong Liu, Jian Wang, Chaojing Tang, Hongyan Kang:

Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm. 317-321
System Analysis and Modeling
- Jing Chen, Yanan Yu:

Curiosity-Driven Intrinsic Motivation Cognitive Model in Perception-Action Loop. 322-326 - Bo Zhao, Chao Ji, Lidan Li, Qianya Guo, Qian Liu, Jing Zhou:

Scaled Context Region for Correlation Filter Tracking. 327-330 - Lu Jia, Haolan Zhang

:
Improving Managerial Efficiency Through Analyzing and Mining Resigned Staff Data. 331-335 - Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong:

Implementing a ARM-Based Secure Boot Scheme for the Isolated Execution Environment. 336-340 - Dan Wu, Yuxiang Yang:

Cost-Sharing Contract of Supply Chain Based on Carbon Emission Control. 341-345 - Zhihua Song, Han Zhang, Ying Wang, Linghui Zhang:

Unmanned Aerial Vehicles Rapid Delivery Routing of the Emergency Rescue in the Complex Mountain Region. 346-349 - Haiyan Zhang, Yajuan Yang:

Optimal Control Model of Pension Funds Under Continuous Time. 350-354 - Ya-Juan Yang, Hong Zhang:

Model Analysis for Estimating Optimal Hedging Ratio of Stock Index Futures. 355-358 - Xiaoli Wang, Haiming Ma, Junfan Lai:

Periodic Multi-installment Load Partition, Distribution and Result Collection. 359-362
Short Papers
Intelligent Algorithms and Models 2
- Yuanjian Zhou, Xiaohui Yang:

A Widely Linear Affine LMS Adaptive Algorithm with Momentum Acceleration for DS-CDMA MAI Suppression. 363-366 - Wentao Huang, Guoqiang Deng, Aimin Tang, Lijie Hao, Guirong Jiang:

Dynamics of a Saturation Incidence SIRS Epidemic Model with Pulses at Different Moments. 367-370 - Wenwen Ye, Jiechang Wen:

Adaptive Fireworks Algorithm Based on Simulated Annealing. 371-375 - Qin Zhao, Qing Tian, Xinhong Hei, Yuchao Li, Zhaoxi Ma:

Toward Automatic Review of Bridge Template Turnover Based on Building Information Modeling. 376-380 - Jing Li, Jie Liu, Meili Wang, Fei Wei:

A New Algorithm for Computing All Solutions of an Absolute Value Equation. 381-384 - Zhongwei Si:

The Asymptotic Growth Behavior of Entire Solutions to Higher Dimensional Polynomial Cauchy-Riemann Equations. 385-389 - Xiangmin Han, Hong Bao

, Zuxing Xuan, Feng Pan:
A Predictive Control Algorithm Based on Driving Behavior Data Model. 390-394 - Qingxia Kong, Yaoyao Fu, Zhendong Liu:

Possible Transitions Between Types of Pseudoknots of RNA Structure. 395-399 - Shaoxiong Ma, Qin Zhao, Xinhong Hei, Cunli Chen:

The Method of Integrated Pipeline Intelligent Conversion of BIM Design Model into Fine BIM Construction Model. 400-404 - Jun Yang, Hong Bao

, Nan Ma, Zuxing Xuan:
An Algorithm of Curved Path Tracking with Prediction Model for Autonomous Vehicle. 405-408
Intelligent Systems with Applications 2
- Yao Zhang, Min Li:

Motion Segmentation Using Collaborative Low-Rank and Sparse Subspace Clustering. 409-414 - Liang Qiao, Hong Bao

, Zuxing Xuan, Qing Yang:
Regression Model of Autonomous Lateral Rectification with Driver Perception. 415-418 - Hui Li, Qin He, Hong Bao

, Nan Ma, Guilin Pang:
Segmental Offset-Mapping Parallel Coordinates for Multidimensional Integer Dataset. 419-422 - Xiaohao Liang, Zuqing Huang:

Research on the Pricing Strategy of Manufacturer's Dual Channel under the Closed-Loop Supply Chain. 423-426 - Hui Zhang, Yu Du, Shurong Ning, Yonghua Zhang, Shuo Yang, Chen Du:

Pedestrian Detection Method Based on Faster R-CNN. 427-430 - Lei Li, Lindi Xiao, Meng Zhang, Jingyi Kong, Hui Sun:

Agent-Based Simulation of Evacuation Considering Extreme Weather in Tourist Areas. 431-434 - Guoqiang Deng, Aimin Tang, Miaomiao Xing, Lin Ling, Guirong Jiang, Wentao Huang:

Dynamics of a Stochastic SIS Epidemic Model with Birth Pulses and Pulse Treatments. 435-438 - Gaochang Zhao, Kewei Jie, Jie Liu:

A New Difference Scheme for Hyperbolic Partial Differential Equations. 439-441
Pattern Recognition and Knowledge Discovery 2
- Lejun Zhang, Weijie Zhao, Chunhui Zhao:

Research on Information Propagation Method Based on Individual User Characteristics. 442-446 - Yumin Tian, Lin Deng, Qiang Li:

A KNN Match Based Tracking-Learning-Detection Method with Adjustment of Surveyed Areas. 447-451 - Yiming Wang, Yuan Rao, Lianwei Wu

:
A Review of Sentiment Semantic Analysis Technology and Progress. 452-455 - Zhanli Li, Pengrui Yuan, Fang Yang, Hong-an Li:

View-Normalized Gait Recognition Based on Gait Frame Difference Entropy Image. 456-459 - Bin Zhou, Xuemei Duan, Jun Feng

:
A Weighted Error Compensation Algorithm for Image Denoising Based on Noise Variance Estimation. 460-464 - Xia Li, Qifan Wen, Kongxin Pan:

Unsupervised Off-Topic Essay Detection Based on Target and Reference Prompts. 465-468 - Zhendong Liu, Qingxia Kong, Yaoyao Fu, Hongchao Ye, Shimin Zhao, Xinhong Su, Kai Jiang, Hui Wang, Kunle Dong, Zhenxiong Song, Yujie Wang:

The Algorithm and Scheme of Prediction in RNA Folding Structure with Pseudoknots. 469-474
Data Mining and Clustering 2
- Chenguang He, Wei Li, David Chik:

Waveform Compensation of ECG Data Using Segment Fitting Functions for Individual Identification. 475-479 - Yier Lin

, Julien Le Kernec
:
Performance Analysis of Classification Algorithms for Activity Recognition Using Micro-Doppler Feature. 480-483 - Hang Yu, Zhen Wang, Qian Yin, Ping Guo

:
A Comprehensive Study of Blind and Non-blind Deconvolution Methods Applied to Spectrum Extraction. 484-487 - Yun Jiang, Xi Liu, Guolei Yan, Jize Xiao:

Modified Binary Cuckoo Search for Feature Selection: A Hybrid Filter-Wrapper Approach. 488-491 - Ruliang Wang, Yang Xuan:

A Research on the Improvement of Dual Optimization on BP Neural Network. 492-495 - Junfeng Chen, Zhoudong Hua, Jingyu Wang, Shi Cheng:

A Convolutional Neural Network with Dynamic Correlation Pooling. 496-499 - Dong Ding

, Junhuai Li, Huaijun Wang, Zhu Liang:
Student Behavior Clustering Method Based on Campus Big Data. 500-503
Global Optimization Methods 2
- Yanzhi Ren, Sanyang Liu:

Modified Particle Swarm Optimization Algorithm for Engineering Structural Optimization Problem. 504-507 - Aihong Ren, Xingsi Xue:

Solution Strategy for Bilevel Linear Programming in Fuzzy Random Circumstances. 508-511 - Xiaolin Yang, Bin Zhou, Jun Feng

:
A New Filled Function Method with Unconstrained Global Optimization. 512-515 - Juan Li, Ning Dong:

Gravitational Search Algorithm with a New Technique. 516-519 - Baoming Qiao, Liping Yang, Jie Liu, Yanru Yao:

A Mixed Conjugate Gradient Method for Unconstrained Optimization Problem. 520-523
Cryptography and Cryptanalysis 2
- Sen Xu, Haihua Gu, Lingyun Wang, Zheng Guo, Junrong Liu, Xiangjun Lu, Dawu Gu:

Efficient and Constant Time Modular Inversions Over Prime Fields. 524-528 - Mengmeng Xu, Liji Wu, Xiangmin Zhang:

Side Channel Attack on SM4 Algorithm with Ensemble Method. 529-532 - Gaofeng Yang, Yihong Long:

Ciphertext Number Full Operations Based on Paillier Algorithm. 533-536
Information Security and Integrity 2
- Lap Q. Trieu, Trung-Nguyen Tran, Mai-Khiem Tran, Minh-Triet Tran

:
Document Sensitivity Classification for Data Leakage Prevention with Twitter-Based Document Embedding and Query Expansion. 537-542 - Jiaxi Ye, Bin Zhang, Ziqing Ye, Chao Feng, Chaojing Tang:

Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases Prioritizing. 543-547 - Bin Zhang, Jiaxi Ye, Chao Feng, Chaojing Tang:

S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing. 548-552 - Cong Peng, Qingjin Deng, Zhi-an Huang

, Yiwen Sun, Zexuan Zhu:
G-FQZip: Lossless Reference-Based Compression of FASTQ Files Using GPUs. 553-556 - Wantong Zheng, Chunfu Jia:

CombinedPWD: A New Password Authentication Mechanism Using Separators Between Keystrokes. 557-560 - Ying Liu, Yihong Long, Xu Zhou, Fengli Li:

Secure System Logon Based on IBC and Mobile Terminal. 561-565
Network Security 2
- Wenlin Meng, Wenfeng Zhu, Chi Zhang, Junrong Liu, Zheng Guo, Dawu Gu, Wei Fan

, Haifeng Zhang, Yidong Yuan:
An Implementation of Trojan Side-Channel with a Masking Scheme. 566-569 - Weitao Ha:

Reliability Prediction for Web Service Composition. 570-573 - Mengli Liu, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma:

Centrality Based Privacy Preserving for Weighted Social Networks. 574-577 - Bo Huo, Yihong Long, Jinglin Wu:

A Secure Web Email System Based on IBC. 578-581
Security Methodologies and Management 2
- Yindong Chen, Liping Li, Ziran Chen:

An Approach to Verifying Data Integrity for Cloud Storage. 582-585 - Juhani Anttila, Kari Jussila:

Challenges for the Comprehensive and Integrated Information Security Management. 586-589 - Wan Lei, Lihui Wang, Weijun Shan, Kun Jiang, Qing Li:

A Frequency-Based Leakage Assessment Methodology for Side-Channel Evaluations. 590-593
System Analysis and Modeling
- Ha V. Hoang

, Minh-Triet Tran
:
DeepSense-Inception: Gait Identification from Inertial Sensors with Inception-like Architecture and Recurrent Network. 594-598 - Muhammad Waqar, Hassan Dawood, Ping Guo

, Muhammad Bilal Shahnawaz, Mustansar Ali Ghazanfar:
Prediction of Stock Market by Principal Component Analysis. 599-602 - Na Wang, Wenyao Zhang, Wen Zhao:

Evaluation of Fiber Tracking Results from UKF Tractography Methods. 603-606 - Yu Li, Rui Ma, Honghao Zhao, Shi Qiu, Ziyang Hu:

Predicting the Change on Stock Market Index Using Emotions of Market Participants with Regularization Methods. 607-610 - Dongyi He, Xing Wang:

Construction of 'One-Two-Six-Two' Practical Teaching System of Human Resource Management Specialty. 611-614 - Jie Liu, Fei Liang:

Optimal Allocation of Water Resources Based on Central Force Optimization. 615-618 - Hai Sun:

Research on Field Patterns in Circular-Shaped Microshield Lines. 619-621

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














