


default search action
CIS 2007: Harbin, Heilongjiang, China
- Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007. IEEE Computer Society 2007, ISBN 0-7695-3072-9

Keynote Speakers
- Ton Kalker:

DRM Interoperability. - Lalit M. Patnaik:

Towards an Understanding of the Brain via Microscopic and Macroscopic Studies. - Xindong Wu:

Mining with Noise Knowledge: Error Aware Data Mining. - Stephen D. Wolthusen:

Modeling Network Security Services in Tactical Networks.
Learning Theory and Algorithms
- Chu-Jun Yao, Hai-Lin Liu, Zhi-Tao Cui:

Mixing Matrix Recovery of Underdetermined Source Separation Based on Sparse Representation. 1-5 - Weihua Lin, Yonggang Wu, Dianhui Mao:

Region Assessment of Soil Erosion Based on Naive Bayes. 6-9 - Satyabrata Pradhan, Rajveer Singh, Komal Kachru, Srinivas Narasimhamurthy:

A Bayesian Network Based Approach for Root-Cause-Analysis in Manufacturing Process. 10-14 - Weihong Fu, Xiaoniu Yang, Naian Liu:

Step-Size Optimization EASI Algorithm for Blind Source Separation. 15-18 - Xuansen He, Shouke Ma:

Variable Step-Size Online Algorithm for Blind Separation Based on the Extended Infomax. 19-22 - Hongsheng Su, Feng Zhao:

A Novel Learning Method for ANFIS Using EM Algorithm and Emotional Learning. 23-27 - Yi Hu, Yue Chang, Yong Ni:

A Novel Method for Intelligence of Sensors Modeling. 28-31 - Peng Huang, Jiajun Bu, Chun Chen, Guang Qiu:

An Effective Feature-Weighting Model for Question Classification. 32-36 - Jun Li, Shunyi Zhang, Shidong Liu, Ye Xuan:

P2P Traffic Identification Technique. 37-41 - Yong-hui Qiao, Yu Liu, Bao-ku Su:

Study on PIGA Test Method on Centrifuge. 42-47 - Liu Ji, Wang Bende:

Parameters Selection for SVR Based on the SCEM-UA Algorithm and its Application on Monthly Runoff Prediction. 48-51 - Tianqi Zhang, Shaosheng Dai, Liufei Yang, Xuesong Li:

Estimate and Track the PN Sequence of Weak DS-SS Signals. 52-56 - Min Jiang, Zhiqing Meng, Gengui Zhou:

A Smoothing Support Vector Machine Based on Quarter Penalty Function. 57-59 - Wenwu He, Zhizhong Wang:

Fast Forecasting with Simplified Kernel Regression Machines. 60-64 - Zhifeng Hao, Zhenhua He, Xiaowei Yang:

An Accelerated SMO-Type Online Learning Algorithm. 65-69 - Qi Yuan, Rong-chun Zhao:

An Improved MRF Based Unsupervised Change Detection Method. 70-74 - Chun-Guang Li, Jun Guo, Xiangfei Nie:

Intrinsic Dimensionality Estimation with Neighborhood Convex Hull. 75-79
Evolutionary Computation
- Lijie Li, Yongmei Lei, Ying Zhang:

A Novel Evolutionary Algorithm for Function Optimization Using MEC. 80-84 - Gengui Zhou, Zhiqing Meng, Zhenyu Cao, Jian Cao:

A New Tree Encoding for the Degree-Constrained Spanning Tree Problem. 85-90 - Hong-qi Li, Li Li:

A Novel Hybrid Real-Valued Genetic Algorithm for Optimization Problems. 91-95 - Hong Li, Yong-Chang Jiao, Li Zhang, Fushun Zhang:

Global Optimization Method Based on the Statistical Genetic Algorithm for Solving Nonlinear Bilevel Programming Problems. 96-100 - Wang Lian, Liu Juan, Luo Fei:

Prediction of MHC Class II Binding Peptides Using a Multi-Objective Evolutionary Algorithm. 101-104 - Yibo Hu, Yuping Wang:

A New Evolutionary Algorithm for Constrained Optimization Problems. 105-109 - Na Li, Ya-dong Mei:

An Improved Genetic Algorithm for Optimal Operation of Cascaded Reservoirs. 110-113 - Xiaoping Zhong, Weiji Li:

A Decision-Tree-Based Multi-objective Estimation of Distribution Algorithm. 114-118 - Tse Guan Tan

, Jason Teo
, Hui Keng Lau
:
Performance Scalability of a Cooperative Coevolution Multiobjective Evolutionary Algorithm. 119-123 - Xing Xu, Yuanxiang Li:

Comparison between Particle Swarm Optimization, Differential Evolution and Multi-Parents Crossover. 124-127 - Xuzhou Li, Fei Yu, You-Bo Wang:

PSO Algorithm Based Online Self-Tuning of PID Controller. 128-132 - Zhengjia Wu, Jianzhong Zhou:

A Self-Adaptive Particle Swarm Optimization Algorithm with Individual Coefficients Adjustment. 133-136 - Jianwei Gong, Jianyong Qi, Guangming Xiong, Huiyan Chen, Wanning Huang:

A GA Based Combinatorial Auction Algorithm for Multi-Robot Cooperative Hunting. 137-141 - Weixin Ling, Huanping Luo:

An Adaptive Parameter Control Strategy for Ant Colony Optimization. 142-146
Data Mining
- Sun Wei, Wang Ke:

A Multi-Focus Image Fusion Algorithm with DT-CWT. 147-151 - Xiaohui Chen, Yang Zhang:

A Fuzzy Fusion in Multitarget Tracking with Multisensor. 152-156 - Jang-won Kim, Dongwon Jeong, Jinhyung Kim, Doo-Kwon Baik:

An Algorithm for Extracting Referential Integrity Relations Using Similarity during RDB-to-XML Translation. 157-161 - Zufeng Wang, Weiping Wang:

Research on Algorithm of Web Classification Based on EP and FFSS. 162-166 - Weimin Ouyang, Shuanghu Luo, Qinhua Huang:

Discovery of Direct and Indirect Association Patterns in Large Transaction Databases. 167-170 - Cheong Hee Park, Moonhwi Lee:

Associative Classification Using SVM-Based Discretization. 171-175 - Jingfeng Guo, Lizhen Zheng, Tieying Li:

An Efficient Graph-Based Multi-Relational Data Mining Algorithm. 176-180 - Tao Zeng

, Juan Liu:
Analysis on Time-lagged Gene Clusters in Time Series Gene Expression Data. 181-185 - Zhipeng Wang, Yuhai Zhao, Ying Yin:

A Novel Local Features-Based Approach for Clustering Microarray Data. 186-190 - Ayad R. Abbas, Juan Liu, Safaa O. Mahdi:

Improved Variable Precision Rough Set Model and its Application to Distance Learning. 191-195 - Yue-Jin Lv, Hongyun Zhang, Fen Quan, Zhi-cheng Chen:

A New Attribute Reduction Algorithm in Continuous Information Systems. 196-200 - Jun Gao:

Realization of a New Association Rule Mining Algorithm. 201-204 - Guorui Jiang, Guojun Zang:

A Study on the Method of Attribute Reduction Based on Rough Set under Fuzzy Equivalent Relation. 205-208 - Juryon Paik

, Joo Chang Lee, Junghyun Nam, Ung-Mo Kim:
Mining Maximally Common Substructures from XML Trees with Lists-Based Pattern-Growth Method. 209-213 - Gang Fang, Zukuan Wei, Qian Yin:

The Algorithm of Objective Association Rules Mining Based on Binary. 214-217 - Xiaobing Yang, Lingmin He, Jin Tan:

Fuzzy Factor in Switching Regression Models. 218-221 - Jingqiu Xu, Zhengyu Zhu, Xiang Ren, Yunyan Tian, Ying Luo:

Personalized Web Search Using User Profile. 222-226 - Xianwei Hu, Ying Yin, Bin Zhang:

Mining Temporal Web Interesting Patterns. 227-231 - Huaiguo Fu, Mícheál Ó Foghlú, Willie Donnelly:

Frequent Closed Informative Itemset Mining. 232-236 - Jufeng Yang, Guangshun Shi, Yan Zheng, Qingren Wang:

Data Extraction from Deep Web Pages. 237-241 - Sima Soltani, Ahmad Abdollahzadeh Barforoush:

Web pages Classification Using Domain Ontology and Clustering. 242-246
Distributed and Multi-Agent Systems
- Zhenghua Xue, Xiaoshe Dong, Weizhe Liu, Junyang Li, Shihua Liao:

A Multi-Agent Based Autonomic Management Architecture for Large-Scale Server Clusters. 247-251 - Weiming Tong, Jing Zhao:

Quantum Varying Deficit Round Robin Scheduling Over Priority Queues. 252-256 - Yinliang Yue, Fang Wang, Dan Feng:

iRBO: Intelligent Role-Based Object for Object-Based Storage Device. 257-26 - Biqing Wang, Peng He:

L-Chord: Routing Model for Chord Based on Layer-Dividing. 262-265 - Jingli Zhou, Guang Yang, Lijun Dong, Gang Liu:

Implementation and Performance Evaluation of an Adaptable Failure Detector for Distributed System. 266-270 - Xiaojing Li, Yu Gu, Dejun Yue, Ge Yu:

An Adaptive Join Strategy in Distributed Data Stream Management System. 271-275 - Jie Shen, Rong-shuang Sun, Liu-hua Wei, Hui Zhang, Yan Zhu, Chen Chen:

Topic-Oriented Search Model Based on Multi-Agent. 276-280 - Huaikou Miao, Shengbo Chen, Zhong-sheng Qian:

A Formal Open Framework Based on Agent for Testing Web Applications. 281-285 - Ji-Li Yin, Ying Liu, Jinyan Wang, Wenxiang Gu, Yinping Zhang:

A Recognition Approach for Adversarial Planning Based on Complete Goal Graph. 286-290 - Li Li, Hao Li, Gehao Lu, Shaowen Yao:

A Quantifiable Trust Model for Multi-agent System Based on Equal Relations. 291-295 - Yang Bo, Wang Cheng, Huang Hua, Li Lijun:

A Multi-Agent and PSO Based Simulation for Human Behavior in Emergency Evacuation. 296-300
Image Processing and Pattern Recognition
- Jianye Hao, Wangmeng Zuo, Kuanquan Wang:

Theoretical Investigation on Post-Processed LDA for Face and Palmprint Recognition. 301-305 - Heng Fui Liau, Kah Phooi Seng, Yee Wan Wong, Li-Minn Ang:

New Parallel Models for Face Recognition. 306-309 - Qindong Sun, Qian Wang, Xinbo Huang:

A Multi-Pattern Matching Algorithm on Multi-Language Mixed Texts for Content-Based Network Information Audit. 310-314 - Lee Seng Yeong, Li-Minn Ang, Kah Phooi Seng:

Face Detection from Greyscale Images Using Details from Categorized Wavelet Coefficients as Features for a Dynamic Counterpropagation Network. 315-319 - Shao-ping Wang, Wenjiang Pei, Yiu-ming Cheung:

An Improved Competitive and Cooperative Learning Approach for Data Clustering. 320-324 - Siyuan Cheng, Xiangwei Zhang, Kelun Tang:

Shape Modification of B-Spline Curve with Geometric Constraints. 325-329 - Xiaoli Sun, Guoxiang Song:

A New Anisotropic Diffusion Equation with Adaptive Fidelity Term. 330-334 - Junding Sun, Xiaosheng Wu:

An Effective Approach towards Contour-Shape Retrieval. 335-338 - Enwei Zhang, Feng Chen:

A Fast and Robust People Counting Method in Video Surveillance. 339-343 - Mengmeng Zhang, Yuehai Wang, Jingzhong Wang, Shumin Zhou:

A Hard Decision Error Correction Scheme for Corrupted Arithmetic Codes. 344-346 - Yuwang Yang, Jun Tao, Jingyu Yang:

Level Set Method for License Plate Localization Technology. 347-350 - Ping Zhong, Fang Liu, Runsheng Wang:

A New MRF Framework with Dual Adaptive Contexts for Image Segmentation. 351-355 - Bi Sheng, Xiaoyan Shen, Qiang Wang:

Human Body Segmentation in the Presence of Occlusion. 356-360 - Ke Lu, Feng Zhao, Ning He:

An Effective Approach to Content-Based 3D Model Retrieval and Classification. 361-365 - Haibin Yu, Jilin Liu, Jingbiao Liu:

3D Feature Extraction of Head based on Target Region Matching. 366-370 - Zhi-Cheng Zhao, An-Ni Cai:

Extraction of Semantic Keyframes Based on Visual Attention and Affective Models. 371-375 - Jia Li, Mei Xie:

A Color and Texture Feature Based Approach to License Plate Location. 376-380 - Yong Ge, Jishang Wei, Xin Yang, Xiuqing Wu:

Salience-Based Evaluation Strategy for Image Annotation. 381-385 - Hongxia Zhao, Tao Wang:

Study on Conversion Method of Color Space under a Big Color Gamut. 386-390 - Yuelu Liu, Tingzhi Shen, Xinyi Wang:

Image Restoration Using Gaussian Particle Filters. 391-394 - Jun Tang, Dong Liang, Nian Wang, Zhao-Hong Jia:

Spectral Correspondence Using Local Similarity Analysis. 395-399 - Monireh Abdoos, Nasser Mozayani:

A Combined Feature for Fingerprint Recognition. 400-404 - Taiping Zhang, Bin Fang, Guanghui He, Jing Wen, Yuanyan Tang:

Face Recognition Using Topology Preserving Nonnegative Matrix Factorization. 405-409 - Zirong Li, Minghui Du:

2D-NPP: An Extension of Neighborhood Preserving Projection. 410-414 - Ning Wang, Guo-qiang Han:

Laser Printer Fuzzy Identification Based on Correlative Specific Area of Character Image. 415-419 - Liming Dai, Miao Liu, Yuanyuan Chen:

Improved Facial Feature Points Calibration Algorithm Based on ASM. 420-423 - Rajesh Chandrasekhara Panicker, Sadasivan Puthusserypady:

A Constrained Genetic Algorithm for Efficient Dimensionality Reduction for Pattern Classification. 424-427 - Chun-Guang Li, Jun Guo, Honggang Zhang:

Pruning Neighborhood Graph for Geodesic Distance Based Semi-Supervised Classification. 428-432 - Yangping Wang, Jianwu Dang, Zhengping Zhu:

Traffic Signs Detection and Recognition by Improved RBFNN. 433-437 - Guo-Hua Liu, Huidong Ma, Xu Li, Peng Liang:

Extracting Digital Fingerprints from Chinese Documents. 438-441
Intelligent and Fuzzy Systems
- Xuan Wang, Shi An:

A Model for Fitting the Yield Curve Based on a Continuous Penalty Function. 442-445 - Jinsha Yuan, Li Qu, Weihua Zhang, Li Li:

Case-Based Reasoning Combined with Information Entropy and Principal Component Analysis for Short-Term Load Forecasting. 446-450 - Tao Zhao, Wandong Cai, Yongjun Li:

MPIDA: A Sensor Network Topology Inference Algorithm. 451-455 - Sheng-Fei Hsu, Dong-Her Shih, Hui-Ling Yu:

Exploring the Relationships between Personal Characteristics, Aims, and Reasons of Learning in Further Education by Associating Rule Mining. 456-460 - Mingxin Zhang, Zhaogan Lu, Junyi Shen:

Image Retrieval with Simple Invariant Features Based Hierarchical Uniform Segmentation. 461-465 - Junbo Gao, Bowen An, Anjun Song, Xiaofeng Wang:

A New Topic Influence Model Research in Online Community. 466-469 - Daogang Peng, Hao Zhang, Li Yang, Longhu Xu:

Study of Immune PID Adaptive Controller and Its Applications in Thermal Control System. 470-474 - Furong Liu, Changhong Wang

, Xiao Zhi Gao, Qiaoling Wang:
A Fuzzy Clustering Algorithm Based on Artificial Immune Principles. 475-479 - Xiang Li, Yuechao Wang:

Construct a Real-time Selective Neural Group Network Controller for Internet-Based Teleoperation System. 480-484 - Quanju Zhang, Yi Niu, Yajuan Yang, Wenxue Niu:

Neurodynamic Analysis for Symmetric Schur Decomposition Problems. 485-489 - Rui Wang, Zhaoming Lei, Hexu Sun, Yi Zheng:

Fuzzy Control System Based on Wavelet Analysis. 490-494 - Guiwu Wei

, Xiaorong Wang:
Some Geometric Aggregation Operators Based on Interval-Valued Intuitionistic Fuzzy Sets and their Application to Group Decision Making. 495-499 - Bin Sun, Yan-Kui Liu

:
Fuzzy Distribution Games with Minimum Risk Criteria. 500-504 - Mingfa Zheng, Yan-Kui Liu:

Bounds on the Value of Fuzzy Solution to Fuzzy Programming Problem. 505-509 - Zhaoming Lei, Hexu Sun, Yan Dong, Yi Zheng:

On Fuzzy Modulator for the PMSM Step Motion Control. 510-514 - Fang-Fang Hao, Yan-Kui Liu:

Fuzzy Random Portfolio Selection Problem. 515-519 - Yueying Peng, Weizhi Liao, Kaoru Hirota:

A Fuzzy Model of Interval speed Continuous Petri Nets. 520-525 - Wei-Dong Cai, Yi-Qing Qin, Bing-Ru Yang:

Selection of Delay Time Window and Delay Time in Phase Space Reconstruction. 526-530 - Kaleem Fatima, Vijay Gopal Sarvepalli, Zeeshan Nadeem Nakhi:

A Novel Architecture for the Computation of the 2D-DWT. 531-535 - Fuqing Zhao, Qiuyu Zhang

, Aihong Zhu:
Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm Optimization. 536-539 - Wen-shang Xu, Qing-ming Yu, Yan-liang Sun, Tian-wen Dong:

Research on Improving Training Speed of LMBP Algorithm and its Simulation in Application. 540-545 - Guozhen Tan, Qing-qing Deng, Zhu Tian, Ji-xiang Yang:

A Dish Parallel BP for Traffic Flow Forecasting. 546-549 - Qiong Bao, Xingsheng Gu, Yongjun Shen:

An Improved Neural Network Model for Graduate Education Evaluation. 550-554 - Yonghui Pan, Fang Bao, Shitong Wang:

Supervised FCNN Classification for Garment Seams. 555-559 - Gang Cao, Mingyu Li, Cehui Mo:

Simulation of T-S Fuzzy Neural Network to UASB Reactor Shocked by Toxic Loading. 560-564 - Mahsa Rahmanian, Mahdi Aliyari Shoorehdeli, Mohammad Teshnehlab:

The Off-Line and On-Line Fuzzy Backstepping Controllers for Rotary Inverted Pendulum System. 565-569 - He Liu, Dao Huang, Li Jia:

Dynamic System Modeling with Multilayer Recurrent Fuzzy Neural Network. 570-574
Cryptography and Security Techniques
- Ya-Jing Zhang, Yi-ming Zhai, Zhen-bin Du, Dian-Tong Liu:

Study of an Adaptive Immune Detection Algorithm for Anomaly Detection. 574-578 - Ting Wang, Xingyuan Chen, Bin Zhang, Lichun Pei:

A Method of Fine-Grained Authorization and Access Control for ASP Pages. 579-583 - Fengying Wang, Fei Wang:

The Research and Application of Resource Dissemination Based on Credibility and UCON. 584-588 - Franz Kollmann:

A Flexible Subscription Model for Broadcasted Digital Contents. 589-593 - Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti

:
A Biometric Verification System Addressing Privacy Concerns. 594-598 - Guosheng Cheng, Cuilan Yun:

A New Forward-Secure Threshold Signature Scheme Based on Schnorr Cryptosystem. 599-603 - Zhiyu Peng, Shanping Li, Xin Lin:

A Novel Trust Community Based on Direct Certifying for Pervasive Computing Systems. 604-608 - Yee Wan Wong, Kah Phooi Seng, Li-Minn Ang, Wan Yong Khor, Fui Liau:

Audio-Visual Recognition System with Intra-Modal Fusion. 609-613 - Lanxiang Chen, Dan Feng:

An Efficient Credential-Based Scheme for Cross-Domain File Sharing. 614-617 - Hua Chen, Dengguo Feng:

An Effective Genetic Algorithm for Self-Inverse S-Boxes. 618-622 - Meifeng Li, Guanzhong Dai, Hang Liu, Wei Hu:

Design of an Instruction for Fast and Efficient S-Box Implementation. 623-626 - Jianjun Zhao, Jingsen Liu:

Pairing-Based Proxy Signature Scheme with Proxy Signer?s Privacy Protection. 627-631 - Chuyuan Wei, Ying Hao, Cheng Lv, Liping Qian:

An Improved Key Agreement Protocol Based on Key Association Set for Dynamic Peer Group. 632-636 - Chunming Tang, Dingyi Pei, Zheng-an Yao:

Efficient Zaps and Signatures of Knowledge. 637-641 - Xueming Wang, Xiang Li:

Game-Based Analysis of Multi-Party Non-Repudiation Protocols. 642-646 - Tingjun Liu, Shuhua Wu, Yuefei Zhu:

Forward Security for an Efficient Password-Based Authenticated Key Exchange. 647-651 - Puwen Wei, Mingqiang Wang, Wei Wang:

A Note on Shacham and Waters Ring Signatures. 652-656 - Ye Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin:

Generalized Synchronization Theorem for Undirectional Discrete Systems with Application in Encryption Scheme. 657-661 - Liufei Wu, Yuqing Zhang, Fengjiao Wang:

A Provable Secure Key Management Program for Wireless Sensor Network. 662-666 - Jin Xu, Dayin Wang:

A Single Key MAC Based on Hash127. 667-671 - Shenghui Su, Shuwang Lv:

To Solve the High Degree Congruence. 672-676 - Zuowen Tan:

Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves. 677-681 - Yan Deng, Guanzhong Dai, Shuxin Chen:

A Robust Estimator for Evaluating Internet Worm Infection Rate. 682-686 - Xuetao Duan, Chunfu Jia, Yubing Fu:

A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data. 687-691 - Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang:

A Context-Based Analysis of Intrusion Detection for Policy Violation. 692-696 - Tu Xu, Dake He, Yu Luo:

DDoS Attack Detection Based on RLT Features. 697-701 - Safaa O. Al-Mamory, Hongli Zhang:

Scenario Discovery Using Abstracted Correlation Graph. 702-706 - Chun Yang, Haidong Yang, Feiqi Deng

:
A Parameter Selection Approach for Mixtures of Kernels Using Immune Evolutionary Algorithm and its Application to IDSs. 707-711 - Sang Min Lee, Dong Seong Kim, Jong Sou Park:

A Hybrid Approach for Real-Time Network Intrusion Detection Systems. 712-715 - Yulong Shen, Jianfeng Ma, Qingqi Pei:

Research on the Resilience of Key Management in Sensor Networks. 716-720 - Tegshbayar Gerelbayar, Jong Sou Park:

A New Centralized Group Key Distribution and Revocation in Sensor Network. 721-724 - Hongzhen Du, Qiaoyan Wen:

An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings. 725-729 - Li Kang, Xiaohu Tang, Xianhui Lu, Jia Fan:

A Tight Security Reduction Identity-Based Signature Scheme. 730-734
System Security and Management
- Cuihua Zuo, Ruixuan Li, Hongmu Han, Zhengding Lu:

Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment. 735-739 - Dong Seong Kim, Yoonk Kyung Suh, Jong Sou Park:

Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise. 740-744 - Lujiong Wang, Aiping Li, Liyun Xu:

A Security Model for Networked Manufacturing System. 745-749 - Yu Jiang, Ni Zhang, Binxing Fang:

An Email Geographic Path-Based Technique for Spam Filtering. 750-753 - Wei Sun, Lin Chen, Jian Song:

An Improved DAD Check Scheme MLD-Based in FHMIPv6. 754-758 - Lejun Zhang, Lin Guo, Wu Yang, Wei Wang, Yongtian Yang:

An Efficient Survivability Hierarchy Analysis Model for Networked Information System. 759-762 - Jinfu Chen, Yansheng Lu, Xiaodong Xie:

Testing Approach of Component Security Based on Fault Injection. 763-767 - Yong Zhang, Xiaobin Tan, Hongsheng Xi:

A Novel Approach to Network Security Situation Awareness Based on Multi-Perspective Analysis. 768-772 - Dapeng Man, Wu Yang, Yongtian Yang, Wei Wang, Lejun Zhang:

A Quantitative Evaluation Model for Network Security. 773-777 - Weiqiang Zhang, Chen Xu, Feipeng Li, Jiqiang Feng:

A Period-Finding Method for Shor's Algorithm. 778-780 - Jin Jiang, Lei Li, Zhihong Huang:

Hidden-ID Authentication Scheme and its SVO-Logic Based Formal Analysis. 781-784 - Jun Wang, Jun Liu, Weiru Chen:

Research of Software Reliability Based on Synthetic Architecture. 785-788 - Zhensong Liao, Hai Jin, Deqing Zou, Chisong Li:

An EMAIL Based Automated Trust Negotiation Model. 789-793 - Somak Bhattacharya, S. K. Ghosh:

An Artificial Intelligence Based Approach for Risk Management Using Attack Graph. 794-798 - Jin Shi, Yin Lu, Li Xie:

Game Theory Based Optimization of Security Configuration. 799-803 - Yunfang Feng:

Adaptive Trust Management in MANET. 804-808 - Fengjiao Wang, Yuqing Zhang:

A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography. 809-814 - Jing Zhao, Zhigang Zhang, Maozhi Xu:

A Model of Hierarchical Key Assignment Scheme with CRT. 815-818 - Wei Jiang, Hongli Zhang, Zhihong Tian, Xin-fang Song:

A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. 819-823 - Li Jiang, Lingdi Ping, Xuezeng Pan:

Handling Information Release and Erasure in Multi-Threaded Programs. 824-828 - Xiaofeng Qiu, Ning Zhi, Xinxin Niu:

A Quantitative Security Model of IMS System. 829-832 - Jin Tan, Jintan Chen, Yanqiu Liu:

An Efficient Authentication Strategy for Reprogramming of Sensor Networks. 833-837 - Yang Lu, Junmo Xiao, Jing Liu:

Protecting XML Databases against Ontology-Based Inference Attack. 838-842 - Guodong Ye, Xiaoling Huang, Changqing Zhu:

Image Encryption Algorithm of Double Scrambling Based on ASCII Code of Matrix Element. 843-847 - Shih-I Huang, Shiuhpyng Shieh:

SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks. 848-852 - Xiaobin Tan, Yong Zhang, Hongsheng Xi:

Multi-Perspective Quantization Model for Cyberspace Security Situation Awareness. 853-857 - Juhani Anttila:

Reinforcing Business Leaders? Role in Striving for Information Security. 858-862
Security Applications
- Zhaofeng Ma, Yixian Yang, Xinxin Niu:

Secure and Flexible Digital Rights Management in a Pervasive Usage Mode. 863-867 - Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan Luo:

Controlled Secret Leakage. 868-872 - Shaomin Zhang, Wei Wang:

A New Method Considering Creditability Degree and Connection of Buyers and Sellers in E-Broker System. 873-878 - Alfredo De Santis, Claudio Soriente

:
Modified Original Smart Cards and Smart Card Clone Countermeasures. 878-882 - Yajun Wang, Mian Cai, Feng Tang:

Design of a New Selective Video Encryption Scheme Based on H.264. 883-882 - Young-Bok Cho, Yong-Zhen Li, Ning Sun, Sang Ho Lee:

CMS System of DRM Technology Base that Use Web Contents Certification Code. 888-891 - Yong Wang, Ming Li, Jingfeng Xue, Jingjing Hu, Longfei Zhang, Lejian Liao:

A Context-Aware Trust Establishment and Mapping Framework for Web Applications. 892-896 - Zhiguang Zhang, Xiaosu Chen, Miao Zhou:

A Digital Fingerprint Coding Based on Turbo Codes. 897-901 - Masa-Aki Fukase, Tomoaki Sato:

A Stream Cipher Engine for Ad-Hoc Security. 902-906 - Yingpei Zeng, Shigeng Zhang, Shanqing Guo, Xie Li:

Secure Hop-Count Based Localization in Wireless Sensor Networks. 907-911 - Jiehong Wu, Yujie Zhang, Xiaowei Wang, Guiran Chang:

A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking Technology. 912-916 - Yongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang:

Identity-Based Key Issuing Protocol for Ad Hoc Networks. 917-921 - Jing Liu, Hong-yun Xu, Cheng Xie:

A New Statistical Hitting Set Attack on Anonymity Protocols. 922-925
Watermarking and Information Hiding
- Shuguo Yang, Sheng-He Sun, Chunxia Li:

Research on Video Watermarking Scheme Based on Chaos, DWT and JND Model. 926-930 - Cheng Yang, Jianbo Liu, Yaqing Niu:

Robust Watermark Model Based on Subliminal Channel. 931-934 - Jianwei Yang, Wenbing Chen, Guosheng Cheng:

Two-Dimensional Wavelet Filters for Watermarking. 935-939 - Qiyang Zhao, Zhonglin Wang, Baolin Yin:

Analysis on the Sensitivity Attack to Watermarking Schemes with Patchwork Detection Boundaries. 940-944 - Dawen Xu:

A Blind Video Watermarking Algorithm Based on 3D Wavelet Transform. 945-949 - Bin Zhao, Kai Fan, Yue Wang, Weidong Kou:

Adaptive Encrypted Information Hiding Scheme for Images. 950-953
Other Applications
- Hui Zhao, Zhongguo Zheng:

Using Chain Graphical Model to Analyze the Efficacy of a Chinese Medicine. 954-958 - Shulin Wang, Huowang Chen, Shutao Li:

Gene Selection Using Neighborhood Rough Set from Gene Expression Profiles. 959-963 - Xuehu Yan, Shenghong Chen, Xiamu Niu:

An Improved Algorithm for Iris Location. 964-967 - Fei Xiang, Huijuan Xiao, Shuisheng Qiu, Chengliang Deng:

Dynamical Behavior of Three-Order Cellular Neural Network with Application in Image Secure Communication. 968-971 - Ting Liu, Ye Ji, Lequan Min, Geng Zhao, Xiaohong Qin:

Generalized Synchronization Theorem for Non-Autonomous Differential Equation with Application in Encryption Scheme. 972-976 - Xu Li, Guo-Hua Liu, Huidong Ma, Lei Wang:

The Representation of Chinese Semantic Knowledge and its Application in the Document Copy Detection. 977-980 - Bo Wang, Yongkui Liu, Yanyou Hao, Shuang Liu:

Defaults Assessment of Mortgage Loan with Rough Set and SVM. 981-985 - Yan-Long Qin, Ming-Chang Li, Zhao-Chen Sun, Yu-Xia Yang, Hai-Bin Xu:

Optimistic Design of Jetty Road Height Based on Genetic Algorithms. 986-990 - Peng Cheng, Weili Li, Wenbiao Chen, Deyuan Xia:

Calculation and Analysis of Double-Fed VSCF Induction Generator Operating Performance. 991-994 - Pei-lin Liu, Feng Li, Yi-jun Tan:

Research on Refining Mesh of Ship Hatch Corner Based on Transition Element. 995-999 - Ying Bi, Peijun Ma, Yixin Jing, Doo-Kwon Baik:

Speech Tagging Based Improvement of the RSS Polymerization News. 1000-1004 - Li Wern Chew, Li-Minn Ang, Kah Phooi Seng:

Low-Complexity Line-Based Motion Estimation Algorithm. 1005-1009 - Deng Linyi, Lin Yan:

A Particle Swarm Optimization for Resource-Constrained Multi-Project Scheduling Problem. 1010-1014 - Weiming Tong, Chengde Tong, Yong Liu:

A Data Engine for Controller Area Network. 1015-1019 - Kai Tang, Chao Yang, Jun Yang:

A Supply Chain Network Design Model for Deteriorating Items. 1020-1024 - Jingwen Tian, Meijuan Gao, Yanxia Liu, Hao Zhou:

The Study of Compost Quality Evaluation Modeling Method Based on Wavelet Neural Network for Sewage Treatment. 1025-1029 - Xuedong Tian, Si Wang, Xiaoyu Liu:

Structural Analysis of Printed Mathematical Expression. 1030-1034 - Min An Song:

System Level Assertion-Based Verification Environment for PCI/PCI-X and PCI-Express. 1035-1038 - JongSeon Lim, Kyung-Soo Joo, KyungSoo Kim, Mun-Young Choi:

Design of Automatic Database Schema Generator Based on XML Schema. 1039-1043 - Fei Liu, Yong He, Li Wang:

Application of Least Squares-Support Vector Machine for Measurement of Soluble Solids Content of Rice Vinegars Using Vis/NIR Spectroscopy. 1044-1047 - Bao-Lin Li, Zhi-Shu Li, Li Qing, Yan-Hong Chen:

Test Case Automate Generation from UML Sequence Diagram and OCL Expression. 1048-1052 - Dongni Li:

A Novel Cluster-Based Routing Algorithm in Ad Hoc Networks. 1053-1057 - Niu Limin, Xiaobin Tan, Baoqun Yin:

Estimation of System Power Consumption on Mobile Computing Devices. 1058-1061 - Dongni Li:

Cluster-Based System-Level Fault Diagnosis in Hierarchical Ad-Hoc Networks. 1062-1066 - Shousheng Zhao, Fengqi Yu, Baohua Zhao:

An Energy Efficient Directed Diffusion Routing Protocol. 1067-1072

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














