default search action
CIS 2008: Suzhou, China
- 2008 International Conference on Computational Intelligence and Security, CIS 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop Papers. IEEE Computer Society 2008
Machine Learning and Algorithms
- Hongping Hu, Hui Zhang:
Chinese Named Entity Recognition with CRFs: Two Levels. 1-6 - Biyun Hu, Yiming Zhou:
Content Semantic Similarity Boosted Collaborative Filtering. 7-11 - Zhen-you Wang, Dachang Guo:
Expansion Complex Fast-ICA Algorithm Based on Complex Orthogonal Space. 12-15 - Fanman Meng, Hong Peng, Zheng Pei, Jun Wang:
A Novel Blind Image Watermarking Scheme Based on Support Vector Machine in DCT Domain. 16-20 - Zelong Wang, Fengxia Yan, Feng He, Jubo Zhu:
A New SVM Multi-Class Classification Method Based on Error-Correcting Code. 21-24
Nature-Inspired Computing
- Guirong Weng, Yuehuan Wang, Jian Su:
cDNA Microarray Image Processing Using Spot Centroid of Intensity. 25-29 - Nitin Namdeo Pise, Parag A. Kulkarni:
A Survey of Semi-Supervised Learning Methods. 30-34 - Yong Chen, Xia Liu, Qi Huang, Chang-hua Zhang:
An Artificial Neural Network Based on CIEA. 35-40 - Chun Feng Zhang, Hui Zhao:
An Improved Particle Swarm Optimization Using Particle Reliving Strategy. 41-43 - Liwei Tan:
Particle Swarm Optimization Based on Number-Theoretical Net. 44-47 - Quansheng Dou, Ping Jiang, Zhijun Yu, Zhongzhi Shi:
Convergence Property Analysis for PSO Based on Cluster-Degree. 48-51 - Defu Cheng, Guangyuan Liu, Yuhui Qiu:
Applications of Particle Swarm Optimization and K-Nearest Neighbors to Emotion Recognition from Physiological Signals. 52-56 - Ben Niu, Li Li:
An Improved MCPSO with Center Communication. 57-61 - Xiaolin Wang, Zhenxu Bian, Pengfei Wang, Jianqin Zhou:
A Fast Algorithm to Find Optimal Double-Loop Networks. 62-67
Intelligent and Fuzzy Systems
- Fahimeh Farahnakian, Nasser Mozayani:
Learning through Decision Tree in Simulated Soccer Environment. 68-70 - Hao Xu, Lixin Shen, Xinlian Xie, Qinglian Wang, Yan Liu, Kejia Wang:
Research on the Business Operation Model Based on Semantic Web Service and MAS. 71-75 - Samaneh Yazdani, Mahdi Aliyari Shoorehdeli, Mohammad Teshnehlab:
Identification of Fuzzy Models Using Cartesian Genetic Programming. 76-81 - Li Chen, Xiaoyun Chen, Shanli Hu, Yunguo Lin:
Hybrid Algorithm for Winner Determination Problem in Combinatorial Auctions. 82-86 - Xin-bo Zhang, Ying Lu:
Unstructured Decision-Making Model Base on Grey Fuzzy Number. 87-90 - Feihu Hu, Zefei Geng, Huimin Chen, Linyan Sun:
Research of Multi-Resource and Multi-Objective Emergency Scheduling Based on Fuzzy Ideal Point Method. 91-95 - Yin Zhu, Junli Wang, Huapu Lu:
A Study on Urban Traffic Congestion Dynamic Predict Method Based on Advanced Fuzzy Clustering Model. 96-100 - Xiaojian Liu, Xuejun Liu, Jianxin Li:
A Hybrid Language Combining Business Rules with Object-Orientation. 101-106 - Junjie Zhang, Wenbo Fang:
The Application of Intelligent Learning System Based on Network. 107-110 - Shuhong Xiao, Guangyuan Zheng, Shuquan Chen:
Intelligent Control of the Linear Motor Direct Drive Feed System for CNC Machine Tools. 111-116
Data Mining and Knowledge Discovery
- Jun Gao:
An New Algorithm of Association Rule Mining. 117-121 - Chong Zhou, Yansheng Lu:
Clustering XML Documents Based on Data Type. 122-127 - Cuiling Li, Rongyong Zhao, Yang Xiang, Shanlin Xu:
Data Mining Approach for Ship Virtual Assembly Based on Rough Set Theory. 128-132 - Yuan Zhang, Yue-Jin Lv:
Optimize Algorithm of Decision Tree Based on Rough Sets Hierarchical Attributes. 133-137 - Tianlin Liu, Zhigang Zhang, Liu Xuejuan:
Knowledge Reduction in Incomplete and Fuzzy Objective Information Systems. 138-141 - Yangyao Zhao, Nianbin Wang, Jie Liu:
Automatic Searching Method Based on Domain Taxonomy Ontology. 142-146 - Shurong Tian, Xiaoshu Sun, Biao Li:
Ambiguous Measurements Multitarget Tracking with Random Sets. 147-151
Neural Networks and Distributed Systems
- Yujiong Liu, Shangbo Zhou:
Optimizing Neuron Function Based on Entropy Clustering in Functional Networks. 152-156 - Weidong Li, Ying Ren, Lequan Min:
Face-Vase Illusion CNN. 157-161 - Chuangxin Wang, Zhezhao Zeng:
A Neural-Network Iteration Formula for the Simultaneous Inclusion of Polynomial Zeros. 162-165 - Anping Yang, Zhezhao Zeng:
A Method of Error Compensation on Sensors Based on Neural Networks Algorithm. 166-169 - Chuanmei Wang, Hengqing Tong:
Curve Forecast Based on BP Neural Networks with Application of Mental Curve Tracing. 170-175 - Li Li, Ben Niu:
Designing Artificial Neural Networks Using MCPSO and BPSO. 176-179 - Shaojuan Su, Yindong Liu:
Research on Ship Concurrent Collaborative Design Based on PDM. 180-185 - Fu'an Dong, Youli Wu, Yangwang Fang:
Comparison Principle and Stability of General Continuous Time Markov Jump System. 186-191 - Tian Jie, Xu Jing, Zhang Huachuan:
Architecture Design of a Network Traffic Simulation System Based on Self-Similar Model. 192-196 - Rong Guo, Weiwei Guo, Dongchen Shi:
Inferential Estimation of Texaco Coal Gasification Quality Using Stacked Neural Networks. 197-200
Evolutionary Computation
- Xiang Li, Yanli Li, Li Zhu:
The Comparative Research of Solving Problems of Equilibrium and Optimizing Multi-Resources with GA and PSO. 201-205 - Xinshun Ma, Xin Tian:
A Hybrid Evolution Genetic Algorithm for Constrained Optimization. 206-209 - Qiang Liu:
Study on Multi-Object Optimization of Logistics Network Based on Genetic Algorithm. 210-214 - Chengming Qi, Shoumei Cui, Yunchuan Sun:
A Two-Stage Hybrid Ant Colony Algorithm for the CVRP. 215-219 - Zhaoquan Cai:
Multi-Direction Searching Ant Colony Optimization for Traveling Salesman Problems. 220-223
Pattern Recognition
- Xin-yu Ouyang, Nan-nan Zhao, Xue-Bo Chen:
IIR Model Identification by the Improving WTLMS. 224-228 - Xiao Zhou, Guilin Zhang:
CFAR Method Based on Half Side Gaussian Model for Small Target Detection. 229-232 - Zhi-Guang Li, Fu-Long Wang, Wei-Zhao Zhu:
A Optimal Kernel Fisher Nonlinear Discriminant Analysis Method and Applied on Face Recognition. 233-237 - Xiaoh Wang:
Hybrid Abnormal Patterns Recognition of Control Chart Using Support Vector Machining. 238-241
Information and Data Security
- Jian Wang, Yanheng Liu, Fang Mei, Jianqi Zhu, Yingge Zhang:
A New Remediation Model Based on Trusted Network. 242-245 - Hassina Bensefia, Mohamed Ahmed-Nacer:
Towards an Adaptive Intrusion Detection System: A Critical and Comparative Study. 246-251 - Baohua Wang, Xinqiang Ma, Danning Li:
A Formal Multilevel Database Security Model. 252-256 - Qiang Liu, Yun-Fei Jiang, Dongning Rao, Xindu Chen:
Research of Security Analysis of ARBAC Policy Based on Intelligence Planning. 257-262 - Wenhua Xu, Minying Cheng:
Cancelable Voiceprint Template Based on Chaff-Points-Mixture Method. 263-266 - Zuowen Tan, Qi Wu:
Study of Linearly Cross-Coupled Chaotic Systems for a Random Bit Generator. 267-272 - Jiang Han, Qiuliang Xu, Bo Zhang:
Perfect Concurrent Signature Protocol for Symmetric Participant. 273-277 - Wei Gao, Fei Li, Banghai Xu:
An Abuse-Free Optimistic Fair Exchange Protocol Based on BLS Signature. 278-282 - Xinxin Liu, Shaohua Tang:
Formal Privacy Analysis of an Electronic Voting Scheme. 283-287 - Qingqi Pei, Jianfeng Ma:
ECC-Based Threshold Digital Signature Scheme without a Trusted Party. 288-292 - Hong-Yong Jia, Sihan Qing, Lize Gu, Yixian Yang:
Efficient Universally Composable Password-Based Key Exchange. 293-298 - Yong Ding, Ya-hui Li:
Integration of Signature Encryption and Key Exchange. 299-302 - Lijun Zhun, Futai Zhang:
Efficient ID. 303-307 - Hu Xiong, Zhiguang Qin, Fagen Li:
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles. 308-313 - Xing-Lan Zhang, Quan-min Wang:
An Improved Conference Key Agreement Protocol. 314-318 - Chuansen Yang, Xiaohao Xu, Ruihua Liu, Hongsheng Zhao:
An Improved RAIM Algorithm Based on the Total Least Squares. 319-324 - Kezheng Lin, Bo Fan, Wei Yang:
Robust Audio Watermarking Scheme Based on Wavelet Transforming Stable Feature. 325-329 - Donghui Hu, Lina Wang, Xiaqiu Jiang, Tingting Zhu, Yuntao Yue:
Detecting the MB1 with Higher-Order Statistics. 330-335 - Yan Li, Shengqian Wang, Zhihua Xie:
A Local Watermarking Scheme in the Ridgelet Domain Combining Image Content and JND Model. 336-341
Cryptography, Coding, Security, and Key Management
- Wei Li, Gang Li, Xiangjun Xin:
Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme. 342-346 - Bin Yu, Liguo Fang, Xiaohui Xu:
A Verifiable Visual Cryptography Scheme. 347-350 - Bin Yu, Zhengxin Fu, Liguo Fang:
A Modified Multi-Secret Sharing Visual Cryptography Scheme. 351-354 - Li Hao, Lixin Yu:
A Systematic (48, 32) Code for Correcting Double Errors and Detecting Random Triple Errors. 355-358 - Xiao-Long Ma, Wei Cui, Lize Gu, Yixian Yang, Zhengming Hu:
A Novel ID-Based Verifiably Encrypted Signature without Random Oracle. 359-363 - Lei Zhang, Futai Zhang:
Security Model for Certificateless Aggregate Signature Schemes. 364-368 - Qi Liu, Yin Zhang, Cheng Chen, Shuwang Lv:
Construction and Counting Orthomorphism Based on Transversal. 369-373 - Huaqun Wang, Changhui Deng, Shuping Zhao, Futai Zhang:
Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme. 374-377
Steganography, Watermarking, Authentication, and Authorization
- Jianwei Yang, Quanxiu Wen, Guosheng Cheng:
A Watermarking Scheme Based on Median Filtering. 378-381 - Pekka Jäppinen, Harri Hämäläinen:
Enhanced RFID Security Method with Ownership Transfer. 382-385 - Bin Wang, Jianhui Zhang, Yunfei Guo:
APVP: An Aggregate-Based Path Verification Routing Protocol for the Ad Hoc Networks. 386-390 - Mun-Kyu Lee, Jin O. Park, Jeong Eun Song:
User Authentication Based on Distance Estimation Using Ultrasonic Sensors. 391-394 - Liying Lang, Yue Hong:
The Application of Face Recognition in Network Security. 395-398 - Bo Song, Huaikou Miao, Shengbo Chen:
Modeling Web Browser Interactions and Generating Tests. 399-404
Network and Wireless Communication Security
- Agung Fatwanto, Clive Boughton:
Analysis, Specification and Modeling of Non-Functional Requirements for Translative Model-Driven Development. 405-410 - Lei Sun, Xuandong Xiong:
Research on Certificate Cooperating Signature Scheme in Mobile Ad Hoc Networks. 411-414 - Changhong Liu, Xintian Liu, Hu Huang, Lihui Zhao:
Short-Term Traffic Flow Prediction Methods and the Correlation Analysis of Vehicle Speed and Traffic Flow. 415-418 - Huixian Li, Liaojun Pang:
Improvement on WLAN Multicast Key Management Protocol. 419-424 - Chuanrong Zhang, Yuqing Zhang:
Secure and Efficient Key Management Protocol in Ad Hoc Networks. 425-428 - Hongbo Lin, Yue Li, Baojun Yang:
Varying-Window-Length Time-Frequency Peak Filtering and its Application to Seismic Data. 429-432
Web Security and Data Management
- Shujiang Xu, Yinglong Wang, Jizhi Wang, Min Tian:
Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations. 433-437 - Jinling Song, Guohua Liu, Liming Huang:
K-MSD-WGT: A Local Recoding Algorithm Capturing Attribute Preferences. 438-441 - Qi Xie, Zhonghua Shen, Xiuyuan Yu:
ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing. 442-445 - Ming Meng, Wei Sun:
Short-Term Load Forecasting Based on Rough Set and Wavelet Neural Network. 446-450 - Hai Zhu, Yuping Wang:
Security-Driven Task Scheduling Based on Evolutionary Algorithm. 451-456 - Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang, Kefeng Fan:
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement. 457-462
Anti-Virus and Biometrics
- Xiukun Li, Xiangqian Wu, Ning Qi, Kuanquan Wang:
A Novel Cryptographic Algorithm Based on Iris Feature. 463-466 - Xiukun Li, Xiangqian Wu, Kuanquan Wang:
Directional Gaussian Derivative Filter Based Palmprint Authentication. 467-471 - Xin Du, Yingjie Yang, Xiaowen Kang:
Research of Applying Information Entropy and Clustering Technique on Network Traffic Analysis. 472-476 - Yong Wang, Zhiguang Qin, Bin Tong, Jing Jin:
Link Farm Spam Detection Based on its Properties. 477-480
Applications
- Yongxia Zuo, Guoqiang Wang, Chuncheng Zuo:
Wavelet Packet Denoising for Pavement Surface Cracks Detection. 481-484 - Yongxia Zuo, Guoqiang Wang, Chuncheng Zuo:
A Novel Image Segmentation Method of Pavement Surface Cracks Based on Fractal Theory. 485-488 - Xiaodong Wang, Xin Zheng, Qian Yin:
Large Scale Terrain Compression and Real-Time Rendering Based on Wavelet Transform. 489-493 - Yuan Ding, Hai-Lin, Xue-fei Cao:
An Intelligent Computation of Coverage and Capacity of Base Station in 3G Mobile Communications Network. 494-497
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.