CIS 2013: Emei Mountain, Sichan Province, China
- Ninth International Conference on Computational Intelligence and Security, CIS 2013, Emei Mountain, Sichan Province, China, December 14-15, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-2548-3
Intelligent Computation
- Qun Zhang, Ying Min Wang:
The Finite Element Analysis on the Multi-bubble Model in the Ship Wake. 1-5 - Zhendong Liu, Daming Zhu, Wei Cui, Nan Liu:
An Approximation Scheme for RNA Folding Structure Prediction Including Pseudoknots. 6-10 - Deng-Xu He, Gui-Qing Liu, Hua-Zheng Zhu:
Glowworm Swarm Optimization Algorithm for Solving Multi-objective Optimization Problem. 11-15 - Xiaomin Hu, Jun Zhang:
Optimizing Vaccine Distribution for Different Age Groups of Population Using DE Algorithm. 21-25 - Hong-Chao Yan, Hai-Lin Liu, Qiang Wang:
Dynamic Resource Allocation of TD-LTE System Based on Improved Quantum Evolutionary Algorithm. 26-30 - Jun Wu, Yuelin Gao, Lina Yan:
An Improved Differential Evolution Algorithm for Mixed Integer Programming Problems. 31-35 - Shilei Lv, Shunzheng Yu:
A Middleware-Based Model for Redundant Reader Elimination Using Plant Growth Simulation Algorithm. 36-40 - Hecheng Li, Lei Fang:
An Efficient Genetic Algorithm for Interval Linear Bilevel Programming Problems. 41-44 - Xiaoli Wang, Yuping Wang, Kun Meng:
An Energy-Aware Optimization Model Based on Data Placement and Task Scheduling. 45-49 - Hong-Li Yin:
Genetic Algorithm Nested with Simulated Annealing for Big Job Shop Scheduling Problems. 50-54 - Zhurong Wang, Changqing Yu, Xinhong Hei, Bin Zhang:
A Parallel Genetic Algorithm for Solving the Probabilistic Minimum Spanning Tree Problem. 61-65 - Dazhi Jiang, Chenfeng Peng, Zhun Fan:
Evolutionary Algorithm Based on Automatically Designing of Genetic Operators. 66-70 - Yuqiang Chen, Jianlan Guo, Xuanzi Hu:
Research on Related Vehicle Routing Problem for Multiple Depots Basing on Dynamic Constraint. 71-75 - Yuqiang Chen, Xuanzi Hu, Guangzai Ye:
Research on Related Vehicle Routing Problem for Single Distribution Centre Based on Dynamic Constraint. 76-79 - Weijia Wang, Jie Hu:
A New Evolutionary Algorithm for Portfolio Optimization and Its Application. 80-84 - Wentian Mai, Hai-Lin Liu, Lei Chen, JiongCheng Li, Henghui Xiao:
Multi-objective Evolutionary Algorithm for 4G Base Station Planning. 85-89 - Huilin Yi, Jianhui Yang:
Multi-objective Portfolio Optimization Based on Fuzzy Genetic Algorithm. 90-94 - Lei Fan, Xiyang Liu:
An Enhanced Domination Based Evolutionary Algorithm for Multi-objective Problems. 95-99
Intelligent Systems and Complex Systems
- Mengzhe Chen, Qingqing Zhang, Zhichao Wang, Jielin Pan, Yonghong Yan:
Web-Based Language Model Domain Adaptation for Real World Voice Retrieval. 100-104 - Liping Chen, Guojun Zhang:
A Petri Net Approach to Reliable Execution for Web Service Composition. 105-109 - Guocheng Xie, Yun Jiang, Na Chen:
A Multi-class Support Vector Data Description Approach for Classification of Medical Image. 115-119 - Meng Wang, Lanfen Lin, Feng Wang:
Improving Short Text Classification through Better Feature Space Selection. 120-124 - Jun Yang, Zhonghua Li, Wei Xiang, Luxin Xiao:
An Improved Apriori Algorithm Based on Features. 125-128 - Bin Gui, Xiaoping Yang:
Research on Sentiment Tendency Analysis of Microtext Based on Sense Group. 129-133 - Shuigui Huang, Wenwen Han, Xirong Que, Wendong Wang:
Polarity Identification of Sentiment Words Based on Emoticons. 134-138 - Ting Jin, Tong Xu, Enhong Chen, Qi Liu, Haiping Ma, Jingsong Lv, Guoping Hu:
Random Walk with Pre-filtering for Social Link Prediction. 139-143 - Xueyuan Gong, Yain-Whar Si:
Comparison of Subsequence Pattern Matching Methods for Financial Time Series. 154-158 - Yibu Ma:
The Research of Stock Predictive Model Based on the Combination of CART and DBSCAN. 159-164 - Yajuan Yang, Quanju Zhang:
Differential-Algebraic Equations Model for Quadratic Programming. 165-169 - Hui Du, Yuping Wang, LiLi Duan:
A New Method for Grayscale Image Segmentation Based on Affinity Propagation Clustering Algorithm. 170-173 - Hanhai Zhou, Jinjin Wang, Jiadong Wu, Long Zhang, Peng Lei, Xiaoyun Chen:
Application of the Hybrid SVM-KNN Model for Credit Scoring. 174-177 - Chunhong Yang, Zeng-li Liu:
The Superiority Analysis of Linear Frequency Modulation and Barker Code Composite Radar Signal. 182-184 - Wei Wang, Zeng-li Liu, Chen Lin, Weiwei Sha:
Harmonic Detection of Power System Based on SVD and EMD. 185-189 - Huichuan Duan, Naiwen Liu:
A Greedy Search Algorithm for Resolving the Lowermost C Threshold in SVM Classification. 190-193
Learning Algorithms
- Fuhua Song, Shuiqiang Yi:
Research on Application of Improved Genetic Algorithm in Urban Full Independent Tourist Route Planning. 200-203 - Hongjian Xu, Yanjuan Shuai, Wenzhang He:
The Image Reconstruction Algorithm Based on Wiener Filtering. 204-208 - Yefei Liu, Fulong Wang, Xiang-yan Xi:
Enhanced Algorithm for Exemplar-Based Image Inpainting. 209-213 - Xiangyan Xi, Fulong Wang, Yefei Liu:
Improved Criminisi Algorithm Based on a New Priority Function with the Gray Entropy. 214-218 - Qifan Fu, Yichun Zhang, Liyong Xu, Huixin Li:
A Method of Shot-Boundary Detection Based on HSV Space. 219-223 - Haifeng Sima, Ping Guo:
Texture Region Merging with Histogram Feature for Color Image Segmentation. 224-228 - Shaoming Zhang, Sheng Yu, Qingyu Ma, Pengchao Shang, Popo Gui, Jianmei Wang, Tiantian Feng:
Pedestrian Counting for a Large Scene Using a GigaPan Panorama and Exemplar-SVMs. 229-235 - Xiuqin Deng, Weijia Cai, Chengyan Fang, Weiqing Kong, Jianqiang Liao:
An Improved Kalman Filtering Algorithm for Moving Contact Detecting and Tracking. 236-240 - Shanwen Zhang, Chuanlei Zhang:
Orthogonal Locally Discriminant Projection for Classification of Plant Leaf Diseases. 241-245 - Renlong Pan, Xin Lin, Chenquan Huang, Lin Wang:
A Novel Vehicle Flow Detection Algorithm Based on Motion Saliency for Traffic Surveillance System. 246-249 - Xiaoguang Liu, Xingbao Gao, Qiufang Xue:
Image Restoration Combining Tikhonov with Different Order Nonconvex Nonsmooth Regularizations. 250-254 - Qifeng Lin, Wei Liu, Hongxin Peng, Yuxing Chen:
Efficient Genetic Algorithm for High-Dimensional Function Optimization. 255-259 - Bo Shuai, Haifeng Li, Mengjun Li, Quan Zhang, Chaojing Tang:
Software Defect Prediction Using Dynamic Support Vector Machine. 260-263 - Juan Li, Yuping Wang:
A Nearest Prototype Selection Algorithm Using Multi-objective Optimization and Partition. 264-268 - Peng Sun, Xin Guo, Yunpeng Zhang, Ziyan Wu:
Analytical Model of Customer Churn Based on Bayesian Network. 269-271 - Jing Meng, Pei-Yong Zhu, Hou-Biao Li:
QMRCGstab Algorithm for Families of Shifted Linear Systems. 272-276 - Li Baiping, Liu Dan:
Research and Realization of Coordinate Conversion in Radar Video Display. 277-279 - Xiangzhu Long, Jishen Li, Youjun Hu:
A Multiple Chaotic Video Encryption System Based on DM642. 280-283 - Jun Li, Lixin Ding, Ying Xing:
Differential Evolution Based Parameters Selection for Support Vector Machine. 284-288
Neural Networks and Neural Systems
- Xin-Lei Feng, Xiao-Li Yang, Zhi-He Zhang, Zhongwei Si:
Group Consensus with Switching Topology of Multi-agent Systems. 289-293 - Guoqiang Hang, Danyan Zhang, Xuanchang Zhou, Xiaohu You:
An Enhanced Dynamic Switch Logic with Floating-Gate MOS Transistors. 294-297 - Liping Jia, Xin-Lei Feng, Guocheng Zou:
Solving Multiobjective Bilevel Transportation-Distribution Planning Problem by Modified NSGA II. 303-307 - Xiuming Zou, Huaijiang Sun:
Clustering Analysis of Micro-array Data Based on the SOM Algorithm. 308-312 - Guoqiang Hang, Xiaohui Hu, Hongli Zhu, Xiaohu You:
Differential Edge-Triggered Flip-Flops Using Neuron-MOS Transistors. 313-317 - Saifeng Zeng, Ligu Zhu, Lei Zhang:
A High Reliable and Performance Data Distribution Strategy: A RAID-5 Case Study. 318-322 - Long Wang, Yuqing Lan, Qingxin Xia:
Using CloudSim to Model and Simulate Cloud Computing Environment. 323-328 - Dongyi He, Jianhua Shuai:
The Application of Fuzzy Comprehensive Evaluation Method for the Evaluation Enterprise Training Effectiveness. 329-333 - Jinquan Li, Yongchuan Wen:
A Decision Making Model Based on Fuzzy Relation Equations Constraints and Its Algorithm. 334-338 - Wei-Xin Ling, Zhen Xing, Zhuo-ming Chen, Da-Jun Tang:
Designing a Fuzzy Classifier Using Genetic Algorithm and Application in Chinese Vowel Recognition. 344-348
Pattern Recognition and Knowledge Discovery
- Zhao Li, Peng Liang, Yi Zhao, Keqing He:
MFI Based Interoperability Measurement of Business Models in Service-Based Enterprises. 358-362 - Hong Wang, Minggang Du:
Distribution Reduction in Inconsistent Interval Ordered Information Systems Based on Dominance Relations. 363-367 - Chao Yang, Fugen Zhou, Xiangzhi Bai:
3D Reconstruction through Measure Based Image Selection. 377-381 - Zhaohui Xia, Jianyong Wang, Xiaogang Yang:
A Fusion Algorithm Based on Position Difference Filtering and Least Squares Estimate for Dynamic Scene Matching. 387-390 - Lu Dong, Likun Qiu, Xiujuan Chen:
The Determination of Chinese Pivotal Sentences Based on Semantic Entailment. 396-400 - Guoyu Tang, Yunqing Xia, Erik Cambria, Peng Jin:
Inducing Word Senses for Cross-lingual Document Clustering. 409-414 - Xueqiang Lv, Ruihong Wu, Bin Wen:
Chinese Personal Name Recognition in Web Queries via Bootstrapping. 415-419 - Jianping Zhang, Yao Liu:
Study on Construction of Semantic Metadata Structure in Professional Fields. 420-423 - Sheng-Ping Zhu, Ji-Xiang Du, Chuan-Min Zhai, Zhong-Qiu Zhao:
Diversifying Plant Image Retrieval with Dimensionality Reduction. 428-431 - Yi-Ming Liu, Li-Fang Chen, Yuan Liu, Hao-Tian Wu:
An Image Matching Algorithm Based on SIFT and Improved LTP. 432-436 - Zhuang Zhang, Donghui Hu, Yang Yang, Bin Su:
A Universal Digital Image Steganalysis Method Based on Sparse Representation. 437-441
Access Control and Protection
- Lequan Min, Yuqun Zhang, Lijiao Zhang, Kexin Hu:
A Novel 3 Dimensional Chaotic System and Design of Pseudorandom Number Generator. 442-448 - Yuxiao Ling, Zheng Guo, Zhimin Zhang, Zhigang Mao, Zeleng Zhuang:
A Block Cipher Circuit Design against Power Analysis. 449-453 - Tong Li, Shenghui Su:
Analysis of Success Rate of Attacking Knapsacks from JUNA Cryptosystem by LLL Lattice Basis Reduction. 454-458 - Hao Zhu, Shenghui Su:
The Improvement of the Commonly Used Linear Polynomial Selection Methods. 459-463 - Wenjuan Ying:
An Improved Block Lanczos Algorithm to Solve Large and Sparse Matrixes on GPUs. 464-468 - Lifeng Guo, Bo Lu, Xiangyu Li, He Xu:
A Verifiable Proxy Re-encryption with Keyword Search without Random Oracle. 474-478 - Huaijun Wang, Dingyi Fang, Guanghui Li, Xiaoyan Yin, Bo Zhang, Yuanxiang Gu:
NISLVMP: Improved Virtual Machine-Based Software Protection. 479-483 - Zhonghua Li, Jin Yang, Jun Yang, De-Ming Wang:
GPS Route Decisions Research Based on Network Theory. 484-488 - Dongmei Gao, Ruliang Wang:
Stability Analysis for a Class of Systems with Time-Varying and Distributed Delays. 494-497 - Ruliang Wang, Shanshan Zhang, Wen Huang:
The Design of Output Feedback Controller for a Class of Nonlinear Systems with Time-Delay. 498-502
Authentication and Authorization
- Hao-Tian Wu, Yuan Liu, Yiu-ming Cheung:
Reversible Image Watermarking Using a Diagonal Structure for Prediction. 508-513 - Hui Xu, Xiang Chen, Jiangmei Zhou, Zhaowen Wang, Huanxiao Xu:
Research on Basic Problems of Cognitive Network Intrusion Prevention. 514-517 - Wenjuan Li, Yuxin Meng, Lam-for Kwok:
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. 518-522 - Jiachen Liu, Jianfeng Song, Qiguang Miao, Ying Cao:
FENOC: An Ensemble One-Class Learning Framework for Malware Detection. 523-527 - Jiyun Yang, Rui Zhang, Di Xiao:
Analysis and Improvement of an Efficient and Secure Key Agreement Protocol. 528-532 - Shuqing Jiao:
Design on the Real-Time Measurement Method of Molten Metal High Temperature Based on DSP. 533-536 - Bo Zhao, Hong Du, Ying Wang, Xiaozheng Zhang:
Robust Tracking Integrated with Detection and Online Learning. 537-541 - Jiajia Zhang, Shuli Zheng, Donghui Hu, Yunling Zhang:
Improving Histogram Shifting Reversible Data Hiding by Pixel Pair's Average Predictions. 545-549 - Donghui Hu, Bin Su, Shuli Zheng, Zhuang Zhang:
Secure Architecture and Protocols for Robust Perceptual Hashing. 550-554
Cryptography and Cryptanalysis
- Yuanhui Lin, Mengbo Hou, Qiuliang Xu:
Strongly Password-Based Three-Party Authenticated Key Exchange Protocol. 555-558 - Guiying Li, Mengbo Hou, Chuan Zhao, Qiuliang Xu:
A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security. 559-563 - Hao Wang, Chuan Zhao, Qiuliang Xu, Yilei Wang:
Identity-Based Authenticate Key Exchange Protocol from Lattice. 564-568 - Lequan Min, Kexin Hu, Lijiao Zhang, Yuqun Zhang:
Study on Pseudorandomness of Some Pseudorandom Number Generators with Application. 569-574 - Xianglong Kong, Wei Wang, Qiuliang Xu:
Improved Rectangle Attack on SMS4 Reduced to 18 Rounds. 575-578 - Jun Sang, Bin Cai, Bing Zhang, Daxiang Hong, Haibo Hu:
Security Analysis of Random Phase Encoding Based Image Encryption in Gyrator Transform Domains. 579-582 - Sen Bai, Guibin Zhu, Jian Huang:
An Intelligent Algorithm for the (1, 2, 2)-Generalized Knight's Tour Problem. 583-588 - Xing Wei, Zheng Yuan, Xian Li, Xiao Feng, Jintao Liu:
Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures. 589-593
Data Security and Integrity
- Ning Zhang, Ahmad Iqbal Hakim Suhaimi, Yuichi Goto, Jingde Cheng:
An Analysis of Software Supportable Tasks Related with ISO/IEC 15408. 601-606 - Weiquan Xian, Houkui Wang:
The Design Research of Data Security Model Based on Public Cloud. 607-609 - Yan-ting Ouyang, Hui-Dang Zhang, Yu-Yao He:
The Hopf Bifurcation and Control of a Time-Delayed Dual Model in Internet Congestion Control. 610-614 - Guangcheng Liang, Lejian Liao, Xin Xu, Jianguang Du, Guoqiang Li, Henglong Zhao:
Effective Fuzzing Based on Dynamic Taint Analysis. 615-619