Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cis/cis2014.bht:"
@inproceedings{DBLP:conf/cis/AiS14, author = {Zhenghai Ai and Zhongwei Si}, title = {Application of Investment Plan Selection Based on Variable Weight Synthesis and Mahalanobis Distance}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {278--282}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.36}, doi = {10.1109/CIS.2014.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/AiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/AlajeelyADM14, author = {Majeed Alajeely and Asma'a Ahmad and Robin Doss and Vicky H. Mak{-}Hau}, title = {Packet Faking Attack: {A} Novel Attack and Detection Mechanism in OppNets}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {638--642}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.15}, doi = {10.1109/CIS.2014.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/AlajeelyADM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChangJSH14, author = {Rui Chang and Liehui Jiang and Hui Shu and Hongqi He}, title = {Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {499--504}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.20}, doi = {10.1109/CIS.2014.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChangJSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Chen14, author = {Liping Chen}, title = {Ensuring Reliability and QoS Optimizing for Web Service Composition}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {510--513}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.86}, doi = {10.1109/CIS.2014.86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Chen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenJ14, author = {Fei Chen and Lin Jiang}, title = {A Parallel Algorithm for Datacleansing in Incomplete Information Systems Using MapReduce}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {273--277}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.42}, doi = {10.1109/CIS.2014.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenLZZ14, author = {Mukai Chen and Yao Lu and Guang{-}Hao Zhang and Wencai Zou}, title = {Real-Time Simulation in Dynamic Electromagnetic Scenes Using PipelineThread Pool}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {770--774}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.153}, doi = {10.1109/CIS.2014.153}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenLZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenWLZ14, author = {Juntao Chen and Shulei Wu and Lan Lin and Jinmei Zhan}, title = {Analysis of Energy Saving and Performance Characteristics of Library Computer Room Intelligent High Heat Transfer and Exchanger}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {139--142}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.175}, doi = {10.1109/CIS.2014.175}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenWLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenWWZ14, author = {Zhibin Chen and Man Wang and You{-}Wei Wen and Zhining Zhu}, title = {Choice of Regularization Parameter in Constrained Total Variational Image Restoration Model}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {736--740}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.110}, doi = {10.1109/CIS.2014.110}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenWWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenXN14, author = {Junfeng Chen and Yingjuan Xie and Jianjun Ni}, title = {Brain Storm Optimization Model Based on Uncertainty Information}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {99--103}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.152}, doi = {10.1109/CIS.2014.152}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenXN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenYG14, author = {Bu Chen and Qian Yin and Ping Guo}, title = {A Study of Deep Belief Network Based Chinese Speech Emotion Recognition}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {180--184}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.148}, doi = {10.1109/CIS.2014.148}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenYG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenZHZ14, author = {Lu Chen and Qing Zhou and Gaofeng Huang and Liqiang Zhang}, title = {A Trust-Role Based Context Aware Access Control Model}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {371--376}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.47}, doi = {10.1109/CIS.2014.47}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenZHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChengSXQW14, author = {Ming Cheng and Wei Su and Yuexia Xu and Zhiyi Qu and Xuan Wang}, title = {Linear Input Method of Mathematical Formula}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {755--760}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.173}, doi = {10.1109/CIS.2014.173}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ChengSXQW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChengWW14, author = {Nan Cheng and Wei Wu and Yubin Wang}, title = {Brief Talk about the Existing Problems in Safety Management in Classification Testing and Evaluation}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {681--684}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.131}, doi = {10.1109/CIS.2014.131}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChengWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DaiLXX14, author = {Liang Dai and Huiyun Li and Guoqing Xu and Liying Xiong}, title = {A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICs}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {430--434}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.27}, doi = {10.1109/CIS.2014.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DaiLXX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DaiS14, author = {Yue Dai and Shenghui Su}, title = {A Diploma Anti-forgery System Based on Lightweight Digital Signatures}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {647--651}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.44}, doi = {10.1109/CIS.2014.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DaiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DingZ14, author = {Dan Ding and Guizhen Zhu}, title = {A Random Sampling Algorithm for {SVP} Challenge Based on y-Sparse Representations of Short Lattice Vectors}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {425--429}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.31}, doi = {10.1109/CIS.2014.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DingZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DongMW14, author = {Na Dong and Zhengfeng Ming and Tao Wen}, title = {Two-Phase {SVPWM} Modulation Method and Its Application in Stepper Motor}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {794--797}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.132}, doi = {10.1109/CIS.2014.132}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DongMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DongPQ14, author = {Yanmei Dong and Mingtao Pei and Xiameng Qin}, title = {Vehicle Color Recognition Based on License Plate Color}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {264--267}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.63}, doi = {10.1109/CIS.2014.63}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DongPQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DongZJH14, author = {Lihua Dong and Yong Zeng and Ligang Ji and Xucang Han}, title = {Study on the Pass Rate of {NIST} {SP800-22} Statistical Test Suite}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {402--404}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.120}, doi = {10.1109/CIS.2014.120}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/DongZJH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FanLJ14, author = {Lei Fan and Xiyang Liu and Liping Jia}, title = {A Minimum-Elimination-Escape Function Method for Multimodal Optimization Problems}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {312--316}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.122}, doi = {10.1109/CIS.2014.122}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FanLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Feng14, author = {Tianxiang Feng}, title = {Ways to Train the Statistical Capacity of Grassroots Statisticians}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {798--802}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.33}, doi = {10.1109/CIS.2014.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Feng14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FengP14, author = {Mingyue Feng and Hua Pan}, title = {A Modified {PSO} Algorithm Based on Cache Replacement Algorithm}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {558--562}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.177}, doi = {10.1109/CIS.2014.177}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FengP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FengXZ14, author = {Jiqiang Feng and Chen Xu and Weiqiang Zhang}, title = {Convergence Analysis of Swarm Intelligence Based on Fuzzy Random Variables}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {35--38}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.168}, doi = {10.1109/CIS.2014.168}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FengXZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GaoZC14, author = {Ya Gao and Peng Zeng and Kim{-}Kwang Raymond Choo}, title = {Multi-sender Broadcast Authentication in Wireless Sensor Networks}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {633--637}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.147}, doi = {10.1109/CIS.2014.147}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GaoZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuiWSQG14, author = {Bin Gui and Xianghe Wei and Qiong Shen and Jingshan Qi and Liqiang Guo}, title = {Financial Time Series Forecasting Using Support Vector Machine}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {39--43}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.22}, doi = {10.1109/CIS.2014.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuiWSQG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoLLLS14, author = {Peng Guo and Yahui Li and Peng Li and Shuai Liu and Dongya Sun}, title = {A {UML} Model to Simulink Model Transformation Method in the Design of Embedded Software}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {583--587}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.162}, doi = {10.1109/CIS.2014.162}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuoLLLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoZ14, author = {Zhengyang Guo and Le Zhang}, title = {Improved Adaptive Median Filter}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {44--46}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.118}, doi = {10.1109/CIS.2014.118}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/GuoZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HanWWWR14, author = {Xiaowei Han and Beibei Wang and An Wang and Liji Wu and Woogeun Rhee}, title = {Algorithm-Based Countermeasures against Power Analysis Attacks for Public-Key Cryptography {SM2}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {435--439}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.116}, doi = {10.1109/CIS.2014.116}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HanWWWR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HanX14, author = {Wei Han and Jianchun Xie}, title = {A Developing Method for Parallel Program Based on System Generator}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {544--547}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.163}, doi = {10.1109/CIS.2014.163}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HanX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HangYZL14, author = {Guoqiang Hang and Yang Yang and Danyan Zhang and Xiaohua Li}, title = {Neuron-MOS-based Dynamic Circuits for Multiple-Valued Logic}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {166--170}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.178}, doi = {10.1109/CIS.2014.178}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HangYZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HeL14, author = {Dongyi He and Fang Luo}, title = {Study on Effect Evaluation of Enterprise Staff Training Based on Grey Correlation Analysis Method}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {785--788}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.115}, doi = {10.1109/CIS.2014.115}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HeL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HeXGLW14, author = {Wenzhang He and Hongjian Xu and Zhengyang Guo and Jie Liang and Lina Wang}, title = {The {CT} Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {124--128}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.75}, doi = {10.1109/CIS.2014.75}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HeXGLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuG14, author = {Jun Hu and Chun Guan}, title = {Granular Computing Model Based on Quantum Computing Theory}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {157--160}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.55}, doi = {10.1109/CIS.2014.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuWWW14, author = {Ye Hu and Liji Wu and An Wang and Beibei Wang}, title = {Hardware Design and Implementation of {SM3} Hash Algorithm for Financial {IC} Card}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {514--518}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.176}, doi = {10.1109/CIS.2014.176}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuWWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuWWXZL14, author = {Wenjing Hu and Liji Wu and An Wang and Xinjun Xie and Zhihui Zhu and Shun Luo}, title = {Adaptive Chosen-Plaintext Correlation Power Analysis}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {494--498}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.94}, doi = {10.1109/CIS.2014.94}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuWWXZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuangQ14, author = {Xuejun Huang and Xiaobin Qu}, title = {Dependence System and its Structure}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {326--329}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.95}, doi = {10.1109/CIS.2014.95}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuangQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuoL14, author = {Qirun Huo and Yao Lu}, title = {A Novel Tracking Method Based on Ensemble Metric Learning}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {176--179}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.135}, doi = {10.1109/CIS.2014.135}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuoL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiaZF14, author = {Liping Jia and Guocheng Zou and Lei Fan}, title = {Combining {TOPSIS} and Particle Swarm Optimization for a Class of Nonlinear Bilevel Programming Problems}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {321--325}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.52}, doi = {10.1109/CIS.2014.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiaZF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JianD14, author = {Yukun Jian and Lin Dai}, title = {Statistical Inference of {DEA} Model of Environmental Efficiency Considering Undesirable Outputs}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {780--784}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.111}, doi = {10.1109/CIS.2014.111}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JianD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiangLD14, author = {Tingyu Jiang and Yahui Li and Yuan Dong}, title = {A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted Computing Technology}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {553--557}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.161}, doi = {10.1109/CIS.2014.161}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiangLD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiangSL14, author = {Zhihua Jiang and Zhongwei Si and Chi Luo}, title = {Design {\&} Implementation to an {RFID} Based Conference Management System}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {143--147}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.29}, doi = {10.1109/CIS.2014.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiangSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiangXWM14, author = {Wenjuan Jiang and Dong Xu and Shulei Wu and Bin Meng}, title = {Design of a Flash Digital Watermarking Application Using {MATLAB} {GUI}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {210--212}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.155}, doi = {10.1109/CIS.2014.155}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiangXWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Jie14, author = {Liu Jie}, title = {Adaptive Central Force Optimization with Variable Population Size}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {17--20}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.46}, doi = {10.1109/CIS.2014.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Jie14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JingYS14, author = {Siyuan Jing and Jin Yang and Kun She}, title = {A Parallel Method for Rough Entropy Computation Using MapReduce}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {707--710}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.41}, doi = {10.1109/CIS.2014.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JingYS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JouiniR14, author = {Mouna Jouini and Latifa Ben Arfa Rabai}, title = {Surveying and Analyzing Security Problems in Cloud Computing Environments}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {689--693}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.169}, doi = {10.1109/CIS.2014.169}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JouiniR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JuYQNZ14, author = {Bin Ju and Mincao Ye and Yuntao Qian and Rong Ni and Chenxi Zhu}, title = {Modeling Behaviors of Browsing and Buying for Alidata Discovery Using Joint Non-negative Matrix Factorization}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {114--118}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.119}, doi = {10.1109/CIS.2014.119}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JuYQNZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiFLZ14, author = {Kaiqiang Li and Hao Feng and Yahui Li and Zhiwei Zhang}, title = {An Improved Method of Access Control Based on {BLP} Model in {MILS}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {588--592}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.39}, doi = {10.1109/CIS.2014.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiFLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiFLZ14a, author = {Kaiqiang Li and Hao Feng and Yahui Li and Zhiwei Zhang}, title = {Information Flow Control Model and Method in Distribute {MILS}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {598--602}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.48}, doi = {10.1109/CIS.2014.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiFLZ14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiL14, author = {Zhenhua Li and Hai{-}Lin Liu}, title = {Integrating Preferred Weights with Decomposition Based Multi-objective Evolutionary Algorithm}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {58--63}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.117}, doi = {10.1109/CIS.2014.117}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiL14a, author = {Wen Li and Hecheng Li}, title = {An Evolutionary Algorithm Based on a Space-Gridding Scheme for Constrained Multi-objective Optimization Problems}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {317--320}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.93}, doi = {10.1109/CIS.2014.93}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiL14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiLL14, author = {Junfeng Li and Xueqiang Lv and Kehui Liu}, title = {Extracting Hyponymy of Ontology Concepts from Patent Documents}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {283--287}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.10}, doi = {10.1109/CIS.2014.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiLX14, author = {Hongning Li and Xianjun Liu and Leilei Xu}, title = {Analysis of Distributed Consensus-Based Spectrum Sensing Algorithm in Cognitive Radio Networks}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {593--597}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.64}, doi = {10.1109/CIS.2014.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiLX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiLXW14, author = {Jie Li and Gang Lei and Yong Xian and Xiaoli Wang}, title = {Research on Ground Effect of Shipborne Flying-Wing {UAV}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {685--688}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.105}, doi = {10.1109/CIS.2014.105}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiLXW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiNLMS14, author = {Yahui Li and Wen Sheng Niu and Peng Li and Jianfeng Ma and Yulong Shen}, title = {Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {603--607}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.165}, doi = {10.1109/CIS.2014.165}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiNLMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiSX14, author = {Min Li and Xiaoli Sun and Chen Xu}, title = {Variational Image Decomposition in Shearlet Smoothness Spaces}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {352--355}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.25}, doi = {10.1109/CIS.2014.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiWXF14, author = {Tao Li and Weiwei Wang and Long Xu and Xiangchu Feng}, title = {Image Denoising Using Low-Rank Dictionary and Sparse Representation}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {228--232}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.56}, doi = {10.1109/CIS.2014.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiWXF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZ14, author = {Xiangyou Li and Qingxiang Zhang}, title = {The Sufficiency of Solution for Multi-objective Semi-infinite Programming}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {348--351}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.96}, doi = {10.1109/CIS.2014.96}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZ14a, author = {Jia{-}Zhi Li and Lei Zhang}, title = {Attribute-Based Keyword Search and Data Access Control in Cloud}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {382--386}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.113}, doi = {10.1109/CIS.2014.113}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZ14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZLG14, author = {Deqing Li and Wenyi Zeng and Junhong Li and Ping Guo}, title = {Balance Function Analysis in Variable Weight Decision Making}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {30--34}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.61}, doi = {10.1109/CIS.2014.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZQJ14, author = {Weibo Li and Chunhong Zhang and Xiaofeng Qiu and Yang Ji}, title = {Identifying Relevant Messages for Social {TV}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {288--292}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.50}, doi = {10.1109/CIS.2014.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZQJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiangLLW14, author = {Yan Liang and Wanxuan Lu and Wei Liang and Yucheng Wang}, title = {Action Recognition Using Local Joints Structure and Histograms of 3D Joints}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {185--188}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.82}, doi = {10.1109/CIS.2014.82}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiangLLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiangWZW14, author = {Hao Liang and Liji Wu and Xiangmin Zhang and Jiabin Wang}, title = {Design of a Masked S-Box for {SM4} Based on Composite Field}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {387--391}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.59}, doi = {10.1109/CIS.2014.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiangWZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LinFZS14, author = {Wei Lin and Jinlong Fei and Yuefei Zhu and Xiaolong Shi}, title = {A Method of Multiple Encryption and Sectional Encryption Protocol Reverse Engineering}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {420--424}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.114}, doi = {10.1109/CIS.2014.114}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LinFZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LinNSWM14, author = {Kai Lin and Rong Ni and Yanhua Shao and Sijing Wu and Xiao{-}Jiao Ma}, title = {Relative Efficiency of Third-Grade General Public Hospitals in Zhejiang Province, China}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {304--307}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.124}, doi = {10.1109/CIS.2014.124}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LinNSWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LinWC14, author = {Zhifeng Lin and Jiechang Wen and Qiling Chen}, title = {Wireless Location on {CPN} Correction Environmental Factors}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {129--133}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.26}, doi = {10.1109/CIS.2014.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LinWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Liu0FM14, author = {Wenjuan Liu and Xinhong Hei and Shinji Fukuma and Shin{-}ichiro Mori}, title = {A Simple and Real-Time Parallel Compression of Time Series Scientific Simulation Data for Interactive and Cooperative Supercomputing}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {578--582}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.107}, doi = {10.1109/CIS.2014.107}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Liu0FM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuC14, author = {Xin Liu and Yiu{-}ming Cheung}, title = {An Exemplar-Based Hidden Markov Model with Discriminative Visual Features for Lipreading}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {90--93}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.74}, doi = {10.1109/CIS.2014.74}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuF14, author = {Yanfei Liu and Sha Feng}, title = {Scalable Lightweight Authentication Protocol with Privacy Preservation}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {474--478}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.157}, doi = {10.1109/CIS.2014.157}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuF14a, author = {Hongxia Liu and Tianxiang Feng}, title = {Triangular Factorization of Strongly Row (Column) Full Rank Linear Equations}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {789--793}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.32}, doi = {10.1109/CIS.2014.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuF14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuHZ14, author = {Jie Liu and Yanfeng He and Aiping Zhang}, title = {An Improved {MULTI-ACS} Algorithm for the Waste Collection Vehicle Arc Routing Problem with Turn Constraints}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {25--29}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.77}, doi = {10.1109/CIS.2014.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuLL14, author = {Dingjia Liu and Guohua Liu and Yuanyuan Liu}, title = {On Modeling and Querying of Text Corpora}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {299--303}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.37}, doi = {10.1109/CIS.2014.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuW14, author = {Rui{-}xia Liu and Yinglong Wang}, title = {A New Sybil Attack Detection for Wireless Body Sensor Network}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {367--370}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.70}, doi = {10.1109/CIS.2014.70}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuWZW14, author = {Wei Liu and Liji Wu and Xiangmin Zhang and An Wang}, title = {Wavelet-Based Noise Reduction in Power Analysis Attack}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {405--409}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.103}, doi = {10.1109/CIS.2014.103}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuWZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LongWF14, author = {Haixia Long and Shulei Wu and Haiyan Fu}, title = {Improving Metabolic Flux Estimation of Metabolic Networks by {QPSO} with Penalty Function}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {52--57}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.49}, doi = {10.1109/CIS.2014.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LongWF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LongWF14a, author = {Haixia Long and Shulei Wu and Haiyan Fu}, title = {Parallel Diversity-Controlled Quantum-Behaved Particle Swarm Optimization Algorithm}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {74--79}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.53}, doi = {10.1109/CIS.2014.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LongWF14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LuFCZ14, author = {Liying Lu and Yingzi Fu and Peixiao Chu and Xiaolin Zhang}, title = {A Bayesian Analysis of Zero-Inflated Count Data: An Application to Youth Fitness Survey}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {699--703}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.125}, doi = {10.1109/CIS.2014.125}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LuFCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LuoTXZ14, author = {Kai Luo and Shouzhong Tu and Chunhe Xia and Dan Zhou}, title = {Detecting Compromised {VM} via Application-Aware Anomaly Detection}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {392--396}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.109}, doi = {10.1109/CIS.2014.109}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LuoTXZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LvDL14, author = {Feng Lv and Huijun Di and Yao Lu}, title = {Joint Sequential Shape Classification and Piecewise Elastic Motion Estimation}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {238--241}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.127}, doi = {10.1109/CIS.2014.127}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LvDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaDZG14, author = {Jinxin Ma and Guowei Dong and Puhan Zhang and Tao Guo}, title = {SymWalker: Symbolic Execution in Routines of Binary Code}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {694--698}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.16}, doi = {10.1109/CIS.2014.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MaDZG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MengQZ14, author = {Zhenwei Meng and Junlong Qiao and Lijun Zhang}, title = {Design and Implementation: Adaptive Active Queue Management Algorithm Based on Neural Network}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {104--108}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.104}, doi = {10.1109/CIS.2014.104}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MengQZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MiaoTQD14, author = {Qiguang Miao and Xing Tang and Yi{-}Ning Quan and Kai Deng}, title = {Detecting Circles on Ego Network Based on Structure}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {213--217}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.140}, doi = {10.1109/CIS.2014.140}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/MiaoTQD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MinLHY14, author = {Lequan Min and Xu Lan and Longjie Hao and Xiuping Yang}, title = {A 6 Dimensional Chaotic Generalized Synchronization System and Design of Pseudorandom Number Generator with Application in Image Encryption}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {356--362}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.69}, doi = {10.1109/CIS.2014.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MinLHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Nie14, author = {Jing Nie}, title = {Practice and Development of Cloud Computing-Based Mobile Teaching Management and Evaluation System in Vocational Colleges}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {765--769}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.88}, doi = {10.1109/CIS.2014.88}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Nie14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NiuBZW14, author = {Jie Niu and Xiongzhu Bu and Zhong Li and Yao Wang}, title = {An Improved Bilinear Deep Belief Network Algorithm for Image Classification}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {189--192}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.38}, doi = {10.1109/CIS.2014.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/NiuBZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NiuHHHX14, author = {Luoyong Niu and Jiaming Hong and Hongbo Huo and Bishi He and Zhe Xu}, title = {The Automatic Classification Research to Medical Imaging Disease Based on Na{\"{\i}}ve Nayesion Algorithm}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {308--311}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.71}, doi = {10.1109/CIS.2014.71}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/NiuHHHX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NiuLBXT14, author = {Ben Niu and Jing Liu and Ying Bi and Ting Xie and Lijing Tan}, title = {Improved Bacterial Foraging Optimization Algorithm with Information Communication Mechanism}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {47--51}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.106}, doi = {10.1109/CIS.2014.106}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/NiuLBXT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PangC14, author = {Sulin Pang and Yuanxiong Chen}, title = {Stock Index Futures Basis and Liquidity of Correlation Analysis and Application Based on t-GARCH-Copula Model}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {529--533}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.98}, doi = {10.1109/CIS.2014.98}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/PangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PengWX14, author = {Zhan Peng and Yuping Wang and Jinfeng Xue}, title = {An Improved Multi-pattern Matching Algorithm for Large-Scale Pattern Sets}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {197--200}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.136}, doi = {10.1109/CIS.2014.136}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/PengWX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PiSS14, author = {Yajie Pi and Xueyan Song and Jizhou Sun}, title = {Mathematical Models, {GRASP} Algorithms and Fitness Landscape Analysis for Aircraft Gate Assignment Problem}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {64--68}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.14}, doi = {10.1109/CIS.2014.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/PiSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/QinFHTHZH14, author = {Zhongyuan Qin and Kerong Feng and Shuaiqi Hu and Lei Tao and Zunli Hu and Xinshuai Zhang and Jie Huang}, title = {A Novel Identity-Based Security Scheme for Wireless Sensor Networks}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {662--666}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.99}, doi = {10.1109/CIS.2014.99}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/QinFHTHZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/QinWWH14, author = {Zhongyuan Qin and Yuying Wang and Hengkang Wang and Jie Huang}, title = {A Novel Key Pre-distribution Scheme in Wireless Sensor Networks}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {615--619}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.139}, doi = {10.1109/CIS.2014.139}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/QinWWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/QinZD14, author = {Huawang Qin and Xiaohua Zhu and Yuewei Dai}, title = {Provably Secure Identity-Based Threshold Decryption on Access Structure}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {464--468}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.23}, doi = {10.1109/CIS.2014.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/QinZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShanWLGLZ14, author = {Weijun Shan and Lihui Wang and Qing Li and Limin Guo and Shanshan Liu and Zhimin Zhang}, title = {A Chosen-Plaintext Method of {CPA} on {SM4} Block Cipher}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {363--366}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.57}, doi = {10.1109/CIS.2014.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShanWLGLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShiLZ14, author = {Qingxuan Shi and Yao Lu and Tianfei Zhou}, title = {Spatio-Temporal Context for More Accurate Dense Point Trajectories Estimation}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {256--259}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.137}, doi = {10.1109/CIS.2014.137}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ShiLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShiSLLH14, author = {Guozhen Shi and Mang Su and Fenghua Li and Jiapeng Lou and Qiong Huang}, title = {A User-Based Document Management Mechanism in Cloud}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {377--381}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.60}, doi = {10.1109/CIS.2014.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShiSLLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShiSLS14, author = {Guozhen Shi and Ying Shen and Fenghua Li and Mang Su}, title = {A Reliable Supervision Model and Implementation for the Trading of Digital Works}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {484--488}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.11}, doi = {10.1109/CIS.2014.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShiSLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SiLAJ14, author = {Zhongwei Si and Lina Liang and Zhenghai Ai and Zhihua Jiang}, title = {The Hilbert Boundary Value Problem for Beltrami Equation in Clifford Analysis}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {343--347}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.17}, doi = {10.1109/CIS.2014.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SiLAJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SongWWZ14, author = {Fei Song and Liji Wu and An Wang and Xinyu Zhao}, title = {A Novel Subspace Template Attack Based on Symmetric Cross Entropy Criterion}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {667--670}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.123}, doi = {10.1109/CIS.2014.123}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SongWWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Sun14, author = {Hai Sun}, title = {On the Field Patterns in Elliptic-Shaped Microshield Lines Loaded with Left-Handed Materials by the Edge-Based Finite Element Method}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {330--333}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.34}, doi = {10.1109/CIS.2014.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Sun14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SunSX14, author = {Guodong Sun and Shenghui Su and Maozhi Xu}, title = {Quantum Algorithm for Polynomial Root Finding Problem}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {469--473}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.40}, doi = {10.1109/CIS.2014.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SunSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SunWZY14, author = {Peng Sun and Ziyan Wu and Yunpeng Zhang and Yang Yang}, title = {Analysis and Modeling of Learning Behaviors on Intelligent Tutoring Website}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {729--731}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.170}, doi = {10.1109/CIS.2014.170}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SunWZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TanH14, author = {Huasheng Tan and Mingang Hua}, title = {Asymptotical Stability Criteria for Time-Delay Static Neural Networks Subject to Stochastic Perturbations}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {94--98}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.58}, doi = {10.1109/CIS.2014.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/TanH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TangS14, author = {Yi Tang and Shenghui Su}, title = {Application of Grover's Quantum Search Algorithm to Solve the Transcendental Logarithm Problem}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {445--449}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.166}, doi = {10.1109/CIS.2014.166}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/TangS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WanL14, author = {Xiaomei Wan and Guohua Liu}, title = {Verification of Artifact Lifecycle Model}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {534--538}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.35}, doi = {10.1109/CIS.2014.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WanL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Wang14, author = {Changji Wang}, title = {An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {440--444}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.101}, doi = {10.1109/CIS.2014.101}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Wang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangCSL14, author = {Ye Wang and Shaotsung Chang and Gongbing Shan and Hua Li}, title = {A Wireless Sensor System for the Training of Hammer Throwers}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {620--623}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.30}, doi = {10.1109/CIS.2014.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangCSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangJ14, author = {Ya Wang and Ding{-}Cheng Ji}, title = {A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text Documents}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {12--16}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.92}, doi = {10.1109/CIS.2014.92}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangL0WZ14, author = {Bin Wang and Ying Liu and Xinhong Hei and Lei Wang and Zhiqiang Zhang}, title = {A Parking Guidance Method Based on Parallel Particle Swarm Optimization Algorithm}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {568--572}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.150}, doi = {10.1109/CIS.2014.150}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangL0WZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangLC14, author = {Yubin Wang and Chao Li and Nan Cheng}, title = {Internet Security Protection in Personal Sensitive Information}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {628--632}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.129}, doi = {10.1109/CIS.2014.129}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangLXZX14, author = {Chang{-}Ji Wang and Hai{-}Tao Lin and Xi{-}Lei Xu and Kangjia Zheng and Xiaonan Xia}, title = {Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {459--463}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.100}, doi = {10.1109/CIS.2014.100}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangLXZX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangPZ14, author = {Dan Wang and Mingtao Pei and Lan Zhu}, title = {Detecting Driver Use of Mobile Phone Based on In-Car Camera}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {148--151}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.12}, doi = {10.1109/CIS.2014.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangQZWH14, author = {Yuying Wang and Zhongyuan Qin and Qunfang Zhang and Hengkang Wang and Jie Huang}, title = {A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {652--656}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.138}, doi = {10.1109/CIS.2014.138}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangQZWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangST14, author = {Qian Wang and Qingxuan Shi and Xuedong Tian}, title = {Tracking Non-rigid Object Using Discriminative Features}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {260--263}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.121}, doi = {10.1109/CIS.2014.121}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangWM14, author = {Xiaoli Wang and Yuping Wang and Kun Meng}, title = {A New Genetic Algorithm for Release-Time Aware Divisible-Load Scheduling}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {134--138}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.97}, doi = {10.1109/CIS.2014.97}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangWWW14, author = {Mingzhao Wang and Xiaoli Wang and Yuping Wang and Zhen Wei}, title = {An Adaptive Co-evolutionary Algorithm Based on Genotypic Diversity Measure}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {21--24}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.172}, doi = {10.1109/CIS.2014.172}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangWWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangWXZH14, author = {Yumeng Wang and Yuping Wang and Xingsi Xue and Chen Zhang and Yuanliang Huo}, title = {A New Packet Filter Schema Based on Multi-level Signature Hash and {DFA} Grouping}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {608--614}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.130}, doi = {10.1109/CIS.2014.130}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangWXZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangZHSZZ14, author = {Zhoukai Wang and Yikun Zhang and Xinhong Hei and Linjing Sun and Rui Zhou and Ming Zhao}, title = {A Rendering Algorithm for Function Call Diagram in Software Reliability Assurance}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {573--577}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.81}, doi = {10.1109/CIS.2014.81}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangZHSZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangZW14, author = {Hao Wang and Zhihua Zheng and Lei Wu}, title = {Hierarchial Identity-Based Encryption Scheme from Multilinear Maps}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {455--458}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.112}, doi = {10.1109/CIS.2014.112}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WeiLQHX14, author = {Lili Wei and Zhaotong Luo and Qiang Qu and Qing He and Jingwei Xu}, title = {A Low-Cost PKC-based {RFID} Authentication Protocol and its Implementation}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {415--419}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.134}, doi = {10.1109/CIS.2014.134}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WeiLQHX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WeiXQW14, author = {Peng Wei and Tongge Xu and Xi Qin and Chao Wang}, title = {Visualization of Police Intelligence Data Based on Word Clouds}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {539--543}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.145}, doi = {10.1109/CIS.2014.145}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WeiXQW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuCW14, author = {Wei Wu and Nan Cheng and Yubin Wang}, title = {Application Research on Retrospective Analysis System in Network Intrusion Detection}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {624--627}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.133}, doi = {10.1109/CIS.2014.133}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuCXLJX14, author = {Shulei Wu and Huandong Chen and Xiangxiang Xu and Haixia Long and Wenjuan Jiang and Dong Xu}, title = {An Improved Median Filter Algorithm Based on {VC} in Image Denoising}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {193--196}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.91}, doi = {10.1109/CIS.2014.91}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuCXLJX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuCZLS14, author = {Shulei Wu and Huandong Chen and Zhizhong Zhao and Haixia Long and Chunhui Song}, title = {An Improved Remote Sensing Image Classification Based on K-Means Using {HSV} Color Feature}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {201--204}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.90}, doi = {10.1109/CIS.2014.90}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuCZLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WuLL14, author = {Yunlong Wu and Guohua Liu and Yuanyuan Liu}, title = {Multi-user Preferences Based Top-k Query Processing Algorithm}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {69--73}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.68}, doi = {10.1109/CIS.2014.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WuLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XieFC14, author = {Yingjuan Xie and Xinnan Fan and Junfeng Chen}, title = {Affinity Propagation-Based Probability Neural Network Structure Optimization}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {85--89}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.156}, doi = {10.1109/CIS.2014.156}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XieFC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XieLLX14, author = {Xin Xie and Fenlin Liu and Bin Lu and Fei Xiang}, title = {Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {524--528}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.45}, doi = {10.1109/CIS.2014.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XieLLX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XieZ0Q14, author = {Guo Xie and Dan Zhang and Xinhong Hei and Fucai Qian}, title = {A Feasible Control Strategy for {LQG} Control Problem with Parameter and Structure Uncertainties}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {548--552}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.65}, doi = {10.1109/CIS.2014.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XieZ0Q14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XinL14, author = {Xin Li and Zhaotong Lian}, title = {Optimal Pricing with Yield Management in M/M/c}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {334--337}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.126}, doi = {10.1109/CIS.2014.126}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XinL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Xu14, author = {Ruilin Xu}, title = {A Feedback-Based Self-Organizing Query Structure Optimization Algorithm}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {80--84}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.62}, doi = {10.1109/CIS.2014.62}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Xu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuL14, author = {Qian Xu and Chuanguo Li}, title = {An Empirical Study on Determinants of Capital Structure in Chinese Listed Companies}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {724--728}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.102}, doi = {10.1109/CIS.2014.102}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XuL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuP14, author = {Xiao{-}Ma Xu and Ming{-}Tao Pei}, title = {Multiview Face Retrieval in Surveillance Video by Active Training Sample Collection}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {242--246}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.13}, doi = {10.1109/CIS.2014.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XuP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuPLXC14, author = {Haijiao Xu and Peng Pan and Yansheng Lu and Chunyan Xu and Deng Chen}, title = {Bimodal Learning for Multi-concept Image Query}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {205--209}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.144}, doi = {10.1109/CIS.2014.144}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XuPLXC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuSCQL14, author = {Yuexia Xu and Wei Su and Ming Cheng and Zhiyi Qu and Hui Li}, title = {N-gram Index Structure Study for Semantic Based Mathematical Formula}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {293--298}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.174}, doi = {10.1109/CIS.2014.174}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/XuSCQL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuYZH14, author = {Xirong Xu and Chun Yin and Sijia Zhang and Yazhen Huang}, title = {Improved Feedback Vertex Sets in Kautz Digraphs {K} (d, n)}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {161--165}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.79}, doi = {10.1109/CIS.2014.79}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XuYZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XueLLLHLC14, author = {Yun Xue and Zhengling Liao and Meihang Li and Jie Luo and Xiaohui Hu and Guiyin Luo and Wen{-}Sheng Chen}, title = {A New Biclustering Algorithm for Time-Series Gene Expression Data Analysis}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {268--272}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.164}, doi = {10.1109/CIS.2014.164}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XueLLLHLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YanLNYL14, author = {Qiao Yan and Nan Lu and Tu{-}Wen Ning and Xi{-}Yan Yao and Bao{-}Guang Li}, title = {{IP} Traceback Algorithm Based on Deterministic Linear Network Coding}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {397--401}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.51}, doi = {10.1109/CIS.2014.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YanLNYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangFXRC14, author = {Qiwen Yang and Shanshan Fu and Yuncan Xue and Shanna Ruan and Junfeng Chen}, title = {Individual Intelligence Based Optimization and Its Application to {ITAE} Standard Forms}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {109--113}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.54}, doi = {10.1109/CIS.2014.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangFXRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangHXLW14, author = {Xianxiang Yang and Heyan Huang and Xin Xin and Quanchao Liu and Xiaochi Wei}, title = {Domain-Specific Product Named Entity Recognition from Chinese Microblog}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {218--222}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.73}, doi = {10.1109/CIS.2014.73}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangHXLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangR14, author = {Jianhui Yang and Chuanyang Ruan}, title = {Hesitant Fuzzy Information Aggregation Operators under Confidence Levels}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {750--754}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.128}, doi = {10.1109/CIS.2014.128}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangW14, author = {Jianhui Yang and Jie Wu}, title = {Research and Application of a Stochastic Volatility Model with T-distribution Leveraged}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {775--779}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.21}, doi = {10.1109/CIS.2014.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangWZR14, author = {Xin Yang and Linna Wang and Hongbo Zai and Yanrong Ren}, title = {Simulation Study on the Keep-Right-Except-to-Pass Rule Model Based on Cellular Automata}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {338--342}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.142}, doi = {10.1109/CIS.2014.142}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangWZR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangYC14, author = {Weijun Yang and Yan Yang and Yuanfeng Chen}, title = {Design of Detection and Control System for Diesel Injector}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {746--749}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.83}, doi = {10.1109/CIS.2014.83}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangYC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangYWY14, author = {Weijun Yang and Yan Yang and Xiaodong Wang and Liang Yang}, title = {An Efficient Approximation Scheme for the Multiple QoS Constraints Routing}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {720--723}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.84}, doi = {10.1109/CIS.2014.84}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangYWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YeCDHW14, author = {Xueyi Ye and Xueting Chen and Meng Deng and Shuyun Hui and Yunlu Wang}, title = {A Multiple-Level {DCT} Based Robust {DWT-SVD} Watermark Method}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {479--483}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.28}, doi = {10.1109/CIS.2014.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YeCDHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZengGLG14, author = {Zhong Zeng and Dawu Gu and Junrong Liu and Zheng Guo}, title = {An Improved Side-Channel Attack Based on Support Vector Machine}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {676--680}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.80}, doi = {10.1109/CIS.2014.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZengGLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaWSW14, author = {Ben{-}Bo Zha and Ru{-}Liang Wang and Huan{-}Long Sun and Lei Wang}, title = {A Study of the Design and Parameters Optimization of {BP} Neural Network Using Improved {GEP}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {714--719}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.24}, doi = {10.1109/CIS.2014.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaWSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Zhang14, author = {Guojun Zhang}, title = {Selection of QoS Support on Artificial Immune Network Classifier for Dynamic Web Service Composition}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {643--646}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.85}, doi = {10.1109/CIS.2014.85}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Zhang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Zhang14a, author = {Hong Zhang}, title = {Cooperative Advertising Analysis within a Supply Chain Based on Game Theory}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {741--745}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.151}, doi = {10.1109/CIS.2014.151}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/Zhang14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangL14, author = {Jing Zhang and Huanqin Li}, title = {A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization Algorithm}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.160}, doi = {10.1109/CIS.2014.160}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangLC14, author = {Guang{-}Hao Zhang and Yao Lu and Mukai Chen}, title = {Multi-scale Monte Carlo-Based Tracking Method for Abrupt Motion}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {119--123}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.159}, doi = {10.1109/CIS.2014.159}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangLCZ14, author = {Lianjun Zhang and Yao Lu and Mukai Chen and Wencai Zou}, title = {A Codebook Based Background Subtraction Method for Image Defects Detection}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {704--706}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.154}, doi = {10.1109/CIS.2014.154}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangLCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangLWS14, author = {Ya{-}Ling Zhang and Kai Liu and Shang{-}Ping Wang and Qin{-}Dong Sun}, title = {A Multi-users Searchable Encryption Scheme with Proxy Re-encryption}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {563--567}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.167}, doi = {10.1109/CIS.2014.167}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangLWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangWH14, author = {Shuhui Zhang and Lianhai Wang and Xiaohui Han}, title = {A {KVM} Virtual Machine Memory Forensics Method Based on {VMCS}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {657--661}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.72}, doi = {10.1109/CIS.2014.72}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangWMZ14, author = {Zhenbin Zhang and Liji Wu and Zhaoli Mu and Xiangmin Zhang}, title = {A Novel Template Attack on wNAF Algorithm of {ECC}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {671--675}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.66}, doi = {10.1109/CIS.2014.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangWMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangXL14, author = {Xiujun Zhang and Chen Xu and Min Li}, title = {Nonlocal Diffusion Tensor for Visual Saliency Detection}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {247--251}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.89}, doi = {10.1109/CIS.2014.89}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangXL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangZ14, author = {Hong Zhang and Hai Zhu}, title = {Failure-Aware Resource Scheduling Policy for Hybrid Cloud}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {152--156}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.158}, doi = {10.1109/CIS.2014.158}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangZL14, author = {Tong Zhang and Shuna Zhao and Xue Li}, title = {Method of Non-reference Image Quality Assessment of {SSIM} Based on Regional Weighted Entropy}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {519--523}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.87}, doi = {10.1109/CIS.2014.87}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoG14, author = {Jian Zhao and Hai{-}Ying Gao}, title = {Attribute-Based Encryption for Restricted Circuits from Lattices}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {450--454}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.143}, doi = {10.1109/CIS.2014.143}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoZHS14, author = {Junyang Zhao and Zhili Zhang and Chongzhao Han and Lijiang Sun}, title = {Experiments with Feature-Prior Hybrid Ensemble Method for Classification}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {223--227}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.108}, doi = {10.1109/CIS.2014.108}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoZHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhengLXG14, author = {Xin Zheng and Chenlei Lv and Qingqing Xu and Ping Guo}, title = {Image Up-Scaling: Based on Self Similarity and Local Information}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {233--237}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.149}, doi = {10.1109/CIS.2014.149}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhengLXG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouLW14, author = {Yu Zhou and Guohua Liu and Biying Wang}, title = {Diversifying Results of Top-k Querys over Bounded Regions}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {505--509}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.141}, doi = {10.1109/CIS.2014.141}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhouLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuH14, author = {Cong{-}Yi Zhu and Yu{-}Mei Huang}, title = {A Preconditioned {GMRES} Method for Elliptic PDE-constrained Optimization Problems}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {711--713}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.76}, doi = {10.1109/CIS.2014.76}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhuH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuL14, author = {Jianchen Zhu and Zengli Liu}, title = {Analysis of Hybrid Feature Research Based on Extraction {LPCC} and {MFCC}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {732--735}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.19}, doi = {10.1109/CIS.2014.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhuL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuWW14, author = {Hai Zhu and Xiaoli Wang and Hongfeng Wang}, title = {A New Model for Energy Consumption Optimization under Cloud Computing and its Genetic Algorithm}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {7--11}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.171}, doi = {10.1109/CIS.2014.171}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhuWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuWZ014, author = {Lin Zhu and Ying Wang and Bo Zhao and Xiaozheng Zhang}, title = {A Fast Image Stitching Algorithm Based on Improved {SURF}}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {171--175}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.67}, doi = {10.1109/CIS.2014.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhuWZ014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuangCZ14, author = {Zeleng Zhuang and Jiachao Chen and Haosheng Zhang}, title = {A Countermeasure for {DES} with Both Rotating Masks and Secured S-Boxes}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {410--414}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.43}, doi = {10.1109/CIS.2014.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhuangCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuangL14, author = {Yu{-}Feng Zhuang and Da{-}Song Li}, title = {Online Group Purchase Research Based on Commodities Trading}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {761--764}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.18}, doi = {10.1109/CIS.2014.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhuangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZouL14, author = {Mingguang Zou and Zhitang Li}, title = {A Wav-Audio Steganography Algorithm Based on Amplitude Modifying}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {489--493}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.78}, doi = {10.1109/CIS.2014.78}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZouL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZouLCL14, author = {Wencai Zou and Yao Lu and Mukai Chen and Feng Lv}, title = {Rapid Face Detection in Static Video Using Background Subtraction}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {252--255}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.146}, doi = {10.1109/CIS.2014.146}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZouLCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cis/2014, title = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/7008825/proceeding}, isbn = {978-1-4799-7434-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.