default search action
CIS 2007: Harbin, Heilongjiang, China
- Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007. IEEE Computer Society 2007, ISBN 0-7695-3072-9
Keynote Speakers
- Ton Kalker:
DRM Interoperability. - Lalit M. Patnaik:
Towards an Understanding of the Brain via Microscopic and Macroscopic Studies. - Xindong Wu:
Mining with Noise Knowledge: Error Aware Data Mining. - Stephen D. Wolthusen:
Modeling Network Security Services in Tactical Networks.
Learning Theory and Algorithms
- Chu-Jun Yao, Hai-Lin Liu, Zhi-Tao Cui:
Mixing Matrix Recovery of Underdetermined Source Separation Based on Sparse Representation. 1-5 - Weihua Lin, Yonggang Wu, Dianhui Mao:
Region Assessment of Soil Erosion Based on Naive Bayes. 6-9 - Satyabrata Pradhan, Rajveer Singh, Komal Kachru, Srinivas Narasimhamurthy:
A Bayesian Network Based Approach for Root-Cause-Analysis in Manufacturing Process. 10-14 - Weihong Fu, Xiaoniu Yang, Naian Liu:
Step-Size Optimization EASI Algorithm for Blind Source Separation. 15-18 - Xuansen He, Shouke Ma:
Variable Step-Size Online Algorithm for Blind Separation Based on the Extended Infomax. 19-22 - Hongsheng Su, Feng Zhao:
A Novel Learning Method for ANFIS Using EM Algorithm and Emotional Learning. 23-27 - Yi Hu, Yue Chang, Yong Ni:
A Novel Method for Intelligence of Sensors Modeling. 28-31 - Peng Huang, Jiajun Bu, Chun Chen, Guang Qiu:
An Effective Feature-Weighting Model for Question Classification. 32-36 - Jun Li, Shunyi Zhang, Shidong Liu, Ye Xuan:
P2P Traffic Identification Technique. 37-41 - Yong-hui Qiao, Yu Liu, Bao-ku Su:
Study on PIGA Test Method on Centrifuge. 42-47 - Liu Ji, Wang Bende:
Parameters Selection for SVR Based on the SCEM-UA Algorithm and its Application on Monthly Runoff Prediction. 48-51 - Tianqi Zhang, Shaosheng Dai, Liufei Yang, Xuesong Li:
Estimate and Track the PN Sequence of Weak DS-SS Signals. 52-56 - Min Jiang, Zhiqing Meng, Gengui Zhou:
A Smoothing Support Vector Machine Based on Quarter Penalty Function. 57-59 - Wenwu He, Zhizhong Wang:
Fast Forecasting with Simplified Kernel Regression Machines. 60-64 - Zhifeng Hao, Zhenhua He, Xiaowei Yang:
An Accelerated SMO-Type Online Learning Algorithm. 65-69 - Qi Yuan, Rong-chun Zhao:
An Improved MRF Based Unsupervised Change Detection Method. 70-74 - Chun-Guang Li, Jun Guo, Xiangfei Nie:
Intrinsic Dimensionality Estimation with Neighborhood Convex Hull. 75-79
Evolutionary Computation
- Lijie Li, Yongmei Lei, Ying Zhang:
A Novel Evolutionary Algorithm for Function Optimization Using MEC. 80-84 - Gengui Zhou, Zhiqing Meng, Zhenyu Cao, Jian Cao:
A New Tree Encoding for the Degree-Constrained Spanning Tree Problem. 85-90 - Hong-qi Li, Li Li:
A Novel Hybrid Real-Valued Genetic Algorithm for Optimization Problems. 91-95 - Hong Li, Yong-Chang Jiao, Li Zhang, Fushun Zhang:
Global Optimization Method Based on the Statistical Genetic Algorithm for Solving Nonlinear Bilevel Programming Problems. 96-100 - Wang Lian, Liu Juan, Luo Fei:
Prediction of MHC Class II Binding Peptides Using a Multi-Objective Evolutionary Algorithm. 101-104 - Yibo Hu, Yuping Wang:
A New Evolutionary Algorithm for Constrained Optimization Problems. 105-109 - Na Li, Ya-dong Mei:
An Improved Genetic Algorithm for Optimal Operation of Cascaded Reservoirs. 110-113 - Xiaoping Zhong, Weiji Li:
A Decision-Tree-Based Multi-objective Estimation of Distribution Algorithm. 114-118 - Tse Guan Tan, Jason Teo, Hui Keng Lau:
Performance Scalability of a Cooperative Coevolution Multiobjective Evolutionary Algorithm. 119-123 - Xing Xu, Yuanxiang Li:
Comparison between Particle Swarm Optimization, Differential Evolution and Multi-Parents Crossover. 124-127 - Xuzhou Li, Fei Yu, You-Bo Wang:
PSO Algorithm Based Online Self-Tuning of PID Controller. 128-132 - Zhengjia Wu, Jianzhong Zhou:
A Self-Adaptive Particle Swarm Optimization Algorithm with Individual Coefficients Adjustment. 133-136 - Jianwei Gong, Jianyong Qi, Guangming Xiong, Huiyan Chen, Wanning Huang:
A GA Based Combinatorial Auction Algorithm for Multi-Robot Cooperative Hunting. 137-141 - Weixin Ling, Huanping Luo:
An Adaptive Parameter Control Strategy for Ant Colony Optimization. 142-146
Data Mining
- Sun Wei, Wang Ke:
A Multi-Focus Image Fusion Algorithm with DT-CWT. 147-151 - Xiaohui Chen, Yang Zhang:
A Fuzzy Fusion in Multitarget Tracking with Multisensor. 152-156 - Jang-won Kim, Dongwon Jeong, Jinhyung Kim, Doo-Kwon Baik:
An Algorithm for Extracting Referential Integrity Relations Using Similarity during RDB-to-XML Translation. 157-161 - Zufeng Wang, Weiping Wang:
Research on Algorithm of Web Classification Based on EP and FFSS. 162-166 - Weimin Ouyang, Shuanghu Luo, Qinhua Huang:
Discovery of Direct and Indirect Association Patterns in Large Transaction Databases. 167-170 - Cheong Hee Park, Moonhwi Lee:
Associative Classification Using SVM-Based Discretization. 171-175 - Jingfeng Guo, Lizhen Zheng, Tieying Li:
An Efficient Graph-Based Multi-Relational Data Mining Algorithm. 176-180 - Tao Zeng, Juan Liu:
Analysis on Time-lagged Gene Clusters in Time Series Gene Expression Data. 181-185 - Zhipeng Wang, Yuhai Zhao, Ying Yin:
A Novel Local Features-Based Approach for Clustering Microarray Data. 186-190 - Ayad R. Abbas, Juan Liu, Safaa O. Mahdi:
Improved Variable Precision Rough Set Model and its Application to Distance Learning. 191-195 - Yue-Jin Lv, Hongyun Zhang, Fen Quan, Zhi-cheng Chen:
A New Attribute Reduction Algorithm in Continuous Information Systems. 196-200 - Jun Gao:
Realization of a New Association Rule Mining Algorithm. 201-204 - Guorui Jiang, Guojun Zang:
A Study on the Method of Attribute Reduction Based on Rough Set under Fuzzy Equivalent Relation. 205-208 - Juryon Paik, Joo Chang Lee, Junghyun Nam, Ung-Mo Kim:
Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. 209-213 - Gang Fang, Zukuan Wei, Qian Yin:
The Algorithm of Objective Association Rules Mining Based on Binary. 214-217 - Xiaobing Yang, Lingmin He, Jin Tan:
Fuzzy Factor in Switching Regression Models. 218-221 - Jingqiu Xu, Zhengyu Zhu, Xiang Ren, Yunyan Tian, Ying Luo:
Personalized Web Search Using User Profile. 222-226 - Xianwei Hu, Ying Yin, Bin Zhang:
Mining Temporal Web Interesting Patterns. 227-231 - Huaiguo Fu, Mícheál Ó Foghlú, Willie Donnelly:
Frequent Closed Informative Itemset Mining. 232-236 - Jufeng Yang, Guangshun Shi, Yan Zheng, Qingren Wang:
Data Extraction from Deep Web Pages. 237-241 - Sima Soltani, Ahmad Abdollahzadeh Barforoush:
Web pages Classification Using Domain Ontology and Clustering. 242-246
Distributed and Multi-Agent Systems
- Zhenghua Xue, Xiaoshe Dong, Weizhe Liu, Junyang Li, Shihua Liao:
A Multi-Agent Based Autonomic Management Architecture for Large-Scale Server Clusters. 247-251 - Weiming Tong, Jing Zhao:
Quantum Varying Deficit Round Robin Scheduling Over Priority Queues. 252-256 - Yinliang Yue, Fang Wang, Dan Feng:
iRBO: Intelligent Role-Based Object for Object-Based Storage Device. 257-26 - Biqing Wang, Peng He:
L-Chord: Routing Model for Chord Based on Layer-Dividing. 262-265 - Jingli Zhou, Guang Yang, Lijun Dong, Gang Liu:
Implementation and Performance Evaluation of an Adaptable Failure Detector for Distributed System. 266-270 - Xiaojing Li, Yu Gu, Dejun Yue, Ge Yu:
An Adaptive Join Strategy in Distributed Data Stream Management System. 271-275 - Jie Shen, Rong-shuang Sun, Liu-hua Wei, Hui Zhang, Yan Zhu, Chen Chen:
Topic-Oriented Search Model Based on Multi-Agent. 276-280 - Huaikou Miao, Shengbo Chen, Zhong-sheng Qian:
A Formal Open Framework Based on Agent for Testing Web Applications. 281-285 - Ji-Li Yin, Ying Liu, Jinyan Wang, Wenxiang Gu, Yinping Zhang:
A Recognition Approach for Adversarial Planning Based on Complete Goal Graph. 286-290 - Li Li, Hao Li, Gehao Lu, Shaowen Yao:
A Quantifiable Trust Model for Multi-agent System Based on Equal Relations. 291-295 - Yang Bo, Wang Cheng, Huang Hua, Li Lijun:
A Multi-Agent and PSO Based Simulation for Human Behavior in Emergency Evacuation. 296-300
Image Processing and Pattern Recognition
- Jianye Hao, Wangmeng Zuo, Kuanquan Wang:
Theoretical Investigation on Post-Processed LDA for Face and Palmprint Recognition. 301-305 - Heng Fui Liau, Kah Phooi Seng, Yee Wan Wong, Li-Minn Ang:
New Parallel Models for Face Recognition. 306-309 - Qindong Sun, Qian Wang, Xinbo Huang:
A Multi-Pattern Matching Algorithm on Multi-Language Mixed Texts for Content-Based Network Information Audit. 310-314 - Lee Seng Yeong, Li-Minn Ang, Kah Phooi Seng:
Face Detection from Greyscale Images Using Details from Categorized Wavelet Coefficients as Features for a Dynamic Counterpropagation Network. 315-319 - Shao-ping Wang, Wenjiang Pei, Yiu-ming Cheung:
An Improved Competitive and Cooperative Learning Approach for Data Clustering. 320-324 - Siyuan Cheng, Xiangwei Zhang, Kelun Tang:
Shape Modification of B-Spline Curve with Geometric Constraints. 325-329 - Xiaoli Sun, Guoxiang Song:
A New Anisotropic Diffusion Equation with Adaptive Fidelity Term. 330-334 - Junding Sun, Xiaosheng Wu:
An Effective Approach towards Contour-Shape Retrieval. 335-338 - Enwei Zhang, Feng Chen:
A Fast and Robust People Counting Method in Video Surveillance. 339-343 - Mengmeng Zhang, Yuehai Wang, Jingzhong Wang, Shumin Zhou:
A Hard Decision Error Correction Scheme for Corrupted Arithmetic Codes. 344-346 - Yuwang Yang, Jun Tao, Jingyu Yang:
Level Set Method for License Plate Localization Technology. 347-350 - Ping Zhong, Fang Liu, Runsheng Wang:
A New MRF Framework with Dual Adaptive Contexts for Image Segmentation. 351-355 - Bi Sheng, Xiaoyan Shen, Qiang Wang:
Human Body Segmentation in the Presence of Occlusion. 356-360 - Ke Lu, Feng Zhao, Ning He:
An Effective Approach to Content-Based 3D Model Retrieval and Classification. 361-365 - Haibin Yu, Jilin Liu, Jingbiao Liu:
3D Feature Extraction of Head based on Target Region Matching. 366-370 - Zhi-Cheng Zhao, An-Ni Cai:
Extraction of Semantic Keyframes Based on Visual Attention and Affective Models. 371-375 - Jia Li, Mei Xie:
A Color and Texture Feature Based Approach to License Plate Location. 376-380 - Yong Ge, Jishang Wei, Xin Yang, Xiuqing Wu:
Salience-Based Evaluation Strategy for Image Annotation. 381-385 - Hongxia Zhao, Tao Wang:
Study on Conversion Method of Color Space under a Big Color Gamut. 386-390 - Yuelu Liu, Tingzhi Shen, Xinyi Wang:
Image Restoration Using Gaussian Particle Filters. 391-394 - Jun Tang, Dong Liang, Nian Wang, Zhao-Hong Jia:
Spectral Correspondence Using Local Similarity Analysis. 395-399 - Monireh Abdoos, Nasser Mozayani:
A Combined Feature for Fingerprint Recognition. 400-404 - Taiping Zhang, Bin Fang, Guanghui He, Jing Wen, Yuanyan Tang:
Face Recognition Using Topology Preserving Nonnegative Matrix Factorization. 405-409 - Zirong Li, Minghui Du:
2D-NPP: An Extension of Neighborhood Preserving Projection. 410-414 - Ning Wang, Guo-qiang Han:
Laser Printer Fuzzy Identification Based on Correlative Specific Area of Character Image. 415-419 - Liming Dai, Miao Liu, Yuanyuan Chen:
Improved Facial Feature Points Calibration Algorithm Based on ASM. 420-423 - Rajesh Chandrasekhara Panicker, Sadasivan Puthusserypady:
A Constrained Genetic Algorithm for Efficient Dimensionality Reduction for Pattern Classification. 424-427 - Chun-Guang Li, Jun Guo, Honggang Zhang:
Pruning Neighborhood Graph for Geodesic Distance Based Semi-Supervised Classification. 428-432 - Yangping Wang, Jianwu Dang, Zhengping Zhu:
Traffic Signs Detection and Recognition by Improved RBFNN. 433-437 - Guo-Hua Liu, Huidong Ma, Xu Li, Peng Liang:
Extracting Digital Fingerprints from Chinese Documents. 438-441
Intelligent and Fuzzy Systems
- Xuan Wang, Shi An:
A Model for Fitting the Yield Curve Based on a Continuous Penalty Function. 442-445 - Jinsha Yuan, Li Qu, Weihua Zhang, Li Li:
Case-Based Reasoning Combined with Information Entropy and Principal Component Analysis for Short-Term Load Forecasting. 446-450 - Tao Zhao, Wandong Cai, Yongjun Li:
MPIDA: A Sensor Network Topology Inference Algorithm. 451-455 - Sheng-Fei Hsu, Dong-Her Shih, Hui-Ling Yu:
Exploring the Relationships between Personal Characteristics, Aims, and Reasons of Learning in Further Education by Associating Rule Mining. 456-460 - Mingxin Zhang, Zhaogan Lu, Junyi Shen:
Image Retrieval with Simple Invariant Features Based Hierarchical Uniform Segmentation. 461-465 - Junbo Gao, Bowen An, Anjun Song, Xiaofeng Wang:
A New Topic Influence Model Research in Online Community. 466-469 - Daogang Peng, Hao Zhang, Li Yang, Longhu Xu:
Study of Immune PID Adaptive Controller and Its Applications in Thermal Control System. 470-474 - Furong Liu, Changhong Wang, Xiao Zhi Gao, Qiaoling Wang:
A Fuzzy Clustering Algorithm Based on Artificial Immune Principles. 475-479 - Xiang Li, Yuechao Wang:
Construct a Real-time Selective Neural Group Network Controller for Internet-Based Teleoperation System. 480-484 - Quanju Zhang, Yi Niu, Yajuan Yang, Wenxue Niu:
Neurodynamic Analysis for Symmetric Schur Decomposition Problems. 485-489 - Rui Wang, Zhaoming Lei, Hexu Sun, Yi Zheng:
Fuzzy Control System Based on Wavelet Analysis. 490-494 - Guiwu Wei, Xiaorong Wang:
Some Geometric Aggregation Operators Based on Interval-Valued Intuitionistic Fuzzy Sets and their Application to Group Decision Making. 495-499 - Bin Sun, Yan-Kui Liu:
Fuzzy Distribution Games with Minimum Risk Criteria. 500-504 - Mingfa Zheng, Yan-Kui Liu:
Bounds on the Value of Fuzzy Solution to Fuzzy Programming Problem. 505-509 - Zhaoming Lei, Hexu Sun, Yan Dong, Yi Zheng:
On Fuzzy Modulator for the PMSM Step Motion Control. 510-514 - Fang-Fang Hao, Yan-Kui Liu:
Fuzzy Random Portfolio Selection Problem. 515-519 - Yueying Peng, Weizhi Liao, Kaoru Hirota:
A Fuzzy Model of Interval speed Continuous Petri Nets. 520-525 - Wei-Dong Cai, Yi-Qing Qin, Bing-Ru Yang:
Selection of Delay Time Window and Delay Time in Phase Space Reconstruction. 526-530 - Kaleem Fatima, Vijay Gopal Sarvepalli, Zeeshan Nadeem Nakhi:
A Novel Architecture for the Computation of the 2D-DWT. 531-535 - Fuqing Zhao, Qiuyu Zhang, Aihong Zhu:
Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm Optimization. 536-539 - Wen-shang Xu, Qing-ming Yu, Yan-liang Sun, Tian-wen Dong:
Research on Improving Training Speed of LMBP Algorithm and its Simulation in Application. 540-545 - Guozhen Tan, Qing-qing Deng, Zhu Tian, Ji-xiang Yang:
A Dish Parallel BP for Traffic Flow Forecasting. 546-549 - Qiong Bao, Xingsheng Gu, Yongjun Shen:
An Improved Neural Network Model for Graduate Education Evaluation. 550-554 - Yonghui Pan, Fang Bao, Shitong Wang:
Supervised FCNN Classification for Garment Seams. 555-559 - Gang Cao, Mingyu Li, Cehui Mo:
Simulation of T-S Fuzzy Neural Network to UASB Reactor Shocked by Toxic Loading. 560-564 - Mahsa Rahmanian, Mahdi Aliyari Shoorehdeli, Mohammad Teshnehlab:
The Off-Line and On-Line Fuzzy Backstepping Controllers for Rotary Inverted Pendulum System. 565-569 - He Liu, Dao Huang, Li Jia:
Dynamic System Modeling with Multilayer Recurrent Fuzzy Neural Network. 570-574
Cryptography and Security Techniques
- Ya-Jing Zhang, Yi-ming Zhai, Zhen-bin Du, Dian-Tong Liu:
Study of an Adaptive Immune Detection Algorithm for Anomaly Detection. 574-578 - Ting Wang, Xingyuan Chen, Bin Zhang, Lichun Pei:
A Method of Fine-Grained Authorization and Access Control for ASP Pages. 579-583 - Fengying Wang, Fei Wang:
The Research and Application of Resource Dissemination Based on Credibility and UCON. 584-588 - Franz Kollmann:
A Flexible Subscription Model for Broadcasted Digital Contents. 589-593 - Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti:
A Biometric Verification System Addressing Privacy Concerns. 594-598 - Guosheng Cheng, Cuilan Yun:
A New Forward-Secure Threshold Signature Scheme Based on Schnorr Cryptosystem. 599-603 - Zhiyu Peng, Shanping Li, Xin Lin:
A Novel Trust Community Based on Direct Certifying for Pervasive Computing Systems. 604-608 - Yee Wan Wong, Kah Phooi Seng, Li-Minn Ang, Wan Yong Khor, Fui Liau:
Audio-Visual Recognition System with Intra-Modal Fusion. 609-613 - Lanxiang Chen, Dan Feng:
An Efficient Credential-Based Scheme for Cross-Domain File Sharing. 614-617 - Hua Chen, Dengguo Feng:
An Effective Genetic Algorithm for Self-Inverse S-Boxes. 618-622 - Meifeng Li, Guanzhong Dai, Hang Liu, Wei Hu:
Design of an Instruction for Fast and Efficient S-Box Implementation. 623-626 - Jianjun Zhao, Jingsen Liu:
Pairing-Based Proxy Signature Scheme with Proxy Signer?s Privacy Protection. 627-631 - Chuyuan Wei, Ying Hao, Cheng Lv, Liping Qian:
An Improved Key Agreement Protocol Based on Key Association Set for Dynamic Peer Group. 632-636 - Chunming Tang, Dingyi Pei, Zheng-an Yao:
Efficient Zaps and Signatures of Knowledge. 637-641 - Xueming Wang, Xiang Li:
Game-Based Analysis of Multi-Party Non-Repudiation Protocols. 642-646 - Tingjun Liu, Shuhua Wu, Yuefei Zhu:
Forward Security for an Efficient Password-Based Authenticated Key Exchange. 647-651 - Puwen Wei, Mingqiang Wang, Wei Wang:
A Note on Shacham and Waters Ring Signatures. 652-656 - Ye Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin:
Generalized Synchronization Theorem for Undirectional Discrete Systems with Application in Encryption Scheme. 657-661 - Liufei Wu, Yuqing Zhang, Fengjiao Wang:
A Provable Secure Key Management Program for Wireless Sensor Network. 662-666 - Jin Xu, Dayin Wang:
A Single Key MAC Based on Hash127. 667-671 - Shenghui Su, Shuwang Lv:
To Solve the High Degree Congruence. 672-676 - Zuowen Tan:
Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves. 677-681 - Yan Deng, Guanzhong Dai, Shuxin Chen:
A Robust Estimator for Evaluating Internet Worm Infection Rate. 682-686 - Xuetao Duan, Chunfu Jia, Yubing Fu:
A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data. 687-691 - Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang:
A Context-Based Analysis of Intrusion Detection for Policy Violation. 692-696 - Tu Xu, Dake He, Yu Luo:
DDoS Attack Detection Based on RLT Features. 697-701 - Safaa O. Al-Mamory, Hongli Zhang:
Scenario Discovery Using Abstracted Correlation Graph. 702-706 - Chun Yang, Haidong Yang, Feiqi Deng:
A Parameter Selection Approach for Mixtures of Kernels Using Immune Evolutionary Algorithm and its Application to IDSs. 707-711 - Sang Min Lee, Dong Seong Kim, Jong Sou Park:
A Hybrid Approach for Real-Time Network Intrusion Detection Systems. 712-715 - Yulong Shen, Jianfeng Ma, Qingqi Pei:
Research on the Resilience of Key Management in Sensor Networks. 716-720 - Tegshbayar Gerelbayar, Jong Sou Park:
A New Centralized Group Key Distribution and Revocation in Sensor Network. 721-724 - Hongzhen Du, Qiaoyan Wen:
An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings. 725-729 - Li Kang, Xiaohu Tang, Xianhui Lu, Jia Fan:
A Tight Security Reduction Identity-Based Signature Scheme. 730-734
System Security and Management
- Cuihua Zuo, Ruixuan Li, Hongmu Han, Zhengding Lu:
Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment. 735-739 - Dong Seong Kim, Yoonk Kyung Suh, Jong Sou Park:
Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. 740-744 - Lujiong Wang, Aiping Li, Liyun Xu:
A Security Model for Networked Manufacturing System. 745-749 - Yu Jiang, Ni Zhang, Binxing Fang:
An Email Geographic Path-Based Technique for Spam Filtering. 750-753 - Wei Sun, Lin Chen, Jian Song:
An Improved DAD Check Scheme MLD-Based in FHMIPv6. 754-758 - Lejun Zhang, Lin Guo, Wu Yang, Wei Wang, Yongtian Yang:
An Efficient Survivability Hierarchy Analysis Model for Networked Information System. 759-762 - Jinfu Chen, Yansheng Lu, Xiaodong Xie:
Testing Approach of Component Security Based on Fault Injection. 763-767 - Yong Zhang, Xiaobin Tan, Hongsheng Xi:
A Novel Approach to Network Security Situation Awareness Based on Multi-Perspective Analysis. 768-772 - Dapeng Man, Wu Yang, Yongtian Yang, Wei Wang, Lejun Zhang:
A Quantitative Evaluation Model for Network Security. 773-777 - Weiqiang Zhang, Chen Xu, Feipeng Li, Jiqiang Feng:
A Period-Finding Method for Shor's Algorithm. 778-780 - Jin Jiang, Lei Li, Zhihong Huang:
Hidden-ID Authentication Scheme and its SVO-Logic Based Formal Analysis. 781-784 - Jun Wang, Jun Liu, Weiru Chen:
Research of Software Reliability Based on Synthetic Architecture. 785-788 - Zhensong Liao, Hai Jin, Deqing Zou, Chisong Li:
An EMAIL Based Automated Trust Negotiation Model. 789-793 - Somak Bhattacharya, S. K. Ghosh:
An Artificial Intelligence Based Approach for Risk Management Using Attack Graph. 794-798 - Jin Shi, Yin Lu, Li Xie:
Game Theory Based Optimization of Security Configuration. 799-803 - Yunfang Feng:
Adaptive Trust Management in MANET. 804-808 - Fengjiao Wang, Yuqing Zhang:
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography. 809-814 - Jing Zhao, Zhigang Zhang, Maozhi Xu:
A Model of Hierarchical Key Assignment Scheme with CRT. 815-818 - Wei Jiang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. 819-823 - Li Jiang, Lingdi Ping, Xuezeng Pan:
Handling Information Release and Erasure in Multi-Threaded Programs. 824-828 - Xiaofeng Qiu, Ning Zhi, Xinxin Niu:
A Quantitative Security Model of IMS System. 829-832 - Jin Tan, Jintan Chen, Yanqiu Liu:
An Efficient Authentication Strategy for Reprogramming of Sensor Networks. 833-837 - Yang Lu, Junmo Xiao, Jing Liu:
Protecting XML Databases against Ontology-Based Inference Attack. 838-842 - Guodong Ye, Xiaoling Huang, Changqing Zhu:
Image Encryption Algorithm of Double Scrambling Based on ASCII Code of Matrix Element. 843-847 - Shih-I Huang, Shiuhpyng Shieh:
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks. 848-852 - Xiaobin Tan, Yong Zhang, Hongsheng Xi:
Multi-Perspective Quantization Model for Cyberspace Security Situation Awareness. 853-857 - Juhani Anttila:
Reinforcing Business Leaders? Role in Striving for Information Security. 858-862
Security Applications
- Zhaofeng Ma, Yixian Yang, Xinxin Niu:
Secure and Flexible Digital Rights Management in a Pervasive Usage Mode. 863-867 - Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan Luo:
Controlled Secret Leakage. 868-872 - Shaomin Zhang, Wei Wang:
A New Method Considering Creditability Degree and Connection of Buyers and Sellers in E-Broker System. 873-878 - Alfredo De Santis, Claudio Soriente:
Modified Original Smart Cards and Smart Card Clone Countermeasures. 878-882 - Yajun Wang, Mian Cai, Feng Tang:
Design of a New Selective Video Encryption Scheme Based on H.264. 883-882 - Young-Bok Cho, Yong-Zhen Li, Ning Sun, Sang Ho Lee:
CMS System of DRM Technology Base that Use Web Contents Certification Code. 888-891 - Yong Wang, Ming Li, Jingfeng Xue, Jingjing Hu, Longfei Zhang, Lejian Liao:
A Context-Aware Trust Establishment and Mapping Framework for Web Applications. 892-896 - Zhiguang Zhang, Xiaosu Chen, Miao Zhou:
A Digital Fingerprint Coding Based on Turbo Codes. 897-901 - Masa-Aki Fukase, Tomoaki Sato:
A Stream Cipher Engine for Ad-Hoc Security. 902-906 - Yingpei Zeng, Shigeng Zhang, Shanqing Guo, Xie Li:
Secure Hop-Count Based Localization in Wireless Sensor Networks. 907-911 - Jiehong Wu, Yujie Zhang, Xiaowei Wang, Guiran Chang:
A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking Technology. 912-916 - Yongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang:
Identity-Based Key Issuing Protocol for Ad Hoc Networks. 917-921 - Jing Liu, Hong-yun Xu, Cheng Xie:
A New Statistical Hitting Set Attack on Anonymity Protocols. 922-925
Watermarking and Information Hiding
- Shuguo Yang, Sheng-He Sun, Chunxia Li:
Research on Video Watermarking Scheme Based on Chaos, DWT and JND Model. 926-930 - Cheng Yang, Jianbo Liu, Yaqing Niu:
Robust Watermark Model Based on Subliminal Channel. 931-934 - Jianwei Yang, Wenbing Chen, Guosheng Cheng:
Two-Dimensional Wavelet Filters for Watermarking. 935-939 - Qiyang Zhao, Zhonglin Wang, Baolin Yin:
Analysis on the Sensitivity Attack to Watermarking Schemes with Patchwork Detection Boundaries. 940-944 - Dawen Xu:
A Blind Video Watermarking Algorithm Based on 3D Wavelet Transform. 945-949 - Bin Zhao, Kai Fan, Yue Wang, Weidong Kou:
Adaptive Encrypted Information Hiding Scheme for Images. 950-953
Other Applications
- Hui Zhao, Zhongguo Zheng:
Using Chain Graphical Model to Analyze the Efficacy of a Chinese Medicine. 954-958 - Shulin Wang, Huowang Chen, Shutao Li:
Gene Selection Using Neighborhood Rough Set from Gene Expression Profiles. 959-963 - Xuehu Yan, Shenghong Chen, Xiamu Niu:
An Improved Algorithm for Iris Location. 964-967 - Fei Xiang, Huijuan Xiao, Shuisheng Qiu, Chengliang Deng:
Dynamical Behavior of Three-Order Cellular Neural Network with Application in Image Secure Communication. 968-971 - Ting Liu, Ye Ji, Lequan Min, Geng Zhao, Xiaohong Qin:
Generalized Synchronization Theorem for Non-Autonomous Differential Equation with Application in Encryption Scheme. 972-976 - Xu Li, Guo-Hua Liu, Huidong Ma, Lei Wang:
The Representation of Chinese Semantic Knowledge and its Application in the Document Copy Detection. 977-980 - Bo Wang, Yongkui Liu, Yanyou Hao, Shuang Liu:
Defaults Assessment of Mortgage Loan with Rough Set and SVM. 981-985 - Yan-Long Qin, Ming-Chang Li, Zhao-Chen Sun, Yu-Xia Yang, Hai-Bin Xu:
Optimistic Design of Jetty Road Height Based on Genetic Algorithms. 986-990 - Peng Cheng, Weili Li, Wenbiao Chen, Deyuan Xia:
Calculation and Analysis of Double-Fed VSCF Induction Generator Operating Performance. 991-994 - Pei-lin Liu, Feng Li, Yi-jun Tan:
Research on Refining Mesh of Ship Hatch Corner Based on Transition Element. 995-999 - Ying Bi, Peijun Ma, Yixin Jing, Doo-Kwon Baik:
Speech Tagging Based Improvement of the RSS Polymerization News. 1000-1004 - Li Wern Chew, Li-Minn Ang, Kah Phooi Seng:
Low-Complexity Line-Based Motion Estimation Algorithm. 1005-1009 - Deng Linyi, Lin Yan:
A Particle Swarm Optimization for Resource-Constrained Multi-Project Scheduling Problem. 1010-1014 - Weiming Tong, Chengde Tong, Yong Liu:
A Data Engine for Controller Area Network. 1015-1019 - Kai Tang, Chao Yang, Jun Yang:
A Supply Chain Network Design Model for Deteriorating Items. 1020-1024 - Jingwen Tian, Meijuan Gao, Yanxia Liu, Hao Zhou:
The Study of Compost Quality Evaluation Modeling Method Based on Wavelet Neural Network for Sewage Treatment. 1025-1029 - Xuedong Tian, Si Wang, Xiaoyu Liu:
Structural Analysis of Printed Mathematical Expression. 1030-1034 - Min An Song:
System Level Assertion-Based Verification Environment for PCI/PCI-X and PCI-Express. 1035-1038 - JongSeon Lim, Kyung-Soo Joo, KyungSoo Kim, Mun-Young Choi:
Design of Automatic Database Schema Generator Based on XML Schema. 1039-1043 - Fei Liu, Yong He, Li Wang:
Application of Least Squares-Support Vector Machine for Measurement of Soluble Solids Content of Rice Vinegars Using Vis/NIR Spectroscopy. 1044-1047 - Bao-Lin Li, Zhi-Shu Li, Li Qing, Yan-Hong Chen:
Test Case Automate Generation from UML Sequence Diagram and OCL Expression. 1048-1052 - Dongni Li:
A Novel Cluster-Based Routing Algorithm in Ad Hoc Networks. 1053-1057 - Niu Limin, Xiaobin Tan, Baoqun Yin:
Estimation of System Power Consumption on Mobile Computing Devices. 1058-1061 - Dongni Li:
Cluster-Based System-Level Fault Diagnosis in Hierarchical Ad-Hoc Networks. 1062-1066 - Shousheng Zhao, Fengqi Yu, Baohua Zhao:
An Energy Efficient Directed Diffusion Routing Protocol. 1067-1072
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.