| 2009 | 2-Level-Wavelet-Based License Plate Edge Detection. Ming-Kan Wu, Jing-Siang Wei, Hao-Chung Shih, Chian C. Ho |
| 2009 | A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai |
| 2009 | A CELP-Speech Information Hiding Algorithm Based on Vector Quantization. Ji-Xin Liu, Zhe-Ming Lu, Hao Luo |
| 2009 | A Comparative Statistical Analysis of Pseudorandom Bit Sequences. Rashidah Kadir, Mohd Aizaini Maarof |
| 2009 | A Database Protection System Aiming at SQL Attack. Liwu Deng, Ruzhi Xu, Lizheng Jiang, Guangjuan Lv |
| 2009 | A Deep Copy Protection Framework for Electronic Devices within Home. Yang Zhan, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang |
| 2009 | A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface. Kefeng Fan, Subing Zhang, Wei Mo |
| 2009 | A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform. Xiang He, Jianjun Liu |
| 2009 | A Dynamic Graph Watermark Scheme of Tamper Resistance. Xiaojiang Chen, Dingyi Fang, Jingbo Shen, Feng Chen, Wenbo Wang, Lu He |
| 2009 | A Dynamic Layering Scheme of Multicast Key Management. Fan Yang, Xiaoping Li, Qingkuan Dong, Yanming Liu |
| 2009 | A Fast Correlation Attack via Parallel Computing. Qiong Liu, Yupu Hu |
| 2009 | A Fragile Software Watermarking for Tamper-Proof. Changle Zhang, Hong Peng, Xianzhong Long, Zheng Pan, Ying Wu |
| 2009 | A Frequent-Domain VideoTranscoder with Spatial Downscaling for H.264/AVC. Bo Wang, Dichen Liu |
| 2009 | A Generalization of de Weger's Method. Chien-Yuan Chen, Chih-Cheng Hsueh, Yu-Feng Lin |
| 2009 | A High Embedding Efficiency Steganography Scheme for Wet Paper Codes. Zhao-Xia Yin, Chin-Chen Chang, Yan-Ping Zhang |
| 2009 | A High Quality Reversible Data Hiding Method Using Interpolation Technique. Chyuan-Huei Thomas Yang, Chun-Hao Hsu |
| 2009 | A High-efficiency Data Distribution Algorithm in Distributed Storage. Xiaoyuan Yang, Zhen Liu, Wei Zhang, Dun-Tao Guo |
| 2009 | A Joint Multiscale Algorithm with Auto-adapted Threshold for Image Denoising. Jin He, Yinpei Sun, Ying Luo, Qun Zhang |
| 2009 | A Low-cost RFID Authentication Protocol with Location Privacy Protection. Yu-Yi Chen, Jun-Chao Lu, Shin-I Chen, Jinn-ke Jan |
| 2009 | A Method for Accessing Trusted Services Based on Service-Oriented Architecture. Xin Yu, Yu Bai |
| 2009 | A Model of Intrusion Prevention Base on Immune. Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai |
| 2009 | A Modified Feature Based Image Watermarking Scheme in NSCT Domain. Liu Yang, Baolong Guo, Jianmin Lv |
| 2009 | A Modified Run-length Image Data Hiding for High Embedding Capacity. Rey-Sern Lin, Shang-Wen Hu |
| 2009 | A Multi-view Nonlinear Active Shape Model Based on 3D Transformation Shape Search. Faling Yi, Wei Xiong, Zhanpeng Huang, Jie Zhao |
| 2009 | A Name Recommendation Photo Album Using Probability Neural Network. Ding-Hrong Chen, Shiang-En Tang |
| 2009 | A New Abuse-Free Fair Electronic Payment Protocol. Kai Fan, Yue Wang, Hui Li |
| 2009 | A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data. Hisham A. Kholidy, Khaled Alghathbar |
| 2009 | A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation. Xiaoyue Wu, Baolong Guo, Shengli Qu, Zhuo Wang |
| 2009 | A New Algorithm for Outlier Detection Based on Offset. Yue Zhang, Jie Liu, Bo Song |
| 2009 | A New Authenticated Key Agreement Protocol for Wireless Mobile Networks. Shin-Jia Hwang, Ming-Jhang Chai |
| 2009 | A New Conic Curve Digital Signature Scheme. Xiang Can, You Lin |
| 2009 | A New Efficient and Strongly Secure Authenticated Key Exchange Protocol. Qingfeng Cheng, Guangguo Han, Chuangui Ma |
| 2009 | A New Feature Selection Method for Malcodes Detection. Xiaokang Zhang, Jianmei Shuai |
| 2009 | A New Fingerprint Sequences Matching Algorithm for Content-Based Copy Detection. Rongxian Nie, Guiguang Ding, Jianmin Wang, Li Zhang |
| 2009 | A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks. Xin-Wei Li, Bao-Long Guo, Lei-Da Li, Hong-Xin Shen |
| 2009 | A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. Yulong Shen, Qijian Xu, Zuoshun Wu, Hao Yin, Jianfeng Ma |
| 2009 | A New Image Restoration Algorithm Based on Variational Derivative. Wenjuan Zhang, Weibin Zhang |
| 2009 | A New Interacting Multiple Model Algorithm Based on the Unscented Particle Filter. Xiaolong Deng, Pingfang Zhou |
| 2009 | A New JPEG Resistant Color Image Watermarking Algorithm Based on Quantization Index Modulation. Jie Nie, Zhiqiang Wei, Zhen Li |
| 2009 | A New Knapsack Public-Key Cryptosystem. Weidong Zhang, Baocang Wang, Yupu Hu |
| 2009 | A New Multi-bank E-cash Protocol with Anonymity Control. Lingling Wang |
| 2009 | A New Multiple-Objects Tracking Method with Particle Filter. Long Chen, Baolong Guo, Wei Sun |
| 2009 | A New Scheme for Multisensor Image Fusion System. Liu Weiguang, Wang Wenqi, Cui Jiangtao |
| 2009 | A New Scheme to Privacy-Preserving Collaborative Data Mining. Jianming Zhu |
| 2009 | A New Source Address Validation Scheme Based on IBS. Ningning Lu, Huachun Zhou, Hongke Zhang |
| 2009 | A Novel Approach for Audio Watermarking. Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki, Pritheega Magalingam |
| 2009 | A Novel Biometric-Based Authentication Scheme with Privacy Protection. Huixian Li, Liaojun Pang |
| 2009 | A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin |
| 2009 | A Novel Method for Plane Array Infrared Image to Detect Point Target. Che Hong, Sun Longhe |
| 2009 | A Novel Micropayment Scheme with Complete Anonymity. Xin Zhao, Yuqin Lv, Wenxin He |
| 2009 | A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT Algorithm. Lin-Lin Tang, Zhe-Ming Lu, Fa-Xin Yu |
| 2009 | A Novel Video Shot Segmentation Based on Textural Features. Yin Wang, Xiangming Wen, Xinqi Lin, Peizhou He, Wei Zheng |
| 2009 | A Parity Check Node Synchronization Based Method for Solving Phase Ambiguity Problem in DVB-S Systems. Jielin Fu, Yongjun Tang |
| 2009 | A Performance Evaluation of Security Mechanisms for Web Services. Bachar Alrouh, Gheorghita Ghinea |
| 2009 | A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks. Iuon-Chang Lin, Shu-Yan Huang |
| 2009 | A Provably Secure Certificateless Blind Signature Scheme. Xiaoyuan Yang, Zhongyin Liang, Ping Wei, Junwei Shen |
| 2009 | A RST Invariant Watermarking Scheme Utilizing Support Vector Machine and Image Moments for Synchronization. Jianzhen Wu |
| 2009 | A Rapid Algorithm and its Implementation for Modular Inversion. Baiwen Fu |
| 2009 | A Real-Time Selective Video Encryption Using Context-Key Control. Hung-Min Sun, Muh-Chyi Leu |
| 2009 | A Resistant Secret Sharing Scheme. Chin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin |
| 2009 | A Robust Vehicle Tracking Approach Using Mean Shift Procedure. Huan Shen, Shun Ming Li, Jian Guo Mao, Fang Chao Bo, Fang Pei Li, Hua Peng Zhou |
| 2009 | A Robust Watermark Algorithm for JPEG2000 Images. Hai-ying Gao, Guo-qiang Liu, Xu Li, Yin Xu |
| 2009 | A Role and Activity Based Access Control Model for University Identity and Access Management System. Shuliang Zheng, Doingxing Jiang, Qixin Liu |
| 2009 | A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow. Mengbo Hou, Qiuliang Xu |
| 2009 | A Study on the Algorithm Based on Image Color Correlation Mining. Yongyue Chen, Huosong Xia |
| 2009 | A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System. Xiaorong Cheng, Yan Wei, Xin Geng |
| 2009 | A System for Detecting Unusual Sounds from Sound Environment Observed by Microphone Arrays. Mitsuru Kawamoto, Futoshi Asano, Koichi Kurumatani, Yingbo Hua |
| 2009 | A Two-Description Distributed Video Coding. Anhong Wang, Yao Zhao, Zhihong Li |
| 2009 | A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image Denoising. Weibin Zhang, Wenjuan Zhang |
| 2009 | A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization. Guosheng Cheng, Jianwei Yang |
| 2009 | Access Log Generator for Analyzing Malicious Website Browsing Behaviors. Chu-Hsing Lin, Jung-Chun Liu, Ching-Ru Chen |
| 2009 | Acoustic-Based Security System: Towards Robust Understanding of Emergency Shout. Hiroaki Nanjo, Takanobu Nishiura, Hiroshi Kawano |
| 2009 | Action-Based Access Control for Web Services. Fenghua Li, Wei Wang, Jianfeng Ma, Haoxin Su |
| 2009 | Adaptive Spatially Postprocessing Technique to Remove Blocking Artifacts for DCT Coded Image. Jin Wang, Heechang Kim, Jongho Kim, Jechang Jeong |
| 2009 | Adaptive-Push Peer-to-Peer Video Streaming System Based on Dynamic Unstructured Topology. Xiaodong Shen, Guiguang Ding, Yizheng Chen, Jianmin Wang |
| 2009 | Algebraic Attack to SMS4 and the Comparison with AES. Wen Ji, Lei Hu, Haiwen Ou |
| 2009 | An Accurate Image Juggling Authentication Algorithm. Jianquan Xie, Qing Xie, Chunhua Yang |
| 2009 | An Active Defense Model and Framework of Insider Threats Detection and Sense. Hongbin Zhang, Jianfeng Ma, Yinchuan Wang, Qingqi Pei |
| 2009 | An Adaptable Threshold Decision Method. Meng-Hsiun Tsai, Ming-Hung Wang, Ting-Yuan Chang, Pei-Yan Pai, Yung-Kuan Chan |
| 2009 | An Adaptive Digital Watermarking Algorithm Based on Balanced Multi-wavelet. Ming-Xiang Zang, Na Zhang, Jian-Guo Jiang |
| 2009 | An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems. Xian-Bo He, Li Yang, Xian-Hua Zeng, Gang-yuan Zhang, Xing-qiang Zhao |
| 2009 | An Anti-attack Watermarking Based on Synonym Substitution for Chinese Text. Lu He, Jianbin Lin, Tianzhi Li, Dingyi Fang |
| 2009 | An Approach to Checking SOC Timing Safety. Zhenjun Du, Rong Chen |
| 2009 | An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations. Tien-Chin Wang, Shu-Chen Peng, Shu-Chen Hsu, Jui-Fang Chang |
| 2009 | An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net. Qiuqin Lu, Guangqiu Huang |
| 2009 | An Audio Watermarking Method of Resistance Statistics Attack Based on Psychoacoustic Model. Xiao-li Liu, Shuifa Sun, Jian-Wei Zhu, Ming Jiang, Dan-gui Xie |
| 2009 | An Authenticating Algorithm with Multi-compression Compatible in DCT Domain. Xiaoyuan Yang, Yao Guo, Ke Niu, Xiang Wu |
| 2009 | An Authentication Protocol Applied to RFID Security Systems. Xiaoqing Gong, Yi Wang, Hui Li, Jian He |
| 2009 | An Automated Mechanism of Security Test on Network Protocols. Yahui Yang, Yunfei Chen, Min Xia, Juan Ma |
| 2009 | An Eco-Defending Architecture for Network Security Based on Immuninty and Mobile Agents. Tongrang Fan, Yan Sun, Yongbin Zhao |
| 2009 | An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods. Tzu-Chuen Lu, Ying-Hsuan Huang |
| 2009 | An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks. Chen Chen, Li Hui, Qingqi Pei, Ning Lv, Qingquan Peng |
| 2009 | An Effective Texture Spectrum Descriptor. Xiaosheng Wu, Junding Sun |
| 2009 | An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang |
| 2009 | An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal Vectors. Jing Wang, Xiaola Lin |
| 2009 | An Enhanced Block Mode Selection Method for Surveillance Video Communication. Jie Jiang, Wei Mo, Jianmin Lv |
| 2009 | An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. Chun-Ta Li |
| 2009 | An Extensible and Virtualization-Compatible IDS Management Architecture. Sebastian Roschke, Feng Cheng, Christoph Meinel |
| 2009 | An Identification Method for Transient Capacitive Current of Distribution Network by ICMAC. Jianwen Zhao, Yuanbin Hou |
| 2009 | An Identity-Based Authentication Model for Mobile Agent. Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang |
| 2009 | An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval. Mei Wang, Li Wang |
| 2009 | An Improved Genetic Algorithm for Power Grid. Youchan Zhu, Xueying Guo, Jing Li |
| 2009 | An Improved Image Encryption Scheme Based on Line Maps. Juan Li, Yong Feng, Xuqiang Yang |
| 2009 | An Improved Iris Recognition Method Based on Gray Surface Matching. Dong-Mei Wu, Jiang-Nan Wang |
| 2009 | An Improved SPECK Image Coding Algorithm. Baojun Han, Yan Liu |
| 2009 | An Improved Scheme of Single Sign-on Protocol. Yang Jian |
| 2009 | An Improved Weighted-Feature Clustering Algorithm for K-anonymity. Lijian Lu, Xiaojun Ye |
| 2009 | An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks. Jian Liu, Fangmin Li |
| 2009 | An Improving Technique of Color Histogram in Segmentation-based Image Retrieval. Zhenhua Zhang, Wenhui Li, Bo Li |
| 2009 | An Intrusion Detection System for Network Storage Based on System Calls. Li-zhong Geng, Hui-bo Jia |
| 2009 | An Optimal Blind Signature Padding with Message Recovery. Jingran Wang, Haifeng Qian |
| 2009 | Analysis and Evaluation of Contrast Enhancement Methods in Digital Images. Shen-Chuan Tai, Yi-Ying Chang, Ting-Chou Tsai, Li-Man Liao |
| 2009 | Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu |
| 2009 | Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network. Qunting Yang, Tiegang Gao, Li Fan, Qiaolun Gu |
| 2009 | Analysis the Properties of TLS Based on Temporal Logic of Knowledge. Chao Lv, Hui Li, Jianfeng Ma |
| 2009 | Anomalous Payload Detection System Using Analysis of Frequent Sequential Pattern. Jun Ma, Guanzhong Dai, Jing Zhou |
| 2009 | Anti-protocol Attacks Digital Watermarking Based on Media-Hash and SVD. Jing-pei Wang, Shuifa Sun, Ming Jiang, Dan-gui Xie, Bang Jun Lei |
| 2009 | Application and Research of Mobile E-commerce Security Based on WPKI. Feng Tian, Xiao-bing Han, Ying Wei |
| 2009 | Application of Averaged Learning Subspace Method in MRI Classification. Chuin-Mu Wang, Jau-An Chen, Jui-Hsing Chu |
| 2009 | Application of Bloom Filter for GTP Stateful Inspection in Network Processor. Zhenyu Liu, Weijun Li, Yue Lai |
| 2009 | Application of Particle Swarm Optimization in Fussy Neural Networks. Qingnian Wang, Kun Yan, Xiaofeng Wan, Meiling Yuan |
| 2009 | Application of Rough Set Theory in Coal Gangue Image Process. Xian-Min Ma, Che Liang |
| 2009 | Application of the Fuzzy Entropy Weight in Risk Assessment of the Engineering Project. Xuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong |
| 2009 | Appraisal Model of MIS in Enterprises Based on the Unascertained Measurement. Xuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong |
| 2009 | Assessment of Color Video Quality with Singular Value Decomposition of Complex Matrix. Fuqiang Zhang, Junli Li, Gang Chen, Jiaju Man |
| 2009 | Attacks on a Universal Designated Verifier Signature Scheme. Yanping Li, Liaojun Pang, Yuming Wang |
| 2009 | Audio Digital Signature Algorithm with Tamper Detection. Xiaoyuan Yang, Xiang Wu, Minqing Zhang |
| 2009 | Augmented Addition Operation of Conic Curves over Ring Zn. Guo-jing Li, Tao Wen |
| 2009 | Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC Designs. Yin-Tsung Hwang, Hua-Hsin Luo |
| 2009 | Bearings Fault Diagnosis Based on the Optimal Impulse Response Wavelet. Dan Zhang, Wentao Sui |
| 2009 | Boosting Graph Embedding with Application to Facial Expression Recognition. Lei Xiong, Duyan Bi, Xu Zhou, Shiping Ma |
| 2009 | Browser-Side Countermeasures for Deceptive Phishing Attack. Huajun Huang, Shaohong Zhong, Junshan Tan |
| 2009 | Building Trust Territory in Ad Hoc Networks. Yuan Bai, Xing Zhang, Bin Sun |
| 2009 | C and M: A New Network Coding Scheme for Wireless Networks. Xiaoyan Zhu, Hao Yue, Yumin Wang |
| 2009 | Cepstrum-Based Audio Watermarking Algorithm against the A/D and D/A Attacks. Xiaoming Zhang, Zhaoyang Yu |
| 2009 | Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang |
| 2009 | Collusion-Resilient Fingerprinting Using Cropping and Subsampling. Yueh-Hong Chen, Hsiang-Cheh Huang |
| 2009 | Common Friends Discovery with Privacy and Authenticity. Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun |
| 2009 | Compensating Function of Formant Instantaneous Characteristics in Speaker Identification. Limin Hou, Juanmin Xie |
| 2009 | Constructions of Some Difference-Balanced d-form Functions. Tongjiang Yan, Li Hong |
| 2009 | Contrast Enhancement Method Based on Average Luminance with Weighted Histogram Equalization. Shen-Chuan Tai, Yi-Ying Chang, Kang-Ming Li, Ting-Chou Tsai |
| 2009 | Cost-Benefit Analysis of China's Internet Content Regulation. Qiang Song, Gang Li |
| 2009 | Cramer-Rao Lower Bound for Non-coherent TOA Estimation with Impulse Signal. Jie Liu, Xiaoji Liu, Lin Zheng |
| 2009 | Cryptanalysis of a Knapsack Public Key Cryptosystem. Baocang Wang, Hui Liu, Yupu Hu |
| 2009 | Cryptoanalysis of Two Signcryption Schemes. Jianhong Zhang, Qin Geng |
| 2009 | Curvelet Domain Watermark Detection Using Alpha-Stable Models. Chengzhi Deng, Huasheng Zhu, Shengqian Wang |
| 2009 | DCT-Based Robust Watermarking with Swarm Intelligence Concepts. Hsiang-Cheh Huang, Yueh-Hong Chen, Guan-Yu Lin |
| 2009 | DWT-Based Shot Boundary Detection Using Support Vector Machine. Jun Li, Youdong Ding, Yunyu Shi, Qingyue Zeng |
| 2009 | Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up Table. Jing-Ming Guo, Jia-Jin Tsai |
| 2009 | Deadlock Detection Based on Resource Allocation Graph. Qinqin Ni, Weizhen Sun, Sen Ma |
| 2009 | Defending against UDP Flooding by Negative Selection Algorithm Based on Eigenvalue Sets. Rui Xu, Wen-li Ma, Wen-ling Zheng |
| 2009 | Design and Integration for Background Subtraction and Foreground Tracking Algorithm. Tsung-Han Tsai, Chung-Yuan Lin, De-Zhang Peng, Giua-Hua Chen |
| 2009 | Design of DBA Algorithm in EPON Uplike. Ya-Min Wang, Yan Liu |
| 2009 | Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA. Qiang Gao, Miao Han, Shu-liang Hu, Hai-jie Dong |
| 2009 | Detecting DoS and DDoS Attacks Using Chi-Square. Fang-Yie Leu, Chia-Chi Pai |
| 2009 | Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System. Fang-Yie Leu, Zhi-Yang Li |
| 2009 | Detecting Insider Attacks Using Non-negative Matrix Factorization. Jan Platos, Václav Snásel, Pavel Krömer, Ajith Abraham |
| 2009 | Detecting Stepping-Stone Intruders with Long Connection Chains. Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle |
| 2009 | Detection of Abnormal Sound Using Multi-stage GMM for Surveillance Microphone. Akinori Ito, Akihito Aiba, Masashi Ito, Shozo Makino |
| 2009 | Development of a Java-Oriented Software General Component Library. Han Xiao, Zu-xun Zhang, Qiang Wang, Hua-liang Hu |
| 2009 | Distributed Event-Triggered Trust Management for Wireless Sensor Networks. Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Qingquan Peng |
| 2009 | Distributed Video Coding Based on Multiple Description. Hongxia Ma, Yao Zhao, Chunyu Lin, Anhong Wang |
| 2009 | Domain Administration of Task-role Based Access Control for Process Collaboration Environments. Yahui Lu, Li Zhang |
| 2009 | Dynamic Behavior of SIRS Model with Feedback on Complex Networks. Damin Zhang, Shaohong Cai |
| 2009 | Dynamic Behavior of SIS Epidemic Model with Feedback on Regular Lattic. Damin Zhang, Shaohong Cai |
| 2009 | Dynamically Constrained One-Bit Transform for Motion Vector Estimation. Fu-Kun Chen, Jui-Che Teng, Yue-Dar Jou, Wen-Yuan Liao |
| 2009 | E-government Security Management: Key Factors and Countermeasure. Jin-Fu Wang |
| 2009 | ECC-Cache: A Novel Low Power Scheme to Protect Large-Capacity L2 Caches from Transiant Faults. Guanghui Liu |
| 2009 | Economical Dental Stereoradiography in Digital Era. Hsien-Huang Peter Wu, Shih-Hsin Chang, Ping-Kuo Weng, Soon-Lin Chen |
| 2009 | Efficient Certificate-Based Signature Scheme. Yang Ming, Yumin Wang |
| 2009 | Efficient Protection Scheme for SVC Content Based on Network Coding. Ji Lu, Song Xiao, Chengke Wu |
| 2009 | Emergency Command System for Geologic Disasters Prevention. Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng |
| 2009 | Encrypted Fuzzy Vault Based on Fingerprint. Quan Feng, Fei Su, Anni Cai |
| 2009 | Evaluating Intrusion Detection Systems in High Speed Networks. Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani |
| 2009 | Evaluation and Simulation on the Performance of DHTs Required by P2PSIP. Zengming Tian, Xiangming Wen, Wei Zheng, Yong Sun, Yinbo Cheng |
| 2009 | Exploiting RFC2828 as a Domain Vocabulary for Identifying IT Security Literature. Lidong Wang, Liping Qian |
| 2009 | Facial Expression Recognition Based on Field Programmable Gate Array. Jzau-Sheng Lin, Shao-Han Liu, Wu-Chih Hsieh, Yu-Yi Liao, Hongchao Wang, QingHua Lan |
| 2009 | Fast Fractal Image Coding Using Ambient-Cross Sum of Normalized Block. Gaoping Li |
| 2009 | Forward-Secure Certificate-Based Encryption. Yang Lu, Jiguo Li |
| 2009 | Full System Simulation and Verification Framework. Jing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chung-Ho Chen, Kuen-Jong Lee, Yuan-Hua Chu, Jen-Chieh Yeh, Ying-Chuan Hsiao |
| 2009 | Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes. Ximing Li, Bo Yang, Yubin Guo |
| 2009 | Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls. Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof |
| 2009 | Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection. Anazida Binti Zainal, Den Fairol Samaon, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin |
| 2009 | GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks. Yu Han, Aidong Men, Kan Chang, Ziyi Quan |
| 2009 | Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology. Jin Tian, Yang Qiu, Ankun Lin |
| 2009 | Grounding Grid Corrosion Diagnosis Based on Large Change Sensitivity. Liqiang Liu, Xianjue Luo, Tao Niu, Kai Wang |
| 2009 | Guess and Determine Attack on SOSEMANUK. Lin Ding, Guan Jie |
| 2009 | H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks. Wei Ren, Yi Ren, Hui Zhang |
| 2009 | Hardware/Software Codesign of Resource Constrained Real-Time Systems. Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh |
| 2009 | Hierarchical Distributed Alert Correlation Model. Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang |
| 2009 | Hierarchical Key Agreement Protocols in Group-User Systems. Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen, Pin-You Chen |
| 2009 | Hierarchical Takagi-Sugeno Models for Online Security Evaluation Systems. Ajith Abraham, Crina Grosan, Hongbo Liu, Yuehui Chen |
| 2009 | History and Future Information Based Trust Model in C2C E-commerce. Shaomin Zhang, Xiayan Zhang, Baoyi Wang |
| 2009 | Human Visual System Based Watermarking for Color Images. Kuo-Cheng Liu |
| 2009 | Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit Streams. Min Li, Bo Wang |
| 2009 | ID-Based Non-interactive Deniable Authentication Protocol. Wei-Min Shi |
| 2009 | ISAR Imaging of High Speed Moving Targets Based-on Radon Transform. Feng Tong-an, He Jin, Luo Ying |
| 2009 | Ideal Perfect Multilevel Threshold Secret Sharing Scheme. Changlu Lin, Lein Harn, Dingfeng Ye |
| 2009 | Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce. Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu |
| 2009 | Image Compression Algorithm Based on Decreasing Bits Coding. Shengbing Che, Zuguo Che, Haiyang Wang, Qiangbo Huang |
| 2009 | Image De-noising Based on Nonlocal Diffusion Tensor. Han Yu |
| 2009 | Image Denoising and Magnification via Kernel Fitting and Modified SVD. Benyong Liu, Xiang Liao |
| 2009 | Image Encryption with Discrete Fractional Cosine Transform and Chaos. Lin Zhang, Jianhua Wu, Nanrun Zhou |
| 2009 | Image Enhancement Based on Nonsubsampled Contourlet Transform. Yuxin Ma, Jiancang Xie, Jungang Luo |
| 2009 | Image Moment Based Registration Scheme Utilizing Support Vector Machine. Jianzhen Wu |
| 2009 | Image Retrieval Based on 2D Histogram of Interest Points. Fan-jie Meng, Baolong Guo, Lei Guo |
| 2009 | Image Retrieval Based on Character-Matching Technology. Shan Zhao, Jing Liu |
| 2009 | Image Retrieval Based on Composite of Mean Shift and Assignment Model. Wenbing Chen, Qizhou Li, Jianwei Yang |
| 2009 | Image Retrieve Based on Primary Clusters. Wenbing Chen, Jianwei Yang, Wangwei |
| 2009 | Image Watermarking Using Phase-Shifting Digital Holography Embedded in the Wavelet Domain. Mn-Ta Lee, Hsuan T. Chang, Mu-Liang Wang |
| 2009 | Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting. Chung-Huang Yang, Shih-Yi Tu, Pei-Hua Yen |
| 2009 | Implementing and Testing Producer-Consumer Problem Using Aspect-Oriented Programming. Yang Zhang, Jingjun Zhang, Dongwen Zhang |
| 2009 | Improvement of Speaker Vector-Based Speaker Verification. Naoki Tadokoro, Tetsuo Kosaka, Masaharu Katoh, Masaki Kohda |
| 2009 | Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. Kuo-Hui Yeh, Nai-Wei Lo |
| 2009 | Improving the Modified Matrix Encoding on Steganography Method. YongSoo Choi, Hyoung Joong Kim |
| 2009 | Information Security Monitoring System Based on Data Mining. Guangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng |
| 2009 | Information Security Routing Protocol in the WSN. Li Wei, Chen Ming, Li Mingming |
| 2009 | Information Security Solution Decision-Making Based on Entropy Weight and Gray Situation Decision. Lin Chen, Li Li, Yong Hu, Ke Lian |
| 2009 | Information Security Wireless Sensor Grid. Li Mingming, Li Baiping, Li Wei, Chen Lei |
| 2009 | Infrared Face Recognition Based on Radiant Energy and Curvelet Transformation. Zhihua Xie, Shiqian Wu, Guodong Liu, Zhijun Fang |
| 2009 | Infrared Small Weak Target Detection via HOSA. Gaoyu Zhang |
| 2009 | Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. Yu Zhang, Xingshe Zhou, Yee Wei Law, Marimuthu Palaniswami |
| 2009 | Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation. Maheyzah Md Siraj, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim |
| 2009 | Interactive Visualisation of 3D City Models Based on Adaptive Streaming of 3D-GIS Data. Zhenping Zhang, Jitao Fang, Runhuan Jing |
| 2009 | Intra-mode Dependent Coding Method for Image Compression. Yung-Chiang Wei, Jui-Che Teng, Chien-Wen Chung |
| 2009 | Intrusion Detection Based on One-class SVM and SNMP MIB Data. Cui-Mei Bao |
| 2009 | Joint Entropy Analysis Model for DDoS Attack Detection. Hamza Rahmani, Nabil Sahli, Farouk Kamoun |
| 2009 | Key Binding Based on Biometric Shielding Functions. Huixian Li, Man Wang, Liaojun Pang, Weidong Zhang |
| 2009 | Known Signature Attack of ID-Based Multisignature Schemes. Wu-Chuan Yang, Jhih-Syue Jhou |
| 2009 | Layer Key Management Scheme on Wireless Sensor Networks. Qingqi Pei, Lei Wang, Hao Yin, Liaojun Pang, Hong Tang |
| 2009 | Lossy Compression of CFA Image Based on Multiwavelet Packet. Jing Zheng, Qigui Zhang, Xuemei Zhang |
| 2009 | Low Bit Rate ROI-Based SAR Image Compression. Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang |
| 2009 | Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape Models. Jiann-Shu Lee, Hsing-Hsien Wu, Ming-Zheng Yuan |
| 2009 | MRDWA: Multi-role Dynamic Weighting Aggregation Algorithm in Event Driven Wireless Sensor Networks. Ying Chen, Jian Shu, Hong Liu, Linlan Liu, Jiajie Gong |
| 2009 | Majority-Parity-Guided Watermarking for Block-Truncated Images. Jing-Ming Guo, Yun-Fu Liu |
| 2009 | Membership-Based Access Control for Trust Negotiation in Open Systems. Ruo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo |
| 2009 | Microarray Image Segmentation Using Region Growing Algorithm and Mathematical Morphology. Ping Ye, Guirong Weng |
| 2009 | Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate. Junhua Chen, Shengjun Wei |
| 2009 | Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks. Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou |
| 2009 | Moving Object Tracking Using Symmetric Mask-Based Scheme. Chih-Hsien Hsia, Ding-wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu |
| 2009 | Multi-party Non-repudiation Protocol with Different Message Exchanged. Yanping Li, Liaojun Pang |
| 2009 | Multimodal Biometric Recognition Based on Complex KFDA. Zhifang Wang, Qiong Li, Xiamu Niu, Christoph Busch |
| 2009 | Multiresolution Target Detection in Wavelet Domain for SAR Imagery. Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang |
| 2009 | National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations. Yanzhao Li |
| 2009 | Network Security Situation Awareness Using Exponential and Logarithmic Analysis. Xiaobin Tan, Guihong Qin, Yong Zhang, Ping Liang |
| 2009 | Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform. Xiaorong Cheng, Kun Xie, Dong Wang |
| 2009 | New Greedy Algorithm for Computing Double-Base Chains. Ming Li, Kunpeng Wang |
| 2009 | New Strategy of Efficient SPA-resistant Exponentiations. Wu-Chuan Yang |
| 2009 | Non-interactive Evaluation of Encrypted Elementary Functions. Liang Chen, Chengmin Gao, Yong Xu |
| 2009 | Nonlocal Curvature-Driven Diffusion Model for Image Inpainting. Li Li, Han Yu |
| 2009 | Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling. Enke Li, Shangqian Liu, Shimin Yin, Xiaoning Fu |
| 2009 | Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVC. Kan Chang, Bo Yang, Wenhao Zhang |
| 2009 | Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme. Fanyu Kong, Jia Yu |
| 2009 | Octa-Log-Polar Fourier Transform for Image Registration. Xianxiang Wu, Bao-Long Guo, Juan Wang |
| 2009 | Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264. Zhaopeng Cui, Dujuan Wang, Guang Jiang, Chengke Wu |
| 2009 | On Security Notions for Verifiably Encrypted Signature. Xu An Wang, Xiaoyuan Yang, Qingquan Peng |
| 2009 | One-way Hash Function Construction Based on Conservative Chaotic Systems. Qing-Hua Zhang, Han Zhang, Zhao-Hui Li |
| 2009 | Optimal Combination of H.264/AVC Coding Tools for Mobile Multimedia Broadcasting Application. Yu Han, Bo Yang, Kan Chang, Ziyi Quan |
| 2009 | Optimal Information Rates of Novel Graph Based Access Structures. Mingkun Yang |
| 2009 | Organizational Barriers to the Implementation of Security Engineering. Bryan Stewart Cline |
| 2009 | Paper Study of Embedded System Design Based on RFID Securities. Ling-Feng Shi, Xin-Quan Lai, Bao-Long Guo |
| 2009 | Parallel 3-Pixel Labeling Method and its Hardware Architecture Design. Shyue-Wen Yang, Ming-Hwa Sheu, Jun-Jie Lin, Chuang-Chun Hu, Tzu-Hsiung Chen, Shau-Yin Tseng |
| 2009 | Performance Analysis of Analog LMS Multiuser Receiver in Transmitted-Reference UWB System. Lin Zheng, Wei Ge, Hongbing Qiu |
| 2009 | Performance Analysis of Anonymous Communication System 3-Mode Net. Kazuhiro Kono, Shinnosuke Nakano, Yoshimichi Ito, Noboru Babaguchi |
| 2009 | Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM). Xiao Gang, Jiancang Xie |
| 2009 | Position Verification in Multi-hop Vehicular Networks. Deepa Susan Rajan, Chetan Yeole, Harsha Nakade, Huirong Fu, Ye Zhu |
| 2009 | Practical Quantum No-key Protocol with Identification. Yang Wu, Li Yang |
| 2009 | Prediction-Based Watermarking Schemes for DCT-Based Image Coding. Jing-Ming Guo, Chia-Hao Chang |
| 2009 | Privacy Protection for Speech Information. Kazumasa Yamamoto, Seiichi Nakagawa |
| 2009 | Privacy Protection in On-line Shopping for Electronic Documents. Yu-Chi Chen, Gwoboa Horng, Chang-Chin Huang |
| 2009 | Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009 |
| 2009 | Proxy Re-encryption Scheme Based on SK Identity Based Encryption. Xu An Wang, Xiaoyuan Yang |
| 2009 | Quantum Secure Direct Communication Based on Partially Entangled States. Xin-yuan Yang, Zhi Ma, Xin Lu, Hong-Xin Li |
| 2009 | RSA/Shift Secured IFFT/FFT Based OFDM Wireless System. D. Rajaveerappa, Abdelsalam Almarimi |
| 2009 | Range-Free Fast and Rough Nodes Localization Algorithm in Wireless Sensor Networks. Wang Mei, Xiaochuan Sun, Zheng Hao |
| 2009 | Reducing Specular Reflection Components of Chrome-Plated Surface with Varying Light Direction. Li Chang Jiang, Zhong Zhang, Tetsuo Miyake, Takashi Imamura, Hisanaga Fujiwa |
| 2009 | Redundant Ridgelet Transform and its Application to Image Processing. Yan Li, Shengqian Wang, Chengzhi Deng |
| 2009 | Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008. Xiao-Long Ma, Zhiwei Wang, Lize Gu, Yixian Yang |
| 2009 | Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece Measurement. Zhanli Li, Yuan Wang |
| 2009 | Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel. Xuedou Yu |
| 2009 | Research on Algorithm of Digital Filtering Based on Video Information Security. Jin Tian, Yang Qiu, Liuyu Qian |
| 2009 | Research on Attack Intention Recognition Based on Graphical Model. Wu Peng, Zhigang Wang, Junhua Chen |
| 2009 | Research on Early Warning for Worm Propagation Based on Area-Alert-Level. Lina Zhu, Chao-yi Sun, Li Feng |
| 2009 | Research on Equiponderant Forwarding within Multi-nexthop Interfaces. Ning-ning Liang, Xuan-Yong Zhu |
| 2009 | Research on Gravity-Based Anomaly Intrusion Detection Algorithm. Baoyi Wang, Ranran Jin, Shaomin Zhang, Xiaomin Zhao |
| 2009 | Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain. Pang Baomao, Shi Haoshan |
| 2009 | Research on Integration of Safety Analysis in Model-Driven Software Development. Feng Chen, Weihua Li, Dingyi Fang, Xiaojiang Chen |
| 2009 | Research on Intrinsic Safety Behavior of Inductor-Disconnected-Discharge of Boost DC-DC Converters. Shulin Liu, Li Yan |
| 2009 | Research on Intrusion Detection Based on an Improved SOM Neural Network. Dianbo Jiang, Yahui Yang, Min Xia |
| 2009 | Research on Model of Trust Degrees for PKI. Mingde Zhang, Xuefeng Zheng, Wensheng Yang, Shuwang Lv, Qingguo Zhang |
| 2009 | Research on New Classification Methods of Remote Sensing of Mass Ingredient without Vegetation of Hei Shan Gorge in Yellow River Basin. Shudong Wang, Xiaohua Wang |
| 2009 | Research on Quantitative Evaluation for Integrity. Lihua Yin, Yunchuan Guo |
| 2009 | Research on Security Architecture for Defending Insider Threat. Hui Wang, Heli Xu, Bibo Lu, Zihao Shen |
| 2009 | Research on System of Chinese Document Copy Detection. Yuzhu Cheng, Chunrong Qiu, Weiqi Tang, Wenda Deng |
| 2009 | Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation. Yang Qiu, Jin Tian, Liuyu Qian |
| 2009 | Researches on Integrating Database Access Control and Privacy Protection. Yonghong Yu |
| 2009 | Resistance DPA of RSA on Smartcard. Ji-fang Jin, Er-hong Lu, Xian-wei Gao |
| 2009 | Reversible Information Hiding Considering Hierarchical Access Control. Masaaki Fujiyoshi, Seungwu Han, Hitoshi Kiya |
| 2009 | Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images. Cheng-Hsing Yang, Cheng-Ta Huang, Shiuh-Jeng Wang |
| 2009 | Risk Assessment Model on the Internal Corporate Governance Based on the SPA. Jibin Ma, Huiling Gu, Yonghao Sun, Xujie Hu |
| 2009 | SAR Image Target Recognition Based on Hu Invariant Moments and SVM. Fu Yan, Wang Mei, Zhang Chunqin |
| 2009 | Scanning Task Scheduling Strategy in Distributed Vulnerability Detection System. Baoyi Wang, Jing Li, Shaomin Zhang, Xueying Guo |
| 2009 | Secure Access Control Scheme of RFID System Application. Yu-Chih Huang |
| 2009 | Secure Constructing Bluetooth Scatternet Based on BTCP. Xin Yu, Yuping Wang |
| 2009 | Secure Disk with Authenticated Encryption and IV Verification. Fangyong Hou, Nong Xiao, Fang Liu, Hongjun He |
| 2009 | Security Analysis of the Kerberos Protocol Using BAN Logic. Kai Fan, Hui Li, Yue Wang |
| 2009 | Security Enhancement of the Authentication Protocol for RFID Systems. Yung-Cheng Lee, Wen-Chung Kuo, Yi-Chih Hsieh, Ta-Cheng Chen |
| 2009 | Security Threats and Countermeasures for Intra-vehicle Networks. David Wampler, Huirong Fu, Ye Zhu |
| 2009 | Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. Caimei Wang, Zhengmao Li |
| 2009 | Shibboleth Access for Resources on the National Grid Service (SARoNGS). Xiao Dong Wang, Mike Jones, Jens Jensen, Andrew Richards, David Wallom, Tiejun Ma, Robert Frank, David Spence, Steven Young, Claire Devereux, Neil Geddes |
| 2009 | Sinusoidal Signals Pattern Based Robust Video Watermarking in the 3D-CWT Domain. Cheng Deng, Jie Li, Meng Jia, Xinbo Gao |
| 2009 | Small Moving Infrared Target Detection Algorithm under Low SNR Background. Kai Wang, Yan Liu, Xiaowei Sun |
| 2009 | Soft DSP Design Methodology of Face Recognition System on Nios II Embedded Platform. Hao-Chung Shih, Chian C. Ho |
| 2009 | Space Time Block Coded MIMO System with Redundant Antennas. Feng Wang, Xia Liu, Marek E. Bialkowski |
| 2009 | Study on Centralized Authorization Model Supporting Multiple Access Control Models. Shaomin Zhang, Haiyan Zhang, Baoyi Wang |
| 2009 | Study on Ultrasonic Ranging System Design. Lihua Deng |
| 2009 | Study on the Control of a Two-wheeled Unstable Vehicle Based on Sensitivity Analysis. Yanzhao Li, Shengli Qu, Jiahui Zhu, Jianqin Sun |
| 2009 | Support Vector Machine Based on Possibility Degrees and Fault Diagnosis. Du Jingyi, Wang Mei, Cai Wenhao |
| 2009 | Swarm Intelligence: Ant-Based Robot Path Planning. Jing Zhou, Guanzhong Dai, De-Quan He, Jun Ma, Xiao-Yan Cai |
| 2009 | Testability Analysis of Grounding Grids Using Network Transformation. Tao Niu, Yingjiao Zhang, Debo Zhang, Liqiang Liu, Xianjue Luo |
| 2009 | Texture Feature Analysis on Erosion and Wear in Artillery Chamber. Xiao-ning Fu, En-ke Li, Wen-jing Gao |
| 2009 | The Application and Study of Graph Cut in Motion Segmentation. Ye Hou, Bao-Long Guo, Jeng-Shyang Pan |
| 2009 | The Application on the Evaluation of Quality of Universities Undergraduate Theory Teaching Work Based on Artificial Neural Network. Jun-qiao Qi, Chang-Long Wang, Yan-ming Qi |
| 2009 | The Design and Implementation of Security Defense Technology Based on Mandatory Running Control. Jizhen Liu, Kehe Wu, Tong Zhang, Gang Ma |
| 2009 | The Detection of Bi-frequency Weak Signal Based on Chaos and Correlation. Mei Wang, Huifeng Zhang, Yong Yan |
| 2009 | The Improving of IKE with PSK for Using in Mobile Computing Environments. Dingguo Yu, Nan Chen |
| 2009 | The Method of Equalization Based on Iterative Interference Cancellation for SCCPM System. Zhao Wusheng, Fu Yongqing, Han Zhixue |
| 2009 | The Research of NULL Convention Logic Circuit Computing Model Targeted at Block Cipher Processing. Yalei Cui, Zibin Dai |
| 2009 | The Research of Simulation for Network Security Based on System Dynamics. Hongshan Kong, Mingqing Zhang, Jun Tang, Changyuan Luo |
| 2009 | The Research on the Measurement of China Internet Illegal and Harmful Content. Qiang Song, Gang Li |
| 2009 | The Reversible Network Cascade Based on Reversible Logic Gate Coding Method. Hui Li, Zhijin Guan, Shanli Chen, Yuxin Chen |
| 2009 | The SOBER Family Ciphers Reconfigurable Processing Architecture Design. Zhiyuan Wang, Jianhua Huang, Ziming Guan |
| 2009 | The Sync Tracing Based on Improved Genetic Algorithm Neural Network. Yuanbin Hou, Chunfeng Song, Ning Li |
| 2009 | The Testing and Evaluating System for the Security Operating System Based on the Mechanism of Keyword-Driven. Xing Liu, Yan Li, Mian Cai, Ying Guo |
| 2009 | Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression. Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath, Zuraini Ismail |
| 2009 | Threats to Health Information Security. Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail |
| 2009 | Towards Provably Secure On-demand Source Routing in MANET. Liqiang Mao, Jianfeng Ma, Xuewen Dong |
| 2009 | Towards Secure Content Based Dissemination of XML Documents. Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad |
| 2009 | Trusted Computing Based Mobile DRM Authentication Scheme. Zhen Yang, Kefeng Fan, Yingxu Lai |
| 2009 | Two Efficient Fragile Web Page Watermarking Schemes. Peng Sun, Hongtao Lu |
| 2009 | Universal Steganalysis Based on Statistical Models Using Reorganization of Block-based DCT Coefficients. Shaohui Liu, Lin Ma, Hongxun Yao, Debin Zhao |
| 2009 | Universal Steganalysis to Images with WBMC Model. Xiaoyuan Yang, Shifeng Wang, Jia Liu |
| 2009 | Video Identification Using Spatio-temporal Salient Points. Yue-Nan Li, Zhe-Ming Lu |
| 2009 | Visibility Estimation Based on Mean Shift. Wenbing Chen, Xiaolei Zhang, Jianwei Yang |
| 2009 | W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks. Zhanyong Tang, Rui Qi, Dingyi Fang, Yangxia Luo |
| 2009 | Watermarking Relational Databases for Ownership Protection Based on DWT. Chuanxian Jiang, Xiaowei Chen, Zhi Li |
| 2009 | Waveform Analysis Mathematic Based on Ultrasonic Displacement Measurement. Yuhui Wang, Ju Dai |
| 2009 | Webpage Encryption Based on Polymorphic Javascript Algorithm. Bai Zhongying, Qin Jiancheng |
| 2009 | Whole Frame Loss Recovery Algorithm for H.264 Decoders. Min Li, Bo Wang |
| 2009 | Windows Memory Analysis Based on KPCR. Ruichao Zhang, Lianhai Wang, Shuhui Zhang |
| 2009 | Words Clustering Based on Keywords Indexing from Large-scale Categorization Corpora. Liu Hua |
| 2009 | Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks. Ching-Lung Chang, Jia-Yi Syu, Yuan-Sun Chu |
| 2009 | Zero-Collision RFID Tags Identification Based on CDMA. Lih-Chyau Wuu, Yen-Ju Chen, Chi-Hsiang Hung, Wen-Chung Kuo |
| 2009 | f8 Keystream Generator with SMS4 as Core Algorithm. Wang Yingsong, Chen Wei |