Search dblp for Publications

export results for "toc:db/conf/cis/cis2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cis/AiS14,
  author       = {Zhenghai Ai and
                  Zhongwei Si},
  title        = {Application of Investment Plan Selection Based on Variable Weight
                  Synthesis and Mahalanobis Distance},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {278--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.36},
  doi          = {10.1109/CIS.2014.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/AiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/AlajeelyADM14,
  author       = {Majeed Alajeely and
                  Asma'a Ahmad and
                  Robin Doss and
                  Vicky H. Mak{-}Hau},
  title        = {Packet Faking Attack: {A} Novel Attack and Detection Mechanism in
                  OppNets},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {638--642},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.15},
  doi          = {10.1109/CIS.2014.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/AlajeelyADM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChangJSH14,
  author       = {Rui Chang and
                  Liehui Jiang and
                  Hui Shu and
                  Hongqi He},
  title        = {Cryptographic Algorithms Analysis Technology Research Based on Functions
                  Signature Recognition},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {499--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.20},
  doi          = {10.1109/CIS.2014.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChangJSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Chen14,
  author       = {Liping Chen},
  title        = {Ensuring Reliability and QoS Optimizing for Web Service Composition},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {510--513},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.86},
  doi          = {10.1109/CIS.2014.86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Chen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenJ14,
  author       = {Fei Chen and
                  Lin Jiang},
  title        = {A Parallel Algorithm for Datacleansing in Incomplete Information Systems
                  Using MapReduce},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {273--277},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.42},
  doi          = {10.1109/CIS.2014.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenLZZ14,
  author       = {Mukai Chen and
                  Yao Lu and
                  Guang{-}Hao Zhang and
                  Wencai Zou},
  title        = {Real-Time Simulation in Dynamic Electromagnetic Scenes Using PipelineThread
                  Pool},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {770--774},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.153},
  doi          = {10.1109/CIS.2014.153},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenLZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenWLZ14,
  author       = {Juntao Chen and
                  Shulei Wu and
                  Lan Lin and
                  Jinmei Zhan},
  title        = {Analysis of Energy Saving and Performance Characteristics of Library
                  Computer Room Intelligent High Heat Transfer and Exchanger},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {139--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.175},
  doi          = {10.1109/CIS.2014.175},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenWLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenWWZ14,
  author       = {Zhibin Chen and
                  Man Wang and
                  You{-}Wei Wen and
                  Zhining Zhu},
  title        = {Choice of Regularization Parameter in Constrained Total Variational
                  Image Restoration Model},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {736--740},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.110},
  doi          = {10.1109/CIS.2014.110},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenWWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenXN14,
  author       = {Junfeng Chen and
                  Yingjuan Xie and
                  Jianjun Ni},
  title        = {Brain Storm Optimization Model Based on Uncertainty Information},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {99--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.152},
  doi          = {10.1109/CIS.2014.152},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenXN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenYG14,
  author       = {Bu Chen and
                  Qian Yin and
                  Ping Guo},
  title        = {A Study of Deep Belief Network Based Chinese Speech Emotion Recognition},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {180--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.148},
  doi          = {10.1109/CIS.2014.148},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenYG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenZHZ14,
  author       = {Lu Chen and
                  Qing Zhou and
                  Gaofeng Huang and
                  Liqiang Zhang},
  title        = {A Trust-Role Based Context Aware Access Control Model},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {371--376},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.47},
  doi          = {10.1109/CIS.2014.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenZHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChengSXQW14,
  author       = {Ming Cheng and
                  Wei Su and
                  Yuexia Xu and
                  Zhiyi Qu and
                  Xuan Wang},
  title        = {Linear Input Method of Mathematical Formula},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {755--760},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.173},
  doi          = {10.1109/CIS.2014.173},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ChengSXQW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChengWW14,
  author       = {Nan Cheng and
                  Wei Wu and
                  Yubin Wang},
  title        = {Brief Talk about the Existing Problems in Safety Management in Classification
                  Testing and Evaluation},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {681--684},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.131},
  doi          = {10.1109/CIS.2014.131},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChengWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DaiLXX14,
  author       = {Liang Dai and
                  Huiyun Li and
                  Guoqing Xu and
                  Liying Xiong},
  title        = {A Statistical Model to Predict Success Rate of Ion Fault Injection
                  Attacks for Cryptographic ICs},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {430--434},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.27},
  doi          = {10.1109/CIS.2014.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DaiLXX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DaiS14,
  author       = {Yue Dai and
                  Shenghui Su},
  title        = {A Diploma Anti-forgery System Based on Lightweight Digital Signatures},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {647--651},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.44},
  doi          = {10.1109/CIS.2014.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DaiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DingZ14,
  author       = {Dan Ding and
                  Guizhen Zhu},
  title        = {A Random Sampling Algorithm for {SVP} Challenge Based on y-Sparse
                  Representations of Short Lattice Vectors},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {425--429},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.31},
  doi          = {10.1109/CIS.2014.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DingZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DongMW14,
  author       = {Na Dong and
                  Zhengfeng Ming and
                  Tao Wen},
  title        = {Two-Phase {SVPWM} Modulation Method and Its Application in Stepper
                  Motor},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {794--797},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.132},
  doi          = {10.1109/CIS.2014.132},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DongMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DongPQ14,
  author       = {Yanmei Dong and
                  Mingtao Pei and
                  Xiameng Qin},
  title        = {Vehicle Color Recognition Based on License Plate Color},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {264--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.63},
  doi          = {10.1109/CIS.2014.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DongPQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DongZJH14,
  author       = {Lihua Dong and
                  Yong Zeng and
                  Ligang Ji and
                  Xucang Han},
  title        = {Study on the Pass Rate of {NIST} {SP800-22} Statistical Test Suite},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {402--404},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.120},
  doi          = {10.1109/CIS.2014.120},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DongZJH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FanLJ14,
  author       = {Lei Fan and
                  Xiyang Liu and
                  Liping Jia},
  title        = {A Minimum-Elimination-Escape Function Method for Multimodal Optimization
                  Problems},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {312--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.122},
  doi          = {10.1109/CIS.2014.122},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FanLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Feng14,
  author       = {Tianxiang Feng},
  title        = {Ways to Train the Statistical Capacity of Grassroots Statisticians},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {798--802},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.33},
  doi          = {10.1109/CIS.2014.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Feng14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FengP14,
  author       = {Mingyue Feng and
                  Hua Pan},
  title        = {A Modified {PSO} Algorithm Based on Cache Replacement Algorithm},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {558--562},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.177},
  doi          = {10.1109/CIS.2014.177},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FengP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FengXZ14,
  author       = {Jiqiang Feng and
                  Chen Xu and
                  Weiqiang Zhang},
  title        = {Convergence Analysis of Swarm Intelligence Based on Fuzzy Random Variables},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {35--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.168},
  doi          = {10.1109/CIS.2014.168},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FengXZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoZC14,
  author       = {Ya Gao and
                  Peng Zeng and
                  Kim{-}Kwang Raymond Choo},
  title        = {Multi-sender Broadcast Authentication in Wireless Sensor Networks},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {633--637},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.147},
  doi          = {10.1109/CIS.2014.147},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuiWSQG14,
  author       = {Bin Gui and
                  Xianghe Wei and
                  Qiong Shen and
                  Jingshan Qi and
                  Liqiang Guo},
  title        = {Financial Time Series Forecasting Using Support Vector Machine},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {39--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.22},
  doi          = {10.1109/CIS.2014.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuiWSQG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoLLLS14,
  author       = {Peng Guo and
                  Yahui Li and
                  Peng Li and
                  Shuai Liu and
                  Dongya Sun},
  title        = {A {UML} Model to Simulink Model Transformation Method in the Design
                  of Embedded Software},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {583--587},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.162},
  doi          = {10.1109/CIS.2014.162},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoLLLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoZ14,
  author       = {Zhengyang Guo and
                  Le Zhang},
  title        = {Improved Adaptive Median Filter},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {44--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.118},
  doi          = {10.1109/CIS.2014.118},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HanWWWR14,
  author       = {Xiaowei Han and
                  Beibei Wang and
                  An Wang and
                  Liji Wu and
                  Woogeun Rhee},
  title        = {Algorithm-Based Countermeasures against Power Analysis Attacks for
                  Public-Key Cryptography {SM2}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {435--439},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.116},
  doi          = {10.1109/CIS.2014.116},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HanWWWR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HanX14,
  author       = {Wei Han and
                  Jianchun Xie},
  title        = {A Developing Method for Parallel Program Based on System Generator},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {544--547},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.163},
  doi          = {10.1109/CIS.2014.163},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HanX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HangYZL14,
  author       = {Guoqiang Hang and
                  Yang Yang and
                  Danyan Zhang and
                  Xiaohua Li},
  title        = {Neuron-MOS-based Dynamic Circuits for Multiple-Valued Logic},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {166--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.178},
  doi          = {10.1109/CIS.2014.178},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HangYZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HeL14,
  author       = {Dongyi He and
                  Fang Luo},
  title        = {Study on Effect Evaluation of Enterprise Staff Training Based on Grey
                  Correlation Analysis Method},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {785--788},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.115},
  doi          = {10.1109/CIS.2014.115},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HeL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HeXGLW14,
  author       = {Wenzhang He and
                  Hongjian Xu and
                  Zhengyang Guo and
                  Jie Liang and
                  Lina Wang},
  title        = {The {CT} Image Reconstruction Algorithm Based on the Least Absolute
                  Criterion by Alternating Direction Iterative},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {124--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.75},
  doi          = {10.1109/CIS.2014.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HeXGLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuG14,
  author       = {Jun Hu and
                  Chun Guan},
  title        = {Granular Computing Model Based on Quantum Computing Theory},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {157--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.55},
  doi          = {10.1109/CIS.2014.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuWWW14,
  author       = {Ye Hu and
                  Liji Wu and
                  An Wang and
                  Beibei Wang},
  title        = {Hardware Design and Implementation of {SM3} Hash Algorithm for Financial
                  {IC} Card},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {514--518},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.176},
  doi          = {10.1109/CIS.2014.176},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuWWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuWWXZL14,
  author       = {Wenjing Hu and
                  Liji Wu and
                  An Wang and
                  Xinjun Xie and
                  Zhihui Zhu and
                  Shun Luo},
  title        = {Adaptive Chosen-Plaintext Correlation Power Analysis},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {494--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.94},
  doi          = {10.1109/CIS.2014.94},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuWWXZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuangQ14,
  author       = {Xuejun Huang and
                  Xiaobin Qu},
  title        = {Dependence System and its Structure},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {326--329},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.95},
  doi          = {10.1109/CIS.2014.95},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuangQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuoL14,
  author       = {Qirun Huo and
                  Yao Lu},
  title        = {A Novel Tracking Method Based on Ensemble Metric Learning},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {176--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.135},
  doi          = {10.1109/CIS.2014.135},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuoL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiaZF14,
  author       = {Liping Jia and
                  Guocheng Zou and
                  Lei Fan},
  title        = {Combining {TOPSIS} and Particle Swarm Optimization for a Class of
                  Nonlinear Bilevel Programming Problems},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {321--325},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.52},
  doi          = {10.1109/CIS.2014.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiaZF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JianD14,
  author       = {Yukun Jian and
                  Lin Dai},
  title        = {Statistical Inference of {DEA} Model of Environmental Efficiency Considering
                  Undesirable Outputs},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {780--784},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.111},
  doi          = {10.1109/CIS.2014.111},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JianD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiangLD14,
  author       = {Tingyu Jiang and
                  Yahui Li and
                  Yuan Dong},
  title        = {A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted
                  Computing Technology},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {553--557},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.161},
  doi          = {10.1109/CIS.2014.161},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiangLD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiangSL14,
  author       = {Zhihua Jiang and
                  Zhongwei Si and
                  Chi Luo},
  title        = {Design {\&} Implementation to an {RFID} Based Conference Management
                  System},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {143--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.29},
  doi          = {10.1109/CIS.2014.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiangSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiangXWM14,
  author       = {Wenjuan Jiang and
                  Dong Xu and
                  Shulei Wu and
                  Bin Meng},
  title        = {Design of a Flash Digital Watermarking Application Using {MATLAB}
                  {GUI}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {210--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.155},
  doi          = {10.1109/CIS.2014.155},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiangXWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Jie14,
  author       = {Liu Jie},
  title        = {Adaptive Central Force Optimization with Variable Population Size},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {17--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.46},
  doi          = {10.1109/CIS.2014.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Jie14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JingYS14,
  author       = {Siyuan Jing and
                  Jin Yang and
                  Kun She},
  title        = {A Parallel Method for Rough Entropy Computation Using MapReduce},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {707--710},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.41},
  doi          = {10.1109/CIS.2014.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JingYS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JouiniR14,
  author       = {Mouna Jouini and
                  Latifa Ben Arfa Rabai},
  title        = {Surveying and Analyzing Security Problems in Cloud Computing Environments},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {689--693},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.169},
  doi          = {10.1109/CIS.2014.169},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JouiniR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JuYQNZ14,
  author       = {Bin Ju and
                  Mincao Ye and
                  Yuntao Qian and
                  Rong Ni and
                  Chenxi Zhu},
  title        = {Modeling Behaviors of Browsing and Buying for Alidata Discovery Using
                  Joint Non-negative Matrix Factorization},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {114--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.119},
  doi          = {10.1109/CIS.2014.119},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JuYQNZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiFLZ14,
  author       = {Kaiqiang Li and
                  Hao Feng and
                  Yahui Li and
                  Zhiwei Zhang},
  title        = {An Improved Method of Access Control Based on {BLP} Model in {MILS}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {588--592},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.39},
  doi          = {10.1109/CIS.2014.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiFLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiFLZ14a,
  author       = {Kaiqiang Li and
                  Hao Feng and
                  Yahui Li and
                  Zhiwei Zhang},
  title        = {Information Flow Control Model and Method in Distribute {MILS}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {598--602},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.48},
  doi          = {10.1109/CIS.2014.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiFLZ14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiL14,
  author       = {Zhenhua Li and
                  Hai{-}Lin Liu},
  title        = {Integrating Preferred Weights with Decomposition Based Multi-objective
                  Evolutionary Algorithm},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {58--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.117},
  doi          = {10.1109/CIS.2014.117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiL14a,
  author       = {Wen Li and
                  Hecheng Li},
  title        = {An Evolutionary Algorithm Based on a Space-Gridding Scheme for Constrained
                  Multi-objective Optimization Problems},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {317--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.93},
  doi          = {10.1109/CIS.2014.93},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiL14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiLL14,
  author       = {Junfeng Li and
                  Xueqiang Lv and
                  Kehui Liu},
  title        = {Extracting Hyponymy of Ontology Concepts from Patent Documents},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {283--287},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.10},
  doi          = {10.1109/CIS.2014.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiLX14,
  author       = {Hongning Li and
                  Xianjun Liu and
                  Leilei Xu},
  title        = {Analysis of Distributed Consensus-Based Spectrum Sensing Algorithm
                  in Cognitive Radio Networks},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {593--597},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.64},
  doi          = {10.1109/CIS.2014.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiLX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiLXW14,
  author       = {Jie Li and
                  Gang Lei and
                  Yong Xian and
                  Xiaoli Wang},
  title        = {Research on Ground Effect of Shipborne Flying-Wing {UAV}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {685--688},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.105},
  doi          = {10.1109/CIS.2014.105},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiLXW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiNLMS14,
  author       = {Yahui Li and
                  Wen Sheng Niu and
                  Peng Li and
                  Jianfeng Ma and
                  Yulong Shen},
  title        = {Secure Networking Protocol with Identity Protection for Cooperation
                  of Unmanned Platforms},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {603--607},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.165},
  doi          = {10.1109/CIS.2014.165},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiNLMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiSX14,
  author       = {Min Li and
                  Xiaoli Sun and
                  Chen Xu},
  title        = {Variational Image Decomposition in Shearlet Smoothness Spaces},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {352--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.25},
  doi          = {10.1109/CIS.2014.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiWXF14,
  author       = {Tao Li and
                  Weiwei Wang and
                  Long Xu and
                  Xiangchu Feng},
  title        = {Image Denoising Using Low-Rank Dictionary and Sparse Representation},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {228--232},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.56},
  doi          = {10.1109/CIS.2014.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiWXF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZ14,
  author       = {Xiangyou Li and
                  Qingxiang Zhang},
  title        = {The Sufficiency of Solution for Multi-objective Semi-infinite Programming},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {348--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.96},
  doi          = {10.1109/CIS.2014.96},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZ14a,
  author       = {Jia{-}Zhi Li and
                  Lei Zhang},
  title        = {Attribute-Based Keyword Search and Data Access Control in Cloud},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {382--386},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.113},
  doi          = {10.1109/CIS.2014.113},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZ14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZLG14,
  author       = {Deqing Li and
                  Wenyi Zeng and
                  Junhong Li and
                  Ping Guo},
  title        = {Balance Function Analysis in Variable Weight Decision Making},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {30--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.61},
  doi          = {10.1109/CIS.2014.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZQJ14,
  author       = {Weibo Li and
                  Chunhong Zhang and
                  Xiaofeng Qiu and
                  Yang Ji},
  title        = {Identifying Relevant Messages for Social {TV}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {288--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.50},
  doi          = {10.1109/CIS.2014.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZQJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiangLLW14,
  author       = {Yan Liang and
                  Wanxuan Lu and
                  Wei Liang and
                  Yucheng Wang},
  title        = {Action Recognition Using Local Joints Structure and Histograms of
                  3D Joints},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {185--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.82},
  doi          = {10.1109/CIS.2014.82},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiangLLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiangWZW14,
  author       = {Hao Liang and
                  Liji Wu and
                  Xiangmin Zhang and
                  Jiabin Wang},
  title        = {Design of a Masked S-Box for {SM4} Based on Composite Field},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {387--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.59},
  doi          = {10.1109/CIS.2014.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiangWZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LinFZS14,
  author       = {Wei Lin and
                  Jinlong Fei and
                  Yuefei Zhu and
                  Xiaolong Shi},
  title        = {A Method of Multiple Encryption and Sectional Encryption Protocol
                  Reverse Engineering},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {420--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.114},
  doi          = {10.1109/CIS.2014.114},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LinFZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LinNSWM14,
  author       = {Kai Lin and
                  Rong Ni and
                  Yanhua Shao and
                  Sijing Wu and
                  Xiao{-}Jiao Ma},
  title        = {Relative Efficiency of Third-Grade General Public Hospitals in Zhejiang
                  Province, China},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {304--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.124},
  doi          = {10.1109/CIS.2014.124},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LinNSWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LinWC14,
  author       = {Zhifeng Lin and
                  Jiechang Wen and
                  Qiling Chen},
  title        = {Wireless Location on {CPN} Correction Environmental Factors},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {129--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.26},
  doi          = {10.1109/CIS.2014.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LinWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Liu0FM14,
  author       = {Wenjuan Liu and
                  Xinhong Hei and
                  Shinji Fukuma and
                  Shin{-}ichiro Mori},
  title        = {A Simple and Real-Time Parallel Compression of Time Series Scientific
                  Simulation Data for Interactive and Cooperative Supercomputing},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {578--582},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.107},
  doi          = {10.1109/CIS.2014.107},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Liu0FM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuC14,
  author       = {Xin Liu and
                  Yiu{-}ming Cheung},
  title        = {An Exemplar-Based Hidden Markov Model with Discriminative Visual Features
                  for Lipreading},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {90--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.74},
  doi          = {10.1109/CIS.2014.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuF14,
  author       = {Yanfei Liu and
                  Sha Feng},
  title        = {Scalable Lightweight Authentication Protocol with Privacy Preservation},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {474--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.157},
  doi          = {10.1109/CIS.2014.157},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuF14a,
  author       = {Hongxia Liu and
                  Tianxiang Feng},
  title        = {Triangular Factorization of Strongly Row (Column) Full Rank Linear
                  Equations},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {789--793},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.32},
  doi          = {10.1109/CIS.2014.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuF14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuHZ14,
  author       = {Jie Liu and
                  Yanfeng He and
                  Aiping Zhang},
  title        = {An Improved {MULTI-ACS} Algorithm for the Waste Collection Vehicle
                  Arc Routing Problem with Turn Constraints},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {25--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.77},
  doi          = {10.1109/CIS.2014.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuLL14,
  author       = {Dingjia Liu and
                  Guohua Liu and
                  Yuanyuan Liu},
  title        = {On Modeling and Querying of Text Corpora},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {299--303},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.37},
  doi          = {10.1109/CIS.2014.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuW14,
  author       = {Rui{-}xia Liu and
                  Yinglong Wang},
  title        = {A New Sybil Attack Detection for Wireless Body Sensor Network},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {367--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.70},
  doi          = {10.1109/CIS.2014.70},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuWZW14,
  author       = {Wei Liu and
                  Liji Wu and
                  Xiangmin Zhang and
                  An Wang},
  title        = {Wavelet-Based Noise Reduction in Power Analysis Attack},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {405--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.103},
  doi          = {10.1109/CIS.2014.103},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuWZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LongWF14,
  author       = {Haixia Long and
                  Shulei Wu and
                  Haiyan Fu},
  title        = {Improving Metabolic Flux Estimation of Metabolic Networks by {QPSO}
                  with Penalty Function},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {52--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.49},
  doi          = {10.1109/CIS.2014.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LongWF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LongWF14a,
  author       = {Haixia Long and
                  Shulei Wu and
                  Haiyan Fu},
  title        = {Parallel Diversity-Controlled Quantum-Behaved Particle Swarm Optimization
                  Algorithm},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {74--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.53},
  doi          = {10.1109/CIS.2014.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LongWF14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LuFCZ14,
  author       = {Liying Lu and
                  Yingzi Fu and
                  Peixiao Chu and
                  Xiaolin Zhang},
  title        = {A Bayesian Analysis of Zero-Inflated Count Data: An Application to
                  Youth Fitness Survey},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {699--703},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.125},
  doi          = {10.1109/CIS.2014.125},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LuFCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LuoTXZ14,
  author       = {Kai Luo and
                  Shouzhong Tu and
                  Chunhe Xia and
                  Dan Zhou},
  title        = {Detecting Compromised {VM} via Application-Aware Anomaly Detection},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {392--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.109},
  doi          = {10.1109/CIS.2014.109},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LuoTXZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LvDL14,
  author       = {Feng Lv and
                  Huijun Di and
                  Yao Lu},
  title        = {Joint Sequential Shape Classification and Piecewise Elastic Motion
                  Estimation},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {238--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.127},
  doi          = {10.1109/CIS.2014.127},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LvDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MaDZG14,
  author       = {Jinxin Ma and
                  Guowei Dong and
                  Puhan Zhang and
                  Tao Guo},
  title        = {SymWalker: Symbolic Execution in Routines of Binary Code},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {694--698},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.16},
  doi          = {10.1109/CIS.2014.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MaDZG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MengQZ14,
  author       = {Zhenwei Meng and
                  Junlong Qiao and
                  Lijun Zhang},
  title        = {Design and Implementation: Adaptive Active Queue Management Algorithm
                  Based on Neural Network},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {104--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.104},
  doi          = {10.1109/CIS.2014.104},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MengQZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MiaoTQD14,
  author       = {Qiguang Miao and
                  Xing Tang and
                  Yi{-}Ning Quan and
                  Kai Deng},
  title        = {Detecting Circles on Ego Network Based on Structure},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {213--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.140},
  doi          = {10.1109/CIS.2014.140},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/MiaoTQD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MinLHY14,
  author       = {Lequan Min and
                  Xu Lan and
                  Longjie Hao and
                  Xiuping Yang},
  title        = {A 6 Dimensional Chaotic Generalized Synchronization System and Design
                  of Pseudorandom Number Generator with Application in Image Encryption},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {356--362},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.69},
  doi          = {10.1109/CIS.2014.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MinLHY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Nie14,
  author       = {Jing Nie},
  title        = {Practice and Development of Cloud Computing-Based Mobile Teaching
                  Management and Evaluation System in Vocational Colleges},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {765--769},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.88},
  doi          = {10.1109/CIS.2014.88},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Nie14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NiuBZW14,
  author       = {Jie Niu and
                  Xiongzhu Bu and
                  Zhong Li and
                  Yao Wang},
  title        = {An Improved Bilinear Deep Belief Network Algorithm for Image Classification},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {189--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.38},
  doi          = {10.1109/CIS.2014.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NiuBZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NiuHHHX14,
  author       = {Luoyong Niu and
                  Jiaming Hong and
                  Hongbo Huo and
                  Bishi He and
                  Zhe Xu},
  title        = {The Automatic Classification Research to Medical Imaging Disease Based
                  on Na{\"{\i}}ve Nayesion Algorithm},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {308--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.71},
  doi          = {10.1109/CIS.2014.71},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NiuHHHX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NiuLBXT14,
  author       = {Ben Niu and
                  Jing Liu and
                  Ying Bi and
                  Ting Xie and
                  Lijing Tan},
  title        = {Improved Bacterial Foraging Optimization Algorithm with Information
                  Communication Mechanism},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {47--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.106},
  doi          = {10.1109/CIS.2014.106},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NiuLBXT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PangC14,
  author       = {Sulin Pang and
                  Yuanxiong Chen},
  title        = {Stock Index Futures Basis and Liquidity of Correlation Analysis and
                  Application Based on t-GARCH-Copula Model},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {529--533},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.98},
  doi          = {10.1109/CIS.2014.98},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PengWX14,
  author       = {Zhan Peng and
                  Yuping Wang and
                  Jinfeng Xue},
  title        = {An Improved Multi-pattern Matching Algorithm for Large-Scale Pattern
                  Sets},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {197--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.136},
  doi          = {10.1109/CIS.2014.136},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PengWX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PiSS14,
  author       = {Yajie Pi and
                  Xueyan Song and
                  Jizhou Sun},
  title        = {Mathematical Models, {GRASP} Algorithms and Fitness Landscape Analysis
                  for Aircraft Gate Assignment Problem},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {64--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.14},
  doi          = {10.1109/CIS.2014.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PiSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/QinFHTHZH14,
  author       = {Zhongyuan Qin and
                  Kerong Feng and
                  Shuaiqi Hu and
                  Lei Tao and
                  Zunli Hu and
                  Xinshuai Zhang and
                  Jie Huang},
  title        = {A Novel Identity-Based Security Scheme for Wireless Sensor Networks},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {662--666},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.99},
  doi          = {10.1109/CIS.2014.99},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/QinFHTHZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/QinWWH14,
  author       = {Zhongyuan Qin and
                  Yuying Wang and
                  Hengkang Wang and
                  Jie Huang},
  title        = {A Novel Key Pre-distribution Scheme in Wireless Sensor Networks},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {615--619},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.139},
  doi          = {10.1109/CIS.2014.139},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/QinWWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/QinZD14,
  author       = {Huawang Qin and
                  Xiaohua Zhu and
                  Yuewei Dai},
  title        = {Provably Secure Identity-Based Threshold Decryption on Access Structure},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {464--468},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.23},
  doi          = {10.1109/CIS.2014.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/QinZD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShanWLGLZ14,
  author       = {Weijun Shan and
                  Lihui Wang and
                  Qing Li and
                  Limin Guo and
                  Shanshan Liu and
                  Zhimin Zhang},
  title        = {A Chosen-Plaintext Method of {CPA} on {SM4} Block Cipher},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {363--366},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.57},
  doi          = {10.1109/CIS.2014.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShanWLGLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShiLZ14,
  author       = {Qingxuan Shi and
                  Yao Lu and
                  Tianfei Zhou},
  title        = {Spatio-Temporal Context for More Accurate Dense Point Trajectories
                  Estimation},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {256--259},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.137},
  doi          = {10.1109/CIS.2014.137},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ShiLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShiSLLH14,
  author       = {Guozhen Shi and
                  Mang Su and
                  Fenghua Li and
                  Jiapeng Lou and
                  Qiong Huang},
  title        = {A User-Based Document Management Mechanism in Cloud},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {377--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.60},
  doi          = {10.1109/CIS.2014.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShiSLLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShiSLS14,
  author       = {Guozhen Shi and
                  Ying Shen and
                  Fenghua Li and
                  Mang Su},
  title        = {A Reliable Supervision Model and Implementation for the Trading of
                  Digital Works},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {484--488},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.11},
  doi          = {10.1109/CIS.2014.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShiSLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SiLAJ14,
  author       = {Zhongwei Si and
                  Lina Liang and
                  Zhenghai Ai and
                  Zhihua Jiang},
  title        = {The Hilbert Boundary Value Problem for Beltrami Equation in Clifford
                  Analysis},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {343--347},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.17},
  doi          = {10.1109/CIS.2014.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SiLAJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SongWWZ14,
  author       = {Fei Song and
                  Liji Wu and
                  An Wang and
                  Xinyu Zhao},
  title        = {A Novel Subspace Template Attack Based on Symmetric Cross Entropy
                  Criterion},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {667--670},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.123},
  doi          = {10.1109/CIS.2014.123},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SongWWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Sun14,
  author       = {Hai Sun},
  title        = {On the Field Patterns in Elliptic-Shaped Microshield Lines Loaded
                  with Left-Handed Materials by the Edge-Based Finite Element Method},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {330--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.34},
  doi          = {10.1109/CIS.2014.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Sun14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SunSX14,
  author       = {Guodong Sun and
                  Shenghui Su and
                  Maozhi Xu},
  title        = {Quantum Algorithm for Polynomial Root Finding Problem},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {469--473},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.40},
  doi          = {10.1109/CIS.2014.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SunSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SunWZY14,
  author       = {Peng Sun and
                  Ziyan Wu and
                  Yunpeng Zhang and
                  Yang Yang},
  title        = {Analysis and Modeling of Learning Behaviors on Intelligent Tutoring
                  Website},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {729--731},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.170},
  doi          = {10.1109/CIS.2014.170},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SunWZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TanH14,
  author       = {Huasheng Tan and
                  Mingang Hua},
  title        = {Asymptotical Stability Criteria for Time-Delay Static Neural Networks
                  Subject to Stochastic Perturbations},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {94--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.58},
  doi          = {10.1109/CIS.2014.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TanH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TangS14,
  author       = {Yi Tang and
                  Shenghui Su},
  title        = {Application of Grover's Quantum Search Algorithm to Solve the Transcendental
                  Logarithm Problem},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {445--449},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.166},
  doi          = {10.1109/CIS.2014.166},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TangS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WanL14,
  author       = {Xiaomei Wan and
                  Guohua Liu},
  title        = {Verification of Artifact Lifecycle Model},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {534--538},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.35},
  doi          = {10.1109/CIS.2014.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WanL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Wang14,
  author       = {Changji Wang},
  title        = {An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear
                  Pairings},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {440--444},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.101},
  doi          = {10.1109/CIS.2014.101},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Wang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangCSL14,
  author       = {Ye Wang and
                  Shaotsung Chang and
                  Gongbing Shan and
                  Hua Li},
  title        = {A Wireless Sensor System for the Training of Hammer Throwers},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {620--623},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.30},
  doi          = {10.1109/CIS.2014.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangCSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangJ14,
  author       = {Ya Wang and
                  Ding{-}Cheng Ji},
  title        = {A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text
                  Documents},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {12--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.92},
  doi          = {10.1109/CIS.2014.92},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangL0WZ14,
  author       = {Bin Wang and
                  Ying Liu and
                  Xinhong Hei and
                  Lei Wang and
                  Zhiqiang Zhang},
  title        = {A Parking Guidance Method Based on Parallel Particle Swarm Optimization
                  Algorithm},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {568--572},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.150},
  doi          = {10.1109/CIS.2014.150},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangL0WZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangLC14,
  author       = {Yubin Wang and
                  Chao Li and
                  Nan Cheng},
  title        = {Internet Security Protection in Personal Sensitive Information},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {628--632},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.129},
  doi          = {10.1109/CIS.2014.129},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangLXZX14,
  author       = {Chang{-}Ji Wang and
                  Hai{-}Tao Lin and
                  Xi{-}Lei Xu and
                  Kangjia Zheng and
                  Xiaonan Xia},
  title        = {Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based
                  Encryption Scheme},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {459--463},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.100},
  doi          = {10.1109/CIS.2014.100},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangLXZX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangPZ14,
  author       = {Dan Wang and
                  Mingtao Pei and
                  Lan Zhu},
  title        = {Detecting Driver Use of Mobile Phone Based on In-Car Camera},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {148--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.12},
  doi          = {10.1109/CIS.2014.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangQZWH14,
  author       = {Yuying Wang and
                  Zhongyuan Qin and
                  Qunfang Zhang and
                  Hengkang Wang and
                  Jie Huang},
  title        = {A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless
                  Sensor Networks},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {652--656},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.138},
  doi          = {10.1109/CIS.2014.138},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangQZWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangST14,
  author       = {Qian Wang and
                  Qingxuan Shi and
                  Xuedong Tian},
  title        = {Tracking Non-rigid Object Using Discriminative Features},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {260--263},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.121},
  doi          = {10.1109/CIS.2014.121},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangWM14,
  author       = {Xiaoli Wang and
                  Yuping Wang and
                  Kun Meng},
  title        = {A New Genetic Algorithm for Release-Time Aware Divisible-Load Scheduling},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {134--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.97},
  doi          = {10.1109/CIS.2014.97},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangWWW14,
  author       = {Mingzhao Wang and
                  Xiaoli Wang and
                  Yuping Wang and
                  Zhen Wei},
  title        = {An Adaptive Co-evolutionary Algorithm Based on Genotypic Diversity
                  Measure},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {21--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.172},
  doi          = {10.1109/CIS.2014.172},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangWWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangWXZH14,
  author       = {Yumeng Wang and
                  Yuping Wang and
                  Xingsi Xue and
                  Chen Zhang and
                  Yuanliang Huo},
  title        = {A New Packet Filter Schema Based on Multi-level Signature Hash and
                  {DFA} Grouping},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {608--614},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.130},
  doi          = {10.1109/CIS.2014.130},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangWXZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangZHSZZ14,
  author       = {Zhoukai Wang and
                  Yikun Zhang and
                  Xinhong Hei and
                  Linjing Sun and
                  Rui Zhou and
                  Ming Zhao},
  title        = {A Rendering Algorithm for Function Call Diagram in Software Reliability
                  Assurance},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {573--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.81},
  doi          = {10.1109/CIS.2014.81},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangZHSZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangZW14,
  author       = {Hao Wang and
                  Zhihua Zheng and
                  Lei Wu},
  title        = {Hierarchial Identity-Based Encryption Scheme from Multilinear Maps},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {455--458},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.112},
  doi          = {10.1109/CIS.2014.112},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WeiLQHX14,
  author       = {Lili Wei and
                  Zhaotong Luo and
                  Qiang Qu and
                  Qing He and
                  Jingwei Xu},
  title        = {A Low-Cost PKC-based {RFID} Authentication Protocol and its Implementation},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {415--419},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.134},
  doi          = {10.1109/CIS.2014.134},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WeiLQHX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WeiXQW14,
  author       = {Peng Wei and
                  Tongge Xu and
                  Xi Qin and
                  Chao Wang},
  title        = {Visualization of Police Intelligence Data Based on Word Clouds},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {539--543},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.145},
  doi          = {10.1109/CIS.2014.145},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WeiXQW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuCW14,
  author       = {Wei Wu and
                  Nan Cheng and
                  Yubin Wang},
  title        = {Application Research on Retrospective Analysis System in Network Intrusion
                  Detection},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {624--627},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.133},
  doi          = {10.1109/CIS.2014.133},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuCXLJX14,
  author       = {Shulei Wu and
                  Huandong Chen and
                  Xiangxiang Xu and
                  Haixia Long and
                  Wenjuan Jiang and
                  Dong Xu},
  title        = {An Improved Median Filter Algorithm Based on {VC} in Image Denoising},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {193--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.91},
  doi          = {10.1109/CIS.2014.91},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuCXLJX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuCZLS14,
  author       = {Shulei Wu and
                  Huandong Chen and
                  Zhizhong Zhao and
                  Haixia Long and
                  Chunhui Song},
  title        = {An Improved Remote Sensing Image Classification Based on K-Means Using
                  {HSV} Color Feature},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {201--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.90},
  doi          = {10.1109/CIS.2014.90},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuCZLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuLL14,
  author       = {Yunlong Wu and
                  Guohua Liu and
                  Yuanyuan Liu},
  title        = {Multi-user Preferences Based Top-k Query Processing Algorithm},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {69--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.68},
  doi          = {10.1109/CIS.2014.68},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XieFC14,
  author       = {Yingjuan Xie and
                  Xinnan Fan and
                  Junfeng Chen},
  title        = {Affinity Propagation-Based Probability Neural Network Structure Optimization},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {85--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.156},
  doi          = {10.1109/CIS.2014.156},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XieFC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XieLLX14,
  author       = {Xin Xie and
                  Fenlin Liu and
                  Bin Lu and
                  Fei Xiang},
  title        = {Mixed Obfuscation of Overlapping Instruction and Self-Modify Code
                  Based on Hyper-Chaotic Opaque Predicates},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {524--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.45},
  doi          = {10.1109/CIS.2014.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XieLLX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XieZ0Q14,
  author       = {Guo Xie and
                  Dan Zhang and
                  Xinhong Hei and
                  Fucai Qian},
  title        = {A Feasible Control Strategy for {LQG} Control Problem with Parameter
                  and Structure Uncertainties},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {548--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.65},
  doi          = {10.1109/CIS.2014.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XieZ0Q14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XinL14,
  author       = {Xin Li and
                  Zhaotong Lian},
  title        = {Optimal Pricing with Yield Management in M/M/c},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {334--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.126},
  doi          = {10.1109/CIS.2014.126},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XinL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Xu14,
  author       = {Ruilin Xu},
  title        = {A Feedback-Based Self-Organizing Query Structure Optimization Algorithm},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {80--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.62},
  doi          = {10.1109/CIS.2014.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Xu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XuL14,
  author       = {Qian Xu and
                  Chuanguo Li},
  title        = {An Empirical Study on Determinants of Capital Structure in Chinese
                  Listed Companies},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {724--728},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.102},
  doi          = {10.1109/CIS.2014.102},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XuL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XuP14,
  author       = {Xiao{-}Ma Xu and
                  Ming{-}Tao Pei},
  title        = {Multiview Face Retrieval in Surveillance Video by Active Training
                  Sample Collection},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {242--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.13},
  doi          = {10.1109/CIS.2014.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XuP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XuPLXC14,
  author       = {Haijiao Xu and
                  Peng Pan and
                  Yansheng Lu and
                  Chunyan Xu and
                  Deng Chen},
  title        = {Bimodal Learning for Multi-concept Image Query},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {205--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.144},
  doi          = {10.1109/CIS.2014.144},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XuPLXC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XuSCQL14,
  author       = {Yuexia Xu and
                  Wei Su and
                  Ming Cheng and
                  Zhiyi Qu and
                  Hui Li},
  title        = {N-gram Index Structure Study for Semantic Based Mathematical Formula},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {293--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.174},
  doi          = {10.1109/CIS.2014.174},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/XuSCQL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XuYZH14,
  author       = {Xirong Xu and
                  Chun Yin and
                  Sijia Zhang and
                  Yazhen Huang},
  title        = {Improved Feedback Vertex Sets in Kautz Digraphs {K} (d, n)},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {161--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.79},
  doi          = {10.1109/CIS.2014.79},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XuYZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XueLLLHLC14,
  author       = {Yun Xue and
                  Zhengling Liao and
                  Meihang Li and
                  Jie Luo and
                  Xiaohui Hu and
                  Guiyin Luo and
                  Wen{-}Sheng Chen},
  title        = {A New Biclustering Algorithm for Time-Series Gene Expression Data
                  Analysis},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {268--272},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.164},
  doi          = {10.1109/CIS.2014.164},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XueLLLHLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YanLNYL14,
  author       = {Qiao Yan and
                  Nan Lu and
                  Tu{-}Wen Ning and
                  Xi{-}Yan Yao and
                  Bao{-}Guang Li},
  title        = {{IP} Traceback Algorithm Based on Deterministic Linear Network Coding},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {397--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.51},
  doi          = {10.1109/CIS.2014.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YanLNYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangFXRC14,
  author       = {Qiwen Yang and
                  Shanshan Fu and
                  Yuncan Xue and
                  Shanna Ruan and
                  Junfeng Chen},
  title        = {Individual Intelligence Based Optimization and Its Application to
                  {ITAE} Standard Forms},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {109--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.54},
  doi          = {10.1109/CIS.2014.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangFXRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangHXLW14,
  author       = {Xianxiang Yang and
                  Heyan Huang and
                  Xin Xin and
                  Quanchao Liu and
                  Xiaochi Wei},
  title        = {Domain-Specific Product Named Entity Recognition from Chinese Microblog},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {218--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.73},
  doi          = {10.1109/CIS.2014.73},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangHXLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangR14,
  author       = {Jianhui Yang and
                  Chuanyang Ruan},
  title        = {Hesitant Fuzzy Information Aggregation Operators under Confidence
                  Levels},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {750--754},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.128},
  doi          = {10.1109/CIS.2014.128},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangW14,
  author       = {Jianhui Yang and
                  Jie Wu},
  title        = {Research and Application of a Stochastic Volatility Model with T-distribution
                  Leveraged},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {775--779},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.21},
  doi          = {10.1109/CIS.2014.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangWZR14,
  author       = {Xin Yang and
                  Linna Wang and
                  Hongbo Zai and
                  Yanrong Ren},
  title        = {Simulation Study on the Keep-Right-Except-to-Pass Rule Model Based
                  on Cellular Automata},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {338--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.142},
  doi          = {10.1109/CIS.2014.142},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangWZR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangYC14,
  author       = {Weijun Yang and
                  Yan Yang and
                  Yuanfeng Chen},
  title        = {Design of Detection and Control System for Diesel Injector},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {746--749},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.83},
  doi          = {10.1109/CIS.2014.83},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangYC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangYWY14,
  author       = {Weijun Yang and
                  Yan Yang and
                  Xiaodong Wang and
                  Liang Yang},
  title        = {An Efficient Approximation Scheme for the Multiple QoS Constraints
                  Routing},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {720--723},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.84},
  doi          = {10.1109/CIS.2014.84},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangYWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YeCDHW14,
  author       = {Xueyi Ye and
                  Xueting Chen and
                  Meng Deng and
                  Shuyun Hui and
                  Yunlu Wang},
  title        = {A Multiple-Level {DCT} Based Robust {DWT-SVD} Watermark Method},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {479--483},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.28},
  doi          = {10.1109/CIS.2014.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YeCDHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZengGLG14,
  author       = {Zhong Zeng and
                  Dawu Gu and
                  Junrong Liu and
                  Zheng Guo},
  title        = {An Improved Side-Channel Attack Based on Support Vector Machine},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {676--680},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.80},
  doi          = {10.1109/CIS.2014.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZengGLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaWSW14,
  author       = {Ben{-}Bo Zha and
                  Ru{-}Liang Wang and
                  Huan{-}Long Sun and
                  Lei Wang},
  title        = {A Study of the Design and Parameters Optimization of {BP} Neural Network
                  Using Improved {GEP}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {714--719},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.24},
  doi          = {10.1109/CIS.2014.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaWSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Zhang14,
  author       = {Guojun Zhang},
  title        = {Selection of QoS Support on Artificial Immune Network Classifier for
                  Dynamic Web Service Composition},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {643--646},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.85},
  doi          = {10.1109/CIS.2014.85},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Zhang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Zhang14a,
  author       = {Hong Zhang},
  title        = {Cooperative Advertising Analysis within a Supply Chain Based on Game
                  Theory},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {741--745},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.151},
  doi          = {10.1109/CIS.2014.151},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Zhang14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangL14,
  author       = {Jing Zhang and
                  Huanqin Li},
  title        = {A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization
                  Algorithm},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.160},
  doi          = {10.1109/CIS.2014.160},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangLC14,
  author       = {Guang{-}Hao Zhang and
                  Yao Lu and
                  Mukai Chen},
  title        = {Multi-scale Monte Carlo-Based Tracking Method for Abrupt Motion},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {119--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.159},
  doi          = {10.1109/CIS.2014.159},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangLCZ14,
  author       = {Lianjun Zhang and
                  Yao Lu and
                  Mukai Chen and
                  Wencai Zou},
  title        = {A Codebook Based Background Subtraction Method for Image Defects Detection},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {704--706},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.154},
  doi          = {10.1109/CIS.2014.154},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangLCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangLWS14,
  author       = {Ya{-}Ling Zhang and
                  Kai Liu and
                  Shang{-}Ping Wang and
                  Qin{-}Dong Sun},
  title        = {A Multi-users Searchable Encryption Scheme with Proxy Re-encryption},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {563--567},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.167},
  doi          = {10.1109/CIS.2014.167},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangLWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangWH14,
  author       = {Shuhui Zhang and
                  Lianhai Wang and
                  Xiaohui Han},
  title        = {A {KVM} Virtual Machine Memory Forensics Method Based on {VMCS}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {657--661},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.72},
  doi          = {10.1109/CIS.2014.72},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangWMZ14,
  author       = {Zhenbin Zhang and
                  Liji Wu and
                  Zhaoli Mu and
                  Xiangmin Zhang},
  title        = {A Novel Template Attack on wNAF Algorithm of {ECC}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {671--675},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.66},
  doi          = {10.1109/CIS.2014.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangWMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangXL14,
  author       = {Xiujun Zhang and
                  Chen Xu and
                  Min Li},
  title        = {Nonlocal Diffusion Tensor for Visual Saliency Detection},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {247--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.89},
  doi          = {10.1109/CIS.2014.89},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangXL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangZ14,
  author       = {Hong Zhang and
                  Hai Zhu},
  title        = {Failure-Aware Resource Scheduling Policy for Hybrid Cloud},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {152--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.158},
  doi          = {10.1109/CIS.2014.158},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangZL14,
  author       = {Tong Zhang and
                  Shuna Zhao and
                  Xue Li},
  title        = {Method of Non-reference Image Quality Assessment of {SSIM} Based on
                  Regional Weighted Entropy},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {519--523},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.87},
  doi          = {10.1109/CIS.2014.87},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoG14,
  author       = {Jian Zhao and
                  Hai{-}Ying Gao},
  title        = {Attribute-Based Encryption for Restricted Circuits from Lattices},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {450--454},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.143},
  doi          = {10.1109/CIS.2014.143},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoZHS14,
  author       = {Junyang Zhao and
                  Zhili Zhang and
                  Chongzhao Han and
                  Lijiang Sun},
  title        = {Experiments with Feature-Prior Hybrid Ensemble Method for Classification},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {223--227},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.108},
  doi          = {10.1109/CIS.2014.108},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoZHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhengLXG14,
  author       = {Xin Zheng and
                  Chenlei Lv and
                  Qingqing Xu and
                  Ping Guo},
  title        = {Image Up-Scaling: Based on Self Similarity and Local Information},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {233--237},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.149},
  doi          = {10.1109/CIS.2014.149},
  timestamp    = {Fri, 17 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhengLXG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhouLW14,
  author       = {Yu Zhou and
                  Guohua Liu and
                  Biying Wang},
  title        = {Diversifying Results of Top-k Querys over Bounded Regions},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {505--509},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.141},
  doi          = {10.1109/CIS.2014.141},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhouLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhuH14,
  author       = {Cong{-}Yi Zhu and
                  Yu{-}Mei Huang},
  title        = {A Preconditioned {GMRES} Method for Elliptic PDE-constrained Optimization
                  Problems},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {711--713},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.76},
  doi          = {10.1109/CIS.2014.76},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhuH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhuL14,
  author       = {Jianchen Zhu and
                  Zengli Liu},
  title        = {Analysis of Hybrid Feature Research Based on Extraction {LPCC} and
                  {MFCC}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {732--735},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.19},
  doi          = {10.1109/CIS.2014.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhuL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhuWW14,
  author       = {Hai Zhu and
                  Xiaoli Wang and
                  Hongfeng Wang},
  title        = {A New Model for Energy Consumption Optimization under Cloud Computing
                  and its Genetic Algorithm},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {7--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.171},
  doi          = {10.1109/CIS.2014.171},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhuWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhuWZ014,
  author       = {Lin Zhu and
                  Ying Wang and
                  Bo Zhao and
                  Xiaozheng Zhang},
  title        = {A Fast Image Stitching Algorithm Based on Improved {SURF}},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {171--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.67},
  doi          = {10.1109/CIS.2014.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhuWZ014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhuangCZ14,
  author       = {Zeleng Zhuang and
                  Jiachao Chen and
                  Haosheng Zhang},
  title        = {A Countermeasure for {DES} with Both Rotating Masks and Secured S-Boxes},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {410--414},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.43},
  doi          = {10.1109/CIS.2014.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhuangCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhuangL14,
  author       = {Yu{-}Feng Zhuang and
                  Da{-}Song Li},
  title        = {Online Group Purchase Research Based on Commodities Trading},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {761--764},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.18},
  doi          = {10.1109/CIS.2014.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhuangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZouL14,
  author       = {Mingguang Zou and
                  Zhitang Li},
  title        = {A Wav-Audio Steganography Algorithm Based on Amplitude Modifying},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {489--493},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.78},
  doi          = {10.1109/CIS.2014.78},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZouL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZouLCL14,
  author       = {Wencai Zou and
                  Yao Lu and
                  Mukai Chen and
                  Feng Lv},
  title        = {Rapid Face Detection in Static Video Using Background Subtraction},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {252--255},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.146},
  doi          = {10.1109/CIS.2014.146},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZouLCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cis/2014,
  title        = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7008825/proceeding},
  isbn         = {978-1-4799-7434-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics