default search action
CIS 2015: Shenzhen, China
- 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-8660-9
Intelligent Computation
- Shanshan Li, Yimin Li:
A Recognition Algorithm for Similar Characters on License Plates Based on Improved CNN. 1-4 - Zhihua Song, Han Zhang, Wanfang Che, Xiaobin Hui:
Algorithm for Distance Constrained Aerial Vehicle Routing Problem: Based on Minimum Spanning Tree and Genetic Computation. 5-9 - Juan Yang, Li Huang:
An Improvement and Application of Genetic BP Neural Network. 10-13 - Hejun Xuan, Yuping Wang, Shanshan Hao, Xiaoli Wang:
Cost-Efficient Divisible Load Scheduling Using Genetic Algorithm. 14-17 - Liping Chen, Weitao Ha, Guojun Zhang:
Evaluation Model of Web Service Health Level on End-to-End Network Based on Artificial Immune. 18-21 - Pengcheng Wen, Yadi Zhang, Yahui Li, Xiaoan Li:
Intelligence Computing Technology for UAV's Autonomy. 22-25 - Xin Lin, Yizhou Tang:
Interbank Offered Rate Forecasting Using PSO-LS-SVM. 26-29 - Chenggang Cui, Feng Tian, Ning Yang, Junfeng Chen:
Memory Based Differential Evolution Algorithms for Dynamic Constrained Optimization Problems. 30-33 - Zhendong Liu, Daming Zhu, Qionghai Dai:
Predicting Algorithm of RNA Folding Structure with Pseudoknots. 34-37 - Hong Li, Li Zhang:
Solving Linear Bilevel Programming Problems Using a Binary Differential Evolution. 38-42 - Yong He, Jiechang Wen, Meihua Huang:
Study on Emergency Relief VRP Based on Clustering and PSO. 43-47 - Dapeng Qu, Shuwen Liu, Di Zhang, Jun Wang, Chengxi Gao:
Teaching-Learning Based Optimization Algorithm Based on Course by Course Improvement. 48-52 - Yushi Guo, Zuqing Huang, Yuxiang Yang:
Waste Electrical Recycling Network Optimum Design under the Carbon Cap Constraint. 53-57
Learning Algorithms
- Hassan Dawood, Hussain Dawood, Ping Guo:
A Hybrid Image Feature Descriptor for Classification. 58-61 - Chi-Chun Huang, Hsin-Yun Chang:
A Novel SVM-Based Reduced NN Classification Method. 62-65 - Yu Liu, Xinhong Hei, Jinwei Zhao, Yikun Zhang, Guo Xie:
Fault Diagnosis Based on Prior Knowledge for Train Air-Conditioning Unit. 66-69 - Aihong Ren, Xingsi Xue:
Improved Electromagnetism-Like Algorithm for Nonlinear Bilevel Programming Problem. 70-73 - Tianxiang Feng, Qiujie Zhang:
Model of Environmental Reason Analysis and Prevention of Stroke on Linear Regression. 74-77 - Chao Wang, Tongge Xu, Xi Qin:
Network Traffic Classification with Improved Random Forest. 78-81 - Jie Liu:
On Locating All Local Minima of Multidimensional Function for Box Constrained. 82-85 - Jing Meng, Hou-Biao Li:
Recycling BiCG for Families of Shifted Linear Systems. 86-90 - Jing Nie:
Research on Mobile Learning Platform Construction in Higher Vocational Colleges Based on Cloud Computing. 91-94 - Shan Sun, Ruliang Wang:
Robust Stability of Uncertain Nonlinear Delay Segmentation System Based on Delay. 95-99 - Hongxia Liu, Tianxiang Feng:
Study on the Convergence of Solving Linear Equations by Gauss-Seidel and Jacobi Method. 100-103
Intelligent Systems and Complex Systems
- Jinquan Li, Jinhua Zhang:
A 2-Approximation Algorithm for the Single Machine Due Date Assignment Scheduling Problem in Fuzzy Environment to Minimize the Total Costs. 104-108 - Xin Li:
A Quantity-Flexibility Contract in Two-Stage Decision with Supply Chain Coordination. 109-112 - Wei Wang, Hai Zhu, Xiaoli Wang:
A Robust Quasi-Dense Wide Baseline Matching Method. 113-116 - Hai Zhu, Wei Wang, Xiali Wang, Fei Wei:
An Effective Energy-Based Multi-view Piecewise Planar Stereo Method. 117-120 - Xiaole Cai, Yahui Li, Yadi Zhang, Peng Li:
An Efficient Address Mapping Algorithm for Multichannel Structure SSD. 121-124 - Zhao Fang, Jianjun Zhao, Haifeng Tang, Guangmin Wu:
Design and Implementation of Embedded Remote Control System in High-Precision Time Data Acquisition. 125-128 - Guoqiang Hang, Yang Yang, Xuanchang Zhou, Xiaohui Hu, Danyan Zhang:
Dynamic Quaternary Circuit with Neuron-MOS Transistor. 129-133 - Qin Lin, Yun Xue, Wensheng Chen, Shuqun Ye, Wanli Li, Jingjing Liu:
Parallel Large Average Submatrices Biclustering Based on MapReduce. 134-137 - Yulin Hai, Xiaodong Zhao, Yongqiang Liu:
Reconfigurable Computing Availability and Developing Trends. 138-141
Pattern Recognition and Knowledge Discovery
- Yuejin Bai, Yang Zhang, Zhaohui Li:
3D Video Coding Using Just Noticeable Depth Difference Based on H.265/HEVC. 142-145 - Wei He, Shuang Li, Xiaoping Yang:
A Hybrid Approach for Reducing Textual Formal Context Based on Thesaurus. 146-149 - Jingzhe Wang, Yue Cheng, Jianchun Xie, Wensheng Niu:
A Real-Time Sensor Guided Runway Detection Method for Forward-Looking Aerial Images. 150-153 - Di Li, Yadi Zhang, Pengcheng Wen, Linting Bai:
A Retinex Algorithm for Image Enhancement Based on Recursive Bilateral Filtering. 154-157 - Guanghui Deng, Zengli Liu:
A Wavelet Image Denoising Based on the New Threshold Function. 158-161 - Xiangyu Deng, Zengli Liu:
An Improved Image Denoising Method Applied in Resisting Mixed Noise Based on MCA and Median Filter. 162-166 - Shulei Wu, Liya Dong, Huandong Chen, Jinmei Zhan:
Application of Image Classification Technology in Mangrove Information Extraction. 167-170 - Fuqiang Zhang, Zengli Liu:
Image Denoising Based on the Bivariate Model of Dual Tree Complex Wavelet Transform. 171-174 - Jie Liang, Wenzhang He, Dongjiang Ji, Lina Wang:
Image Reconstruction Algorithm for Modified SART Based on PM Model. 175-178 - Jing Li, Weiwei Wang, Xiaoping Li:
Image Retargeting Based on a New Salient Region Detection Method. 179-182 - Xu Zhao, Fei Deng, Hua Liang, Long Zhou:
Monitoring the Deformation of the Facade of a Building Based on Terrestrial Laser Point-Cloud. 183-186 - Pengfei Xu, Qiguang Miao, Tiange Liu, Xiaojiang Chen:
Multi-direction Edge Detection Operator. 187-190 - Wensheng Chen, Yang Zhao, Binbin Pan, Chen Xu:
Nonlinear Nonnegative Matrix Factorization Based on Discriminant Analysis with Application to Face Recognition. 191-194 - Huizhen Jia, Quansen Sun, Tonghan Wang:
PCANet for Blind Image Quality Assessment. 195-198 - Yuhui Liu:
Some Properties of (F-K)-Convex Mapping in Vector Spaces. 199-202 - Guanghui Deng, Zengli Liu:
Study of Edge Detection Based on SQI Algorithm and Morphology. 203-205
Data Mining
- Juan Li:
A Feature Subset Selection Algorithm Based on Feature Activity and Improved GA. 206-210 - Chunlong Fan, Chang Liu, Guohui Ding, Li Xu:
A Method of Circle Curve Fitting Based on the Cumulative Error of the Radius Error. 211-214 - Qingtai Xiao, Shibo Wang, Zhan Zhang, Jianxin Xu:
Analysis of Sunspot Time Series (1749-2014) by Means of 0-1 Test for Chaos Detection. 215-218 - Kaimei Zheng:
Content-Based Image Retrieval for Medical Image. 219-222 - Qin Liu, Zhongwei Ma, Xiaowen Yang, Hongming Zhu:
Identifying Influential Actors in Social Network Platforms. 223-226 - Xiaoping Li, Weiwei Wang, Amir Razi, Tao Li:
Nonconvex Low-Rank Sparse Factorization for Image Segmentation. 227-230 - Xingsi Xue, Jianhua Liu, Pei-Wei Tsai, Xianyin Zhan, Aihong Ren:
Optimizing Ontology Alignment by Using Compact Genetic Algorithm. 231-234 - Peng Sun, Ziyan Wu, Haifeng Yang, Zhengfeng Ming, Xin Guo:
Research Methods of Sensors Validation Based on Naive Bayesian Classifier. 235-238 - Yanan Zhang, Yao Lu:
Robust Object Tracking Enhanced by Correction Dictionary. 239-242 - Zhixiang He, Xiaoli Sun, Xiujun Zhang, Chen Xu:
Saliency Detection via Nonconvex Regularization Based Matrix Decomposition. 243-247
Optimization Theory and New Methods
- Xueyi Liang, Hai-Lin Liu, Qiang Wang:
4G Heterogeneous Networks Base Station Planning Using Evolutionary Multi-objective Algorithm. 248-252 - Hongwei Lin:
A Differential Evolution Algorithm Based on Local Search and Boundary Reflection for Global Optimization. 253-257 - Wei Yue, Yuping Wang:
A Fuzzy Multi-objective Portfolio Selection Model with Transaction Cost and Liquidity. 258-261 - Fei Qin, Jie Liu:
A Hybrid Algorithm for Global Optimization. 262-265 - Jing Li, Baoming Qiao:
A Novel Differential Evolution Algorithm with K-Means and Simplex Search Method for Absolute Value Equations. 266-269 - Cai Dai, Xiujuan Lei:
A Novel Evolutionary Algorithm Based on Decomposition and Adaptive Weight Adjustment for Synthesis Gas Production. 270-273 - Jun Yang, Jingxuan Wei, Jiang Liu:
Adaptive Differential Evolution Algorithm Based on Gradient and Polar Coordinates Search Strategies. 274-277 - Haixia Guo:
Construction of Pooling Designs with Affine Symplectic Space. 278-281 - Haiyan Liu, Shiwei Guan, Fangjie Liu, Yuping Wang:
Cooperative Co-evolution with Formula Based Grouping and CMA for Large Scale Optimization. 282-285 - Shuiqin Dai, Hai-Lin Liu, Lei Chen:
Evolutionary Many-Objective Optimization Algorithm Based on Improved K-Dominance and M2M Population Decomposition. 286-290 - Xiaofang Guo, Xiaoli Wang, Zhen Wei:
MOEA/D with Adaptive Weight Vector Design. 291-294 - Liping Jia, Guocheng Zou, Zhonghua Li:
Target-Vector Based Particle Swarm Optimization for Multi-objective Bilevel Programming Problem. 295-298
Access Control and Protection
- Kaige Qu, Liji Wu, Xiangmin Zhang:
A Novel Detection Algorithm for Ring Oscillator Network Based Hardware Trojan Detection with Tactful FPGA Implementation. 299-302 - Jianguo Jiang, Xiang Jing, Bin Lv, Meimei Li:
A Novel Multi-classification Intrusion Detection Model Based on Relevance Vector Machine. 303-307 - Fatma Hachmi, Mohamed Limam:
A Two-Stage Process Based on Data Mining and Optimization to Identify False Positives and False Negatives Generated by Intrusion Detection Systems. 308-311 - Haifeng Li, Bo Shuai, Jian Wang, Chaojing Tang:
Protocol Reverse Engineering Using LDA and Association Analysis. 312-316 - Bo Shuai, Haifeng Li, Lei Zhang, Quan Zhang, Chaojing Tang:
Software Vulnerability Detection Based on Code Coverage and Test Cost. 317-321
Cryptography and Cryptanalysis
- Lihui Wang, Qing Li, Gang Zhang, Jun Yu, Zhimin Zhang, Limin Guo, David Wei Zhang:
A New SPA Attack on ECC with Regular Point Multiplication. 322-325 - Yaling Zhang, Liang Yang, Shangping Wang:
An Efficient Identity-Based Signature Scheme for Vehicular Communications. 326-330 - Liangjian Su, Wei Guo, Zheng Guo:
Combined Attack on Blinded Fault Resistant Exponentiation Algorithm and Efficient Countermeasure. 331-334 - Shifeng Zhang, Shenghui Su:
Design of Parallel Algorithms for Super Long Integer Operation Based on Multi-core CPUs. 335-339 - Bo Yang, Zhao Yang, Nengfei Liu, Shougui Li:
Further Attacks and Improvement of a Certificateless Signature Scheme. 340-344 - Zhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong:
The Design of a Key Expansion Algorithm Based on Dynamic Dislocation Counts. 345-349
Data Security and Integrity
- Limin Guo, Lihui Wang, Dan Liu, Weijun Shan, Zhimin Zhang, Qing Li, Jun Yu:
A Chosen - Plaintext Differential Power Analysis Attack on HMAC - SM3. 350-353 - Limin Guo, Lihui Wang, Qing Li, Jun Yu, Peng Luo:
Differential Power Analysis on Dynamic Password Token Based on SM3 Algorithm, and Countermeasures. 354-357 - Jiani Li, Donghai Tian, Changzhen Hu:
Dynamic Tracking Reinforcement Based on Simplified Control Flow. 358-362 - Jinfeng Li, Tao Wu:
Perceptual Audio Hashing Using RT and DCT in Wavelet Domain. 363-366 - Aymen Akremi, Hassen Sallay, Mohsen Rouached, Mohamed-Fouad Sriti, Mohamed Abid, Rafik Bouaziz:
Towards a Built-In Digital Forensics-Aware Framework for Web Services. 367-370
Information System Safety
- Jiachao Chen, Qin Wang, Zheng Guo, Junrong Liu, Haihua Gu:
A Circuit Design of SMS4 against Chosen Plaintext Attack. 371-374 - Xue Wang, Lequan Min, Mei Zhang:
A Generalized Stability Theorem for Continuous Chaos Systems and Design of Pseudorandom Number Generator. 375-380 - Shaohui Zhang, Liji Wu, Xiangmin Zhang, Xingjun Wu, Xiangyu Li, Huajun Fang:
A Template Attack-Resistant Masking Scheme for RC4 Based on FPGA. 381-384 - Jingxi Li, Xin Xu, Lejian Liao, Lu Li:
Concolic Execute Fuzzing Based on Control-Flow Analysis. 385-389 - Caiming Liu, Yan Zhang, Zhonghua Li, Jiandong Zhang, Hongying Qin, Jinquan Zeng:
Dynamic Defense Architecture for the Security of the Internet of Things. 390-393 - Miao Yuan, Guoqiang Bai:
Improving Second-Order DPA Attacks with New Modeled Power Leakages. 394-397 - Qian Lei, Liji Wu, Shaohui Zhang, Xiangmin Zhang, Xiangyu Li, Liyang Pan, Zhimeng Dong:
Software Hardware Co-design for Side-Channel Analysis Platform on Security Chips. 398-401
Network and Wireless Security
- Jing Wang, Ying Yang, Lijuan Chen, Guang Yang, Zhenya Chen, Liqiang Wen:
A Combination of Timing Attack and Statistical Method to Reduce Computational Complexities of SSL/TLS Side-Channel Attacks. 402-406 - Wei Li, Xiufen Yu:
An Online Flow-Level Packet Classification Method on Multi-core Network Processor. 407-411 - Xi Qin, Tongge Xu, Chao Wang:
DDoS Attack Detection Using Flow Entropy and Clustering Technique. 412-415 - Jingbo Jiao, Gangcan Sun, Zhuo Han, Zhongyong Wang:
Exact Physical Layer Security in SIMO Wiretap Channels with Antenna Correlation. 416-419
Security Methodologies and Management
- Miao Ye, Meiling Zhao, Xiaohui Cheng:
A New Minimum Exposure Path Problem and Its Solving Algorithm. 420-423 - Xudong Miao, Yongchun Wang, Xingchen Cao, Binbin Qu, Sheng Jiang, Feng Fang:
A Software Assessment Method Based on Relevance Vulnerability. 424-427 - Yahui Li, Yadi Zhang, Peng Li, Peng Guo:
An Efficient Trusted Chain Model for Real-Time Embedded Systems. 428-432 - Le Wang, Yunmin Sun, Peng Guo, Yadi Zhang:
An Enhanced Reconfiguration Method for the Second Generation Integrated Modular Avionics. 433-436 - Yan Zhang, Caiming Liu, Zhonghua Li, Hongying Qin, Qin Li, Jinquan Zeng:
Immunity-Based Detection for Large-Scale Behavior of Denial of Service. 437-440 - Xiao Liang:
Strategies for Analysis against Redundant Reused Codes in Safety-Critical Software. 441-445
System Analysis and Modeling
- Yingjiu Guo, Xuemei Liu:
A Research on the Localization Technology of Wireless Sensor Networks Employing TI's CC2530 Instrument. 446-449 - Shulei Wu, Zongan Zhang, Huandong Chen, Jinmei Zhan:
Application of an Improved Method of Wavelet Transform in Image Edge Detection. 450-453 - Guo Xie, Minying Ye, Xinhong Hei, Jinwei Zhao, Fucai Qian:
Data-Based Health State Analysis for the Axle of High Speed Train. 454-457 - Lei Fan, Sha Meng, Yanfang Liang, Xiyang Liu:
Experimental Analysis on CTT-SP Algorithm for Intermediate Data Storage in Scientific Workflow Systems. 458-461 - Baitong Zhou, Zengli Liu:
Method of Multi-resolution and Effective Singular Value Decomposition in Under-determined Blind Source Separation and Its Application to the Fault Diagnosis of Roller Bearing. 462-465 - Wenxue Niu, Congmou Yuan, Dansong Zhang:
Research on Rural Population Flow of China's County Urbanization. 466-469 - Mi Wang, Dong Kang:
Research on Semantic Representation to Promote the Correlation of Instructional Micro Video. 470-473 - Bin Wang, Fan Li, Xinhong Hei, Weigang Ma, Lei Yu:
Research on Storage and Retrieval Method of Mass Data for High-Speed Train. 474-477 - Qian Xu, Yajuan Yang, Quanju Zhang:
Research on the Influence Factors of Entrepreneurial Environment. 478-481 - Qin Zhao, Yuchao Li, Xinhong Hei, Xiaofan Wang:
Toward Automatic Calculation of Construction Quantity Based on Building Information Modeling. 482-485
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.