Search dblp for Publications

export results for "toc:db/conf/cis/cis2008-1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cis/CaiT08,
  author       = {Yongkai Cai and
                  Shaohua Tang},
  title        = {Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid
                  Security Mechanism},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {453--457},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.187},
  doi          = {10.1109/CIS.2008.187},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CaiT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Cheng08,
  author       = {Jingde Cheng},
  title        = {Evolutionary Personal Information Partners},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {108--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.210},
  doi          = {10.1109/CIS.2008.210},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Cheng08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChengLB08,
  author       = {Jinyong Cheng and
                  Yihui Liu and
                  Li Bai},
  title        = {3-D Reconstruction from Medical Images with Improved {GVF} Snake Model},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {220--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.191},
  doi          = {10.1109/CIS.2008.191},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChengLB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChinSA08,
  author       = {Siew Wen Chin and
                  Kah Phooi Seng and
                  Li{-}Minn Ang},
  title        = {New {H} infinity Approach for Face Tracking},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {180--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.171},
  doi          = {10.1109/CIS.2008.171},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChinSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DengLT08,
  author       = {Zerong Deng and
                  Xingcheng Liu and
                  Man Teng},
  title        = {Modified {BP} Decoding Algorithms Combined with {GA} for Low-Density
                  Parity Check Codes},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {371--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.169},
  doi          = {10.1109/CIS.2008.169},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DengLT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DerbelHO08,
  author       = {Imen Derbel and
                  Narjes Hachani and
                  Habib Ounelli},
  title        = {Membership Functions Generation Based on Density Function},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {96--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.211},
  doi          = {10.1109/CIS.2008.211},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DerbelHO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DuH08,
  author       = {Yongping Du and
                  Ming He},
  title        = {Multi-Strategy to Improve Reading Comprehension},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {86--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.173},
  doi          = {10.1109/CIS.2008.173},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DuH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DuanDC08,
  author       = {Sophia Xiaoxia Duan and
                  Hepu Deng and
                  Brian J. Corbitt},
  title        = {The Impacts of Government Policies on the Efficiency of Australian
                  Universities: {A} Multi-Period Data Envelopment Analysis},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {522--527},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.213},
  doi          = {10.1109/CIS.2008.213},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DuanDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FanW08,
  author       = {Lei Fan and
                  Yuping Wang},
  title        = {A Novel Multi-Objective Evolutionary Algorithm Based on External Dominated
                  Clustering},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {162--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.186},
  doi          = {10.1109/CIS.2008.186},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FanW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FangJW08,
  author       = {Qun Fang and
                  Yi Ji and
                  Guoxin Wu},
  title        = {A Run-Length Coding Based Dynamic Trust Model in {P2P} Network},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {534--539},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.97},
  doi          = {10.1109/CIS.2008.97},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FangJW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FangWRXB08,
  author       = {Liming Fang and
                  Jiandong Wang and
                  Yongjun Ren and
                  Jinyue Xia and
                  Shizhu Bian},
  title        = {Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key
                  Encapsulation without {ROM}},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {326--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.32},
  doi          = {10.1109/CIS.2008.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FangWRXB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GangXW08,
  author       = {Gang Li and
                  Xiangjun Xin and
                  Wei Li},
  title        = {An Enhanced Deniable Authentication Protocol},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {336--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.123},
  doi          = {10.1109/CIS.2008.123},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GangXW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoAL08,
  author       = {Yuelin Gao and
                  Xiaohui An and
                  Jun{-}min Liu},
  title        = {A Particle Swarm Optimization Algorithm with Logarithm Decreasing
                  Inertia Weight and Chaos Mutation},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {61--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.183},
  doi          = {10.1109/CIS.2008.183},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoAL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GeT08,
  author       = {Lina Ge and
                  Shaohua Tang},
  title        = {Sharing Multi-Secret Based on Circle Properties},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {340--344},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.176},
  doi          = {10.1109/CIS.2008.176},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GeT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoG08,
  author       = {Gege Guo and
                  Ping Guo},
  title        = {Experimental Study of Discriminant Method with Application to Fault-Prone
                  Module Detection},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {204--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.172},
  doi          = {10.1109/CIS.2008.172},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoHZYZ08,
  author       = {Lin Guo and
                  Hua Huang and
                  Lejun Zhang and
                  Yongtian Yang and
                  Jianpei Zhang},
  title        = {Research on Disaster Tolerance System Based on Network Dataflow},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {355--360},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.76},
  doi          = {10.1109/CIS.2008.76},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoHZYZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoW08,
  author       = {Long Guo and
                  Hongli Wang},
  title        = {Information Management System of Automobile Chassis Dynamometer Based
                  on Multi Agent Web Serve},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {66--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.140},
  doi          = {10.1109/CIS.2008.140},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoWHZ08,
  author       = {Chi Guo and
                  Lina Wang and
                  Lainv Huang and
                  Lei Zhao},
  title        = {Study on the Internet Behavior's Activity Oriented to Network Survivability},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {432--435},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.17},
  doi          = {10.1109/CIS.2008.17},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoWHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HaichuanWJ08,
  author       = {Lou Haichuan and
                  Dai Wenzhan and
                  Su Jie},
  title        = {Control of Time Varying Nonlinear System Based on {RBFNN-DMC} Algorithm},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {134--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.110},
  doi          = {10.1109/CIS.2008.110},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HaichuanWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HaoZ08,
  author       = {Ju{-}tao Hao and
                  Jing{-}jing Zhao},
  title        = {Shape Constraint Incorporated Geometric Flows for Blood Vessels Segmentation},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {560--563},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.84},
  doi          = {10.1109/CIS.2008.84},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HaoZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/He08,
  author       = {Yunhui He},
  title        = {Modified Generalized Discriminant Analysis Using Orthogonalization
                  in Feature Space and Difference Space},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {12--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.40},
  doi          = {10.1109/CIS.2008.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/He08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HlaCP08,
  author       = {Khin Haymar Saw Hla and
                  YoungSik Choi and
                  Jong Sou Park},
  title        = {Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization
                  Algorithm},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {35--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.108},
  doi          = {10.1109/CIS.2008.108},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HlaCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HouFX08,
  author       = {Jiali Hou and
                  Nengshan Feng and
                  Jinzhi Xiong},
  title        = {A New Intelligent Security Structure for Host System},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {464--469},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.134},
  doi          = {10.1109/CIS.2008.134},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HouFX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuSLZ08,
  author       = {Yu Hu and
                  Tingzhi Shen and
                  Kin{-}Man Lam and
                  Sanyuan Zhao},
  title        = {A Novel Example-Based Super-Resolution Approach Based on Patch Classification
                  and the {KPCA} Prior Model},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {6--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.30},
  doi          = {10.1109/CIS.2008.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuSLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuW08,
  author       = {Xuanzi Hu and
                  Kuanfu Wang},
  title        = {Application of Data Warehouse Technology in Data Center Design},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {484--488},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.124},
  doi          = {10.1109/CIS.2008.124},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuYX08,
  author       = {Rongbing Hu and
                  Chaoyuan Yue and
                  Jun Xie},
  title        = {Joint Optimization of Age Replacement and Spare Ordering Policy Based
                  on Genetic Algorithm},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {156--161},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.170},
  doi          = {10.1109/CIS.2008.170},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuYX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuiZ08,
  author       = {Cao Hui and
                  Qin Zheng},
  title        = {A Trust Evaluation Model for {P2P} E-Commerce Systems},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {500--505},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.50},
  doi          = {10.1109/CIS.2008.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuiZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/KezhengBH08,
  author       = {Kezheng Lin and
                  Bo Fan and
                  Hong Zhao},
  title        = {Visual Cryptographic Scheme with High Image Quality},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {366--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.106},
  doi          = {10.1109/CIS.2008.106},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/KezhengBH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/KezhengHS08,
  author       = {Kezheng Lin and
                  Huixin Wang and
                  Sheng Lin},
  title        = {Face Feature Extraction Based on Uncorrelated Locality Information
                  Projection},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {215--219},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.154},
  doi          = {10.1109/CIS.2008.154},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/KezhengHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/KuZH08,
  author       = {Tao Ku and
                  Yunlong Zhu and
                  Kunyuan Hu},
  title        = {A Novel Complex Event Mining Network for RFID-Enable Supply Chain
                  Information Security},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {516--521},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.70},
  doi          = {10.1109/CIS.2008.70},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/KuZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LangH08,
  author       = {Liying Lang and
                  Yue Hong},
  title        = {Study on the Core Algorithm of Access Control System Based on Face
                  Recognition},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {76--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.24},
  doi          = {10.1109/CIS.2008.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LangH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Li08,
  author       = {Xiongjun Li},
  title        = {A New Measure of Image Scrambling Degree Based on Grey Level Difference
                  and Information Entropy},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {350--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.203},
  doi          = {10.1109/CIS.2008.203},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Li08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiC08,
  author       = {Meng Li and
                  Yiu{-}ming Cheung},
  title        = {A Novel Motion Based Lip Feature Extraction for Lip-Reading},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {361--365},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.214},
  doi          = {10.1109/CIS.2008.214},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiGW08,
  author       = {Xiangdong Li and
                  Qingpu Guo and
                  Qingxian Wang},
  title        = {Analysis of Offline Fair Exchange Protocols in Strand Spaces},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {272--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.167},
  doi          = {10.1109/CIS.2008.167},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiL08,
  author       = {Xueqiang Li and
                  Hai{-}Lin},
  title        = {One {MOEA} Uniformity Measurement Based on Generalized Spherical Transformation},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {168--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.73},
  doi          = {10.1109/CIS.2008.73},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/LiL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiL08a,
  author       = {Linsheng Li and
                  Jianning Li},
  title        = {Chattering-Free Support Vector Regression Sliding Mode Control},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {231--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.99},
  doi          = {10.1109/CIS.2008.99},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiL08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiLWH08,
  author       = {Fang Li and
                  Di Li and
                  Jiafu Wan and
                  Xin Huang},
  title        = {Towards a Component-Based Model Integration Approach for Embedded
                  Computer Control System},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {495--499},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.218},
  doi          = {10.1109/CIS.2008.218},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiLWH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiPWC08,
  author       = {Tao Li and
                  Wenjiang Pei and
                  Shao{-}ping Wang and
                  Yiu{-}ming Cheung},
  title        = {Cooperation Controlled Competitive Learning Approach for Data Clustering},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {24--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.174},
  doi          = {10.1109/CIS.2008.174},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiPWC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZ08,
  author       = {Guimei Li and
                  Zhezhao Zeng},
  title        = {A Neural-Network Algorithm for Solving Nonlinear Equation Systems},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {20--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.65},
  doi          = {10.1109/CIS.2008.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZH08,
  author       = {Xinshe Li and
                  Lei Zhang and
                  Yu{-}pu Hu},
  title        = {A Novel Generation Key Scheme Based on {DNA}},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {264--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.113},
  doi          = {10.1109/CIS.2008.113},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZY08,
  author       = {Xin{-}lei Li and
                  Kangfeng Zheng and
                  Yixian Yang},
  title        = {A Simulation Platform of DDoS Attack Based on Network Processor},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {421--426},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.190},
  doi          = {10.1109/CIS.2008.190},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LinTJ08,
  author       = {Frank Yeong{-}Sung Lin and
                  Po{-}Hao Tsang and
                  Kun{-}Dao Jiang},
  title        = {A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's
                  Vulnerability to Hazardous Events and Malicious Attacks},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {411--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.142},
  doi          = {10.1109/CIS.2008.142},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LinTJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuCMT08,
  author       = {Wenjie Liu and
                  Hanwu Chen and
                  Tinghuai Ma and
                  Wei Tian},
  title        = {An Efficient Deterministic Secure Quantum Communication Scheme with
                  {W} State},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {52--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.48},
  doi          = {10.1109/CIS.2008.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuCMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuFFW08,
  author       = {Changping Liu and
                  Mingyu Fan and
                  Yong Feng and
                  Guangwei Wang},
  title        = {Dynamic Integrity Measurement Model Based on Trusted Computing},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {281--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.153},
  doi          = {10.1109/CIS.2008.153},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuFFW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuL08,
  author       = {Feng Liu and
                  Zhitang Li},
  title        = {A Measurement and Modeling Study of {P2P} {IPTV} Applications},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {114--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.112},
  doi          = {10.1109/CIS.2008.112},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuLC08,
  author       = {Hai{-}Lin and
                  Xueqiang Li and
                  Yuqing Chen},
  title        = {Multi-Objective Evolutionary Algorithm Based on Dynamical Crossover
                  and Mutation},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {150--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.81},
  doi          = {10.1109/CIS.2008.81},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/LiuLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuXL08,
  author       = {Zhenyu Liu and
                  Shengli Xie and
                  Yue Lai},
  title        = {A Fast Suffix Matching Method in Network Processor},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {405--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.98},
  doi          = {10.1109/CIS.2008.98},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuXL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuYXC08,
  author       = {Yuhua Liu and
                  Chun Yang and
                  Kaihua Xu and
                  Hongcai Chen},
  title        = {Controlling Mechanism for the Hubs in Peer-to-Peer Networks},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {511--515},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.109},
  doi          = {10.1109/CIS.2008.109},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuYXC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LvWZZ08,
  author       = {Shaohe Lv and
                  Xiaodong Wang and
                  Xin Zhao and
                  Xingming Zhou},
  title        = {Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {442--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.69},
  doi          = {10.1109/CIS.2008.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LvWZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MaZXY08,
  author       = {Rui Ma and
                  Yingnan Zhao and
                  Yongquan Xia and
                  Yunyang Yan},
  title        = {A Touching Pattern-Oriented Strategy for Handwritten Digits Segmentation},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {174--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.149},
  doi          = {10.1109/CIS.2008.149},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MaZXY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MaoM08,
  author       = {Liqiang Mao and
                  Jianfeng Ma},
  title        = {Towards Provably Secure On-Demand Distance Vector Routing in {MANET}},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {417--420},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.61},
  doi          = {10.1109/CIS.2008.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MaoM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MarhusinLLC08,
  author       = {Mohd Fadzli Marhusin and
                  Henry Larkin and
                  Chris Lokan and
                  David Cornforth},
  title        = {An Evaluation of {API} Calls Hooking Performance},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {315--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.199},
  doi          = {10.1109/CIS.2008.199},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MarhusinLLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MenLZ08,
  author       = {Xiuhua Men and
                  Shunming Li and
                  Zemin Zuo},
  title        = {Analysis of Signal Transmission with Temperature-Dependent Electrical
                  Parameters Using {FDTD}},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {506--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.150},
  doi          = {10.1109/CIS.2008.150},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MenLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MingTJ08,
  author       = {Tong Ming and
                  Yan Tao and
                  Hongbing Ji},
  title        = {An Efficient Audio Watermark Algorithm with Strong Robustness},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {385--389},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.56},
  doi          = {10.1109/CIS.2008.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MingTJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NaseerQ08,
  author       = {Mudasser Naseer and
                  Shi{-}Yin Qin},
  title        = {Performance Comparison of Nonlinear Dimensionality Reduction Methods
                  for Image Data Using Different Distance Measures},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {41--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.18},
  doi          = {10.1109/CIS.2008.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NaseerQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Niu08,
  author       = {Jiping Niu},
  title        = {Image Encryption Algorithm Based on Rijndael S-boxes},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {277--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.180},
  doi          = {10.1109/CIS.2008.180},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Niu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NiuP08,
  author       = {Yi Niu and
                  Yichun Peng},
  title        = {Application of Radial Function Neural Network in Network Security},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {458--463},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.163},
  doi          = {10.1109/CIS.2008.163},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NiuP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PanKG08,
  author       = {Heng Pan and
                  Ke Ke and
                  Chunxiang Gu},
  title        = {Efficienct ID-Based Proxy Blind Signature Schemes from Pairings},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {390--393},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.101},
  doi          = {10.1109/CIS.2008.101},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PanKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PoorghanadSK08,
  author       = {Alireza Poorghanad and
                  Ali Sadr and
                  Alireza Kashanipour},
  title        = {Generating High Quality Pseudo Random Number Using Evolutionary methods},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {331--335},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.220},
  doi          = {10.1109/CIS.2008.220},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PoorghanadSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShenT08,
  author       = {Sunan Shen and
                  Shaohua Tang},
  title        = {Cross-Domain Grid Authentication and Authorization Scheme Based on
                  Trust Management and Delegation},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {399--404},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.185},
  doi          = {10.1109/CIS.2008.185},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShenT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SongYL08,
  author       = {Chunlai Song and
                  Xinchun Yin and
                  Yali Liu},
  title        = {A Practical Electronic Voting Protocol Based upon Oblivious Signature
                  Scheme},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {381--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.165},
  doi          = {10.1109/CIS.2008.165},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SongYL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SuYF08,
  author       = {Purui Su and
                  Lingyun Ying and
                  Dengguo Feng},
  title        = {Exploring Malware Behaviors Based on Environment Constitution},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {320--325},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.130},
  doi          = {10.1109/CIS.2008.130},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SuYF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Sun08,
  author       = {Yuehui Sun},
  title        = {Illumination Invariant Using {DT-CWT} and {EMD} for Face Recognition},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {225--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.193},
  doi          = {10.1109/CIS.2008.193},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Sun08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SunZ08,
  author       = {Junding Sun and
                  Zhaosheng Zhang},
  title        = {An Effective Method for Mammograph Image Retrieval},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {190--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.118},
  doi          = {10.1109/CIS.2008.118},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SunZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TengLD08,
  author       = {Man Teng and
                  Xingcheng Liu and
                  Zerong Deng},
  title        = {Improved {BP} Decoding Algorithm for Nonbinary {LDPC} Codes Based
                  on Bit-flipping Method},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {376--380},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.152},
  doi          = {10.1109/CIS.2008.152},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TengLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TianF08,
  author       = {Jingwen Tian and
                  Qian Feng},
  title        = {Modeling of Oil and Water Migration Based on Support Vector Machine},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {244--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.95},
  doi          = {10.1109/CIS.2008.95},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TianF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TranBD08,
  author       = {Minh{-}Triet Tran and
                  Doan Khanh Bui and
                  Anh Duc Duong},
  title        = {Gray S-Box for Advanced Encryption Standard},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {253--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.205},
  doi          = {10.1109/CIS.2008.205},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TranBD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Velik08,
  author       = {Rosemarie Velik},
  title        = {Discrete Fourier Transform Computation Using Neural Networks},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {120--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.36},
  doi          = {10.1109/CIS.2008.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Velik08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WanWXY08,
  author       = {Jian Wan and
                  Jianrong Wu and
                  Xianghua Xu and
                  Yanna Yan},
  title        = {An Efficient Gradient Mechanism of Directed Diffusion in Wireless
                  Sensor Network},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {427--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.133},
  doi          = {10.1109/CIS.2008.133},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WanWXY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Wang08,
  author       = {Xiaoh Wang},
  title        = {Posterior Probability Reconstruction for Multi-Class Support Vector
                  Machines},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {240--243},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.10},
  doi          = {10.1109/CIS.2008.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Wang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangL08,
  author       = {Jianjun Wang and
                  Zhonghua Li},
  title        = {Local Stability Analysis of CNNs with Delay and Impulses},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {129--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.93},
  doi          = {10.1109/CIS.2008.93},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangLC08,
  author       = {Na Wang and
                  Xia Li and
                  Yingjie Cui},
  title        = {Semi-Supervised Dimensionality Reduction with Pairwise Constraints
                  Using Graph Embedding for Face Analysis},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {210--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.55},
  doi          = {10.1109/CIS.2008.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangLXTW08,
  author       = {Huibin Wang and
                  Chaoying Liu and
                  Lizhong Xu and
                  Min Tang and
                  Xuewen Wu},
  title        = {Multiple Feature Fusion for Tracking of Moving Objects in Video Surveillance},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {554--559},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.86},
  doi          = {10.1109/CIS.2008.86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangLXTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangML08,
  author       = {Hui Wang and
                  Lequan Min and
                  Jinzhu Liu},
  title        = {Robust Designs for Fingerprint Feature Extraction {CNN} with Von Neumann
                  Neighborhood},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {124--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.166},
  doi          = {10.1109/CIS.2008.166},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangML08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangRY08,
  author       = {Huan Wang and
                  Mingwu Ren and
                  Jingyu Yang},
  title        = {Object Tracking Based on Genetic Algorithm and Kalman Filter},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {80--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.147},
  doi          = {10.1109/CIS.2008.147},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangRY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangSY08,
  author       = {Wei{-}jiang Wang and
                  Ting{-}zhi Shen and
                  Xue{-}mei Yan},
  title        = {An Improved Alternating-Projection Demosaicing Algorithm},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {528--533},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.116},
  doi          = {10.1109/CIS.2008.116},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangWH08,
  author       = {Junwei Wang and
                  Xingwei Wang and
                  Min Huang},
  title        = {Tabu Artificial Fish Swarm Algorithm Based Intelligent QoS Multicast
                  Routing Algorithm},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {56--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.162},
  doi          = {10.1109/CIS.2008.162},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangWH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangZ08,
  author       = {Chuangxin Wang and
                  Zhezhao Zeng},
  title        = {A Neural-Network Algorithm for the Simultaneous Inclusion of Polynomial
                  Zeros},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {30--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.58},
  doi          = {10.1109/CIS.2008.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WenH08,
  author       = {Jie{-}Chang Wen and
                  Chun{-}lan He},
  title        = {Some Notes on Blind Source Separation Using Generalized Eigenvalues},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {546--549},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.75},
  doi          = {10.1109/CIS.2008.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WenH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuLG08,
  author       = {Yahui Wu and
                  Gang Liu and
                  Jun Guo},
  title        = {A New Method for Discriminative Model Combination in Speech Recognition},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {200--203},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.128},
  doi          = {10.1109/CIS.2008.128},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuLG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuWBZ08,
  author       = {Chongming Wu and
                  Xiaodan Wang and
                  Dongying Bai and
                  Hongda Zhang},
  title        = {Fast {SVM} Incremental Learning Based on the Convex Hulls Algorithm},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {249--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.197},
  doi          = {10.1109/CIS.2008.197},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuWBZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuZWW08,
  author       = {Zhengjia Wu and
                  Liping Zhang and
                  Ying Wang and
                  Kui Wang},
  title        = {Optimization for Multi-Resource Allocation and Leveling Based on a
                  Self-Adaptive Ant Colony Algorithm},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {47--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.33},
  doi          = {10.1109/CIS.2008.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuZWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XiaoW08,
  author       = {Jun Xiao and
                  Ying Wang},
  title        = {Semi-Fragile Watermarking Based on Image Gradient},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {285--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.8},
  doi          = {10.1109/CIS.2008.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XiaoW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XiaoZZ08,
  author       = {Xiaochun Xiao and
                  Tiange Zhang and
                  Gendu Zhang},
  title        = {An Improved Approach to Access Graph Generation},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {447--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.68},
  doi          = {10.1109/CIS.2008.68},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XiaoZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XieCCL08,
  author       = {Xuehui Xie and
                  Wen{-}Sheng Chen and
                  Bo Chen and
                  Hui Liu},
  title        = {Kernel Subspace {LDA} with Self-Constructed Mercer Kernel for Face
                  Recognition},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {194--199},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.21},
  doi          = {10.1109/CIS.2008.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XieCCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XieZ08,
  author       = {Wenli Xie and
                  Zhezhao Zeng},
  title        = {A Novel Algorithm for Solving Nonlinear Equations},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {16--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.67},
  doi          = {10.1109/CIS.2008.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XieZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangPW08,
  author       = {Chuangxin Yang and
                  Hong Peng and
                  Jiabing Wang},
  title        = {A New Feature Extraction Approach Based on Sentence Element Analysis},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {90--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.37},
  doi          = {10.1109/CIS.2008.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangWL08,
  author       = {Mo Yang and
                  Lina Wang and
                  Yuandong Lei},
  title        = {Research on Evaluation of Trust Model},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {345--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.41},
  doi          = {10.1109/CIS.2008.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangZJW08,
  author       = {Chun Yang and
                  Xiangrong Zhang and
                  Licheng Jiao and
                  Gaimei Wang},
  title        = {Self-Tuning Semi-Supervised Spectral Clustering},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.141},
  doi          = {10.1109/CIS.2008.141},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangZJW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangZW08,
  author       = {Jianxi Yang and
                  Jianting Zhou and
                  Fan Wang},
  title        = {A Study on the Application of {GA-BP} Neural Network in the Bridge
                  Reliability Assessment},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {540--545},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.29},
  doi          = {10.1109/CIS.2008.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YaoZ08,
  author       = {Xuanxia Yao and
                  Xuefeng Zheng},
  title        = {A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless
                  Sensor Networks},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {436--441},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.34},
  doi          = {10.1109/CIS.2008.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YaoZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YeSSW08,
  author       = {JianHong Ye and
                  ShiXin Sun and
                  Wen Song and
                  Lijie Wen},
  title        = {The Operations and Properties of Reproducibility of the Empty Marking},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {139--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.23},
  doi          = {10.1109/CIS.2008.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YeSSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YuanCJY08,
  author       = {Zhijian Yuan and
                  Yingwen Chen and
                  Yan Jia and
                  Shuqiang Yang},
  title        = {Counting Evolving Data Stream Based on Hierarchical Counting Bloom
                  Filter},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {290--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.216},
  doi          = {10.1109/CIS.2008.216},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YuanCJY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YuanCWFX08,
  author       = {Yuan Yuan and
                  Bing Chen and
                  Jiandong Wang and
                  Liming Fang and
                  Tao Xu},
  title        = {Weighted Margin Multi-Class Core Vector Machines},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {235--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.27},
  doi          = {10.1109/CIS.2008.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YuanCWFX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangLWB08,
  author       = {Mengmeng Zhang and
                  Wenkai Liu and
                  Ruobin Wang and
                  Huihui Bai},
  title        = {A Novel Multiple Description Video Coding Algorithm},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {550--553},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.182},
  doi          = {10.1109/CIS.2008.182},
  timestamp    = {Thu, 14 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangLWB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangMYZF08,
  author       = {Qiuyu Zhang and
                  Fengman Miao and
                  Zhanting Yuan and
                  Qikun Zhang and
                  Zhi Fan},
  title        = {Construction of a Dynamic Trust Ontology Model},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {394--398},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.127},
  doi          = {10.1109/CIS.2008.127},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangMYZF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangNH08,
  author       = {Juan Zhang and
                  Yi Niu and
                  Wenbin He},
  title        = {Using Genetic Algorithm to Improve Fuzzy k-NN},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {475--479},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.159},
  doi          = {10.1109/CIS.2008.159},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangNH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangWZWZ08,
  author       = {Xiao{-}yan Zhang and
                  Xiao{-}Juan Wu and
                  Xin Zhou and
                  Xiao{-}Gang Wang and
                  Yuan{-}Yuan Zhang},
  title        = {Automatic Detection and Tracking of Maneuverable Birds in Videos},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {185--189},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.46},
  doi          = {10.1109/CIS.2008.46},
  timestamp    = {Mon, 12 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangWZWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangZFY08,
  author       = {Quanju Zhang and
                  Jie Zhang and
                  Junhong Feng and
                  Yajuan Yang},
  title        = {Neurodynamic Analysis for a Class of Nonlinear Fractional Programming},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {489--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.158},
  doi          = {10.1109/CIS.2008.158},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangZFY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoHX08,
  author       = {Min Zhao and
                  Zhaoshui He and
                  Shengli Xie},
  title        = {Blind Deconvolution Algorithm for {MIMO} Channel},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {470--474},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.136},
  doi          = {10.1109/CIS.2008.136},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoHX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoLDW08,
  author       = {Yuxin Zhao and
                  Guangjie Liu and
                  Yuewei Dai and
                  Zhiquan Wang},
  title        = {Robust Hashing Based on Persistent Points for Video Copy Detection},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {305--308},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.175},
  doi          = {10.1109/CIS.2008.175},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoLDW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoLJ08,
  author       = {Mingwei Zhao and
                  Yang Liu and
                  Rongan Jiang},
  title        = {Research of WaveCluster Algorithm in Intrusion Detection System},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {259--263},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.119},
  doi          = {10.1109/CIS.2008.119},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoLJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoSKBS08,
  author       = {Rongyong Zhao and
                  Yongqing Su and
                  Torben Knudsen and
                  Thomas Bak and
                  WenZhong Shen},
  title        = {Multi-Agent Model for Fatigue Control in Large Offshore Wind Farm},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {71--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.131},
  doi          = {10.1109/CIS.2008.131},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoSKBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoZ08,
  author       = {Weibin Zhao and
                  Zhiheng Zhou},
  title        = {Contours Location Based on Fisher Discrimination Analysis},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {480--483},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.138},
  doi          = {10.1109/CIS.2008.138},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhengCLFJ08,
  author       = {Min{-}qi Zheng and
                  Chongcheng Chen and
                  Jiaxiang Lin and
                  Minghui Fan and
                  Tamas Jansco},
  title        = {An Algorithm for Spatial Outlier Detection Based on Delaunay Triangulation},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {102--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.121},
  doi          = {10.1109/CIS.2008.121},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhengCLFJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhengQ08,
  author       = {Kai{-}mei Zheng and
                  Xu Qian},
  title        = {Reversible Data Hiding for Electrocardiogram Signal Based on Wavelet
                  Transforms},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {295--299},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.71},
  doi          = {10.1109/CIS.2008.71},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhengQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhouCMX08,
  author       = {Gengui Zhou and
                  Zhenyu Cao and
                  Zhiqing Meng and
                  Qi Xu},
  title        = {A GA-Based Approach on a Repair Logistics Network Design with M/M/s
                  Model},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {145--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.117},
  doi          = {10.1109/CIS.2008.117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhouCMX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhouPTX08,
  author       = {Ruili Zhou and
                  Jianfeng Pan and
                  Xiaobin Tan and
                  Hongsheng Xi},
  title        = {Application of {CLIPS} Expert System to Malware Detection System},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {309--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.100},
  doi          = {10.1109/CIS.2008.100},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhouPTX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhouS08,
  author       = {Jianqin Zhou and
                  Cheng Shangguan},
  title        = {On the k-error Linear Complexity of Sequences},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {267--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.144},
  doi          = {10.1109/CIS.2008.144},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhouS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhuX08,
  author       = {Xiang{-}wei Zhu and
                  Liang Xiao},
  title        = {Research of Multiple Watermarks Algorithm in E-commerce Copyright
                  Protection and Tracking},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {300--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.19},
  doi          = {10.1109/CIS.2008.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhuX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cis/2008-1,
  title        = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=4724594},
  isbn         = {978-0-7695-3508-1},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/2008-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics