


default search action
CIS 2008: Suzhou, China
- 2008 International Conference on Computational Intelligence and Security, CIS 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers. IEEE Computer Society 2008, ISBN 978-0-7695-3508-1

Machine Learning and Algorithms
- Chun Yang, Xiangrong Zhang, Licheng Jiao, Gaimei Wang:

Self-Tuning Semi-Supervised Spectral Clustering. 1-5 - Yu Hu, Tingzhi Shen, Kin-Man Lam

, Sanyuan Zhao:
A Novel Example-Based Super-Resolution Approach Based on Patch Classification and the KPCA Prior Model. 6-11 - Yunhui He:

Modified Generalized Discriminant Analysis Using Orthogonalization in Feature Space and Difference Space. 12-15 - Wenli Xie, Zhezhao Zeng:

A Novel Algorithm for Solving Nonlinear Equations. 16-19 - Guimei Li, Zhezhao Zeng:

A Neural-Network Algorithm for Solving Nonlinear Equation Systems. 20-23 - Tao Li, Wenjiang Pei, Shao-ping Wang, Yiu-ming Cheung

:
Cooperation Controlled Competitive Learning Approach for Data Clustering. 24-29 - Chuangxin Wang, Zhezhao Zeng:

A Neural-Network Algorithm for the Simultaneous Inclusion of Polynomial Zeros. 30-34
Nature-Inspired Computing
- Khin Haymar Saw Hla, YoungSik Choi, Jong Sou Park:

Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization Algorithm. 35-40 - Mudasser Naseer, Shi-Yin Qin:

Performance Comparison of Nonlinear Dimensionality Reduction Methods for Image Data Using Different Distance Measures. 41-46 - Zhengjia Wu, Liping Zhang

, Ying Wang, Kui Wang:
Optimization for Multi-Resource Allocation and Leveling Based on a Self-Adaptive Ant Colony Algorithm. 47-51 - Wenjie Liu

, Hanwu Chen, Tinghuai Ma
, Wei Tian:
An Efficient Deterministic Secure Quantum Communication Scheme with W State. 52-55 - Junwei Wang, Xingwei Wang, Min Huang:

Tabu Artificial Fish Swarm Algorithm Based Intelligent QoS Multicast Routing Algorithm. 56-60 - Yuelin Gao, Xiaohui An, Jun-min Liu:

A Particle Swarm Optimization Algorithm with Logarithm Decreasing Inertia Weight and Chaos Mutation. 61-65
Intelligent and Fuzzy Systems
- Long Guo, Hongli Wang:

Information Management System of Automobile Chassis Dynamometer Based on Multi Agent Web Serve. 66-70 - Rongyong Zhao, Yongqing Su, Torben Knudsen

, Thomas Bak
, WenZhong Shen
:
Multi-Agent Model for Fatigue Control in Large Offshore Wind Farm. 71-75 - Liying Lang, Yue Hong:

Study on the Core Algorithm of Access Control System Based on Face Recognition. 76-79 - Huan Wang, Mingwu Ren, Jingyu Yang:

Object Tracking Based on Genetic Algorithm and Kalman Filter. 80-85 - Yongping Du, Ming He:

Multi-Strategy to Improve Reading Comprehension. 86-89
Data Mining and Knowledge Discovery
- Chuangxin Yang, Hong Peng, Jiabing Wang:

A New Feature Extraction Approach Based on Sentence Element Analysis. 90-95 - Imen Derbel, Narjes Hachani, Habib Ounelli:

Membership Functions Generation Based on Density Function. 96-101 - Min-qi Zheng, Chongcheng Chen, Jiaxiang Lin, Minghui Fan, Tamas Jansco:

An Algorithm for Spatial Outlier Detection Based on Delaunay Triangulation. 102-107 - Jingde Cheng:

Evolutionary Personal Information Partners. 108-113 - Feng Liu, Zhitang Li:

A Measurement and Modeling Study of P2P IPTV Applications. 114-119
Neural Networks and Distributed Systems
- Rosemarie Velik:

Discrete Fourier Transform Computation Using Neural Networks. 120-123 - Hui Wang, Lequan Min

, Jinzhu Liu:
Robust Designs for Fingerprint Feature Extraction CNN with Von Neumann Neighborhood. 124-128 - Jianjun Wang, Zhonghua Li:

Local Stability Analysis of CNNs with Delay and Impulses. 129-133 - Lou Haichuan, Dai Wenzhan, Su Jie:

Control of Time Varying Nonlinear System Based on RBFNN-DMC Algorithm. 134-138 - JianHong Ye, ShiXin Sun, Wen Song, Lijie Wen

:
The Operations and Properties of Reproducibility of the Empty Marking. 139-144
Evolutionary Computation
- Gengui Zhou, Zhenyu Cao, Zhiqing Meng, Qi Xu:

A GA-Based Approach on a Repair Logistics Network Design with M/M/s Model. 145-149 - Hai-Lin, Xueqiang Li, Yuqing Chen:

Multi-Objective Evolutionary Algorithm Based on Dynamical Crossover and Mutation. 150-155 - Rongbing Hu, Chaoyuan Yue, Jun Xie:

Joint Optimization of Age Replacement and Spare Ordering Policy Based on Genetic Algorithm. 156-161 - Lei Fan, Yuping Wang:

A Novel Multi-Objective Evolutionary Algorithm Based on External Dominated Clustering. 162-167 - Xueqiang Li, Hai-Lin:

One MOEA Uniformity Measurement Based on Generalized Spherical Transformation. 168-173
Pattern Recognition
- Rui Ma, Yingnan Zhao, Yongquan Xia, Yunyang Yan:

A Touching Pattern-Oriented Strategy for Handwritten Digits Segmentation. 174-179 - Siew Wen Chin, Kah Phooi Seng, Li-Minn Ang

:
New H infinity Approach for Face Tracking. 180-184 - Xiao-yan Zhang, Xiao-Juan Wu, Xin Zhou, Xiao-Gang Wang, Yuan-Yuan Zhang:

Automatic Detection and Tracking of Maneuverable Birds in Videos. 185-189 - Junding Sun, Zhaosheng Zhang:

An Effective Method for Mammograph Image Retrieval. 190-193 - Xuehui Xie, Wen-Sheng Chen, Bo Chen, Hui Liu:

Kernel Subspace LDA with Self-Constructed Mercer Kernel for Face Recognition. 194-199 - Yahui Wu, Gang Liu, Jun Guo:

A New Method for Discriminative Model Combination in Speech Recognition. 200-203 - Gege Guo, Ping Guo

:
Experimental Study of Discriminant Method with Application to Fault-Prone Module Detection. 204-209 - Na Wang, Xia Li, Yingjie Cui:

Semi-Supervised Dimensionality Reduction with Pairwise Constraints Using Graph Embedding for Face Analysis. 210-214 - Kezheng Lin, Huixin Wang, Sheng Lin:

Face Feature Extraction Based on Uncorrelated Locality Information Projection. 215-219 - Jinyong Cheng, Yihui Liu, Li Bai:

3-D Reconstruction from Medical Images with Improved GVF Snake Model. 220-224 - Yuehui Sun:

Illumination Invariant Using DT-CWT and EMD for Face Recognition. 225-230
Support Vector Machines
- Linsheng Li, Jianning Li:

Chattering-Free Support Vector Regression Sliding Mode Control. 231-234 - Yuan Yuan, Bing Chen, Jiandong Wang, Liming Fang, Tao Xu:

Weighted Margin Multi-Class Core Vector Machines. 235-239 - Xiaoh Wang:

Posterior Probability Reconstruction for Multi-Class Support Vector Machines. 240-243 - Jingwen Tian, Qian Feng:

Modeling of Oil and Water Migration Based on Support Vector Machine. 244-248 - Chongming Wu, Xiaodan Wang, Dongying Bai, Hongda Zhang:

Fast SVM Incremental Learning Based on the Convex Hulls Algorithm. 249-252
Information and Data Security
- Minh-Triet Tran

, Doan Khanh Bui, Anh Duc Duong:
Gray S-Box for Advanced Encryption Standard. 253-258 - Mingwei Zhao, Yang Liu, Rongan Jiang:

Research of WaveCluster Algorithm in Intrusion Detection System. 259-263 - Xinshe Li, Lei Zhang, Yu-pu Hu:

A Novel Generation Key Scheme Based on DNA. 264-266 - Jianqin Zhou, Cheng Shangguan:

On the k-error Linear Complexity of Sequences. 267-271 - Xiangdong Li, Qingpu Guo, Qingxian Wang:

Analysis of Offline Fair Exchange Protocols in Strand Spaces. 272-276 - Jiping Niu:

Image Encryption Algorithm Based on Rijndael S-boxes. 277-280 - Changping Liu, Mingyu Fan, Yong Feng, Guangwei Wang:

Dynamic Integrity Measurement Model Based on Trusted Computing. 281-284 - Jun Xiao, Ying Wang:

Semi-Fragile Watermarking Based on Image Gradient. 285-289 - Zhijian Yuan, Yingwen Chen, Yan Jia, Shuqiang Yang:

Counting Evolving Data Stream Based on Hierarchical Counting Bloom Filter. 290-294 - Kai-mei Zheng, Xu Qian:

Reversible Data Hiding for Electrocardiogram Signal Based on Wavelet Transforms. 295-299 - Xiang-wei Zhu, Liang Xiao:

Research of Multiple Watermarks Algorithm in E-commerce Copyright Protection and Tracking. 300-304 - Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:

Robust Hashing Based on Persistent Points for Video Copy Detection. 305-308
Cryptography, Coding, Security, and Key Management
- Ruili Zhou, Jianfeng Pan, Xiaobin Tan, Hongsheng Xi:

Application of CLIPS Expert System to Malware Detection System. 309-314 - Mohd Fadzli Marhusin

, Henry Larkin, Chris Lokan, David Cornforth:
An Evaluation of API Calls Hooking Performance. 315-319 - Purui Su, Lingyun Ying, Dengguo Feng:

Exploring Malware Behaviors Based on Environment Constitution. 320-325 - Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:

Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM. 326-330 - Alireza Poorghanad, Ali Sadr

, Alireza Kashanipour:
Generating High Quality Pseudo Random Number Using Evolutionary methods. 331-335 - Gang Li, Xiangjun Xin, Wei Li:

An Enhanced Deniable Authentication Protocol. 336-339 - Lina Ge, Shaohua Tang:

Sharing Multi-Secret Based on Circle Properties. 340-344 - Mo Yang, Lina Wang, Yuandong Lei:

Research on Evaluation of Trust Model. 345-349 - Xiongjun Li:

A New Measure of Image Scrambling Degree Based on Grey Level Difference and Information Entropy. 350-354 - Lin Guo, Hua Huang, Lejun Zhang, Yongtian Yang, Jianpei Zhang:

Research on Disaster Tolerance System Based on Network Dataflow. 355-360 - Meng Li, Yiu-ming Cheung

:
A Novel Motion Based Lip Feature Extraction for Lip-Reading. 361-365 - Kezheng Lin, Bo Fan, Hong Zhao:

Visual Cryptographic Scheme with High Image Quality. 366-370 - Zerong Deng, Xingcheng Liu

, Man Teng:
Modified BP Decoding Algorithms Combined with GA for Low-Density Parity Check Codes. 371-375 - Man Teng, Xingcheng Liu, Zerong Deng:

Improved BP Decoding Algorithm for Nonbinary LDPC Codes Based on Bit-flipping Method. 376-380 - Chunlai Song, Xinchun Yin, Yali Liu:

A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme. 381-384
Steganography, Watermarking, Authentication, and Authorization
- Tong Ming, Yan Tao, Hongbing Ji:

An Efficient Audio Watermark Algorithm with Strong Robustness. 385-389 - Heng Pan, Ke Ke, Chunxiang Gu:

Efficienct ID-Based Proxy Blind Signature Schemes from Pairings. 390-393 - Qiuyu Zhang

, Fengman Miao, Zhanting Yuan, Qikun Zhang, Zhi Fan:
Construction of a Dynamic Trust Ontology Model. 394-398 - Sunan Shen, Shaohua Tang:

Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation. 399-404
Network and Wireless Communication Security
- Zhenyu Liu, Shengli Xie, Yue Lai:

A Fast Suffix Matching Method in Network Processor. 405-410 - Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang:

A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks. 411-416 - Liqiang Mao, Jianfeng Ma:

Towards Provably Secure On-Demand Distance Vector Routing in MANET. 417-420 - Xin-lei Li, Kangfeng Zheng, Yixian Yang:

A Simulation Platform of DDoS Attack Based on Network Processor. 421-426 - Jian Wan, Jianrong Wu, Xianghua Xu, Yanna Yan:

An Efficient Gradient Mechanism of Directed Diffusion in Wireless Sensor Network. 427-431 - Chi Guo, Lina Wang, Lainv Huang, Lei Zhao:

Study on the Internet Behavior's Activity Oriented to Network Survivability. 432-435 - Xuanxia Yao

, Xuefeng Zheng:
A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor Networks. 436-441 - Shaohe Lv, Xiaodong Wang, Xin Zhao, Xingming Zhou:

Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks. 442-446 - Xiaochun Xiao, Tiange Zhang, Gendu Zhang:

An Improved Approach to Access Graph Generation. 447-452
Security Models and Applications
- Yongkai Cai, Shaohua Tang:

Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security Mechanism. 453-457 - Yi Niu, Yichun Peng:

Application of Radial Function Neural Network in Network Security. 458-463 - Jiali Hou, Nengshan Feng, Jinzhi Xiong:

A New Intelligent Security Structure for Host System. 464-469 - Min Zhao, Zhaoshui He, Shengli Xie:

Blind Deconvolution Algorithm for MIMO Channel. 470-474 - Juan Zhang, Yi Niu, Wenbin He:

Using Genetic Algorithm to Improve Fuzzy k-NN. 475-479 - Weibin Zhao, Zhiheng Zhou:

Contours Location Based on Fisher Discrimination Analysis. 480-483 - Xuanzi Hu, Kuanfu Wang:

Application of Data Warehouse Technology in Data Center Design. 484-488 - Quanju Zhang, Jie Zhang

, Junhong Feng, Yajuan Yang:
Neurodynamic Analysis for a Class of Nonlinear Fractional Programming. 489-494 - Fang Li, Di Li, Jiafu Wan, Xin Huang:

Towards a Component-Based Model Integration Approach for Embedded Computer Control System. 495-499
Web and Multimedia Security
- Cao Hui, Qin Zheng:

A Trust Evaluation Model for P2P E-Commerce Systems. 500-505 - Xiuhua Men, Shunming Li, Zemin Zuo:

Analysis of Signal Transmission with Temperature-Dependent Electrical Parameters Using FDTD. 506-510 - Yuhua Liu, Chun Yang, Kaihua Xu, Hongcai Chen

:
Controlling Mechanism for the Hubs in Peer-to-Peer Networks. 511-515 - Tao Ku, Yunlong Zhu, Kunyuan Hu:

A Novel Complex Event Mining Network for RFID-Enable Supply Chain Information Security. 516-521 - Sophia Xiaoxia Duan

, Hepu Deng
, Brian J. Corbitt:
The Impacts of Government Policies on the Efficiency of Australian Universities: A Multi-Period Data Envelopment Analysis. 522-527 - Wei-jiang Wang, Ting-zhi Shen, Xue-mei Yan:

An Improved Alternating-Projection Demosaicing Algorithm. 528-533 - Qun Fang, Yi Ji, Guoxin Wu:

A Run-Length Coding Based Dynamic Trust Model in P2P Network. 534-539
Applications
- Jianxi Yang, Jianting Zhou, Fan Wang:

A Study on the Application of GA-BP Neural Network in the Bridge Reliability Assessment. 540-545 - Jie-Chang Wen, Chun-lan He:

Some Notes on Blind Source Separation Using Generalized Eigenvalues. 546-549 - Mengmeng Zhang, Wenkai Liu, Ruobin Wang, Huihui Bai:

A Novel Multiple Description Video Coding Algorithm. 550-553 - Huibin Wang, Chaoying Liu, Lizhong Xu, Min Tang, Xuewen Wu:

Multiple Feature Fusion for Tracking of Moving Objects in Video Surveillance. 554-559 - Ju-tao Hao, Jing-jing Zhao:

Shape Constraint Incorporated Geometric Flows for Blood Vessels Segmentation. 560-563

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.




Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID















