| 2007 | Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers Yuping Wang, Yiu-ming Cheung, Hai-Lin Liu |
| 2006 | A Centralized Network Design Problem with Genetic Algorithm Approach. Gengui Zhou, Zhenyu Cao, Jian Cao, Zhiqing Meng |
| 2006 | A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. JeaHoon Park, Hoon-Jae Lee, JaeCheol Ha, YongJe Choi, Howon Kim, Sang-Jae Moon |
| 2006 | A Feature Selection Algorithm Based on Discernibility Matrix. Fuyan Liu, Shaoyi Lu |
| 2006 | A Further Discussion on Convergence Rate of Immune Genetic Algorithm to Absorbed-State. Xiaoping Luo, Wenyao Pang, Ji Huang |
| 2006 | A Hierarchical Key Distribution Scheme for Conditional Access System in DTV Broadcasting. Mengyao Zhu, Ming Zhang, Xiaoling Chen, Ding Zhang, Zhijie Huang |
| 2006 | A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks. Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, Jianping Yu, Xinguo Lu |
| 2006 | A Load Scattering Algorithm for Dynamic Routing of Automated Material Handling Systems. Alex K. S. Ng, Janet Efstathiou, Henry Y. K. Lau |
| 2006 | A Multi-classification Method of Temporal Data Based on Support Vector Machine. Zhiqing Meng, Lifang Peng, Gengui Zhou, Yihua Zhu |
| 2006 | A New Model Based Multi-objective PSO Algorithm. Jingxuan Wei, Yuping Wang |
| 2006 | A New Multi-objective Evolutionary Optimisation Algorithm: The Two-Archive Algorithm. Kata Praditwong, Xin Yao |
| 2006 | A New Parallel Multiplier for Type II Optimal Normal Basis. Chang Han Kim, Yongtae Kim, Sung Yeon Ji, IlHwan Park |
| 2006 | A New Schema Survival and Construction Theory for One-Point Crossover. Liang Ming, Yuping Wang |
| 2006 | A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen |
| 2006 | A Novel Optimization Strategy for the Nonlinear Systems Identification. Xin Tan, Huaqian Yang |
| 2006 | A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication. Sung Bum Pan, Daesung Moon, Kichul Kim, Yongwha Chung |
| 2006 | A Watershed Algorithmic Approach for Gray-Scale Skeletonization in Thermal Vein Pattern Biometrics. Lingyu Wang, Graham Leedham |
| 2006 | About the Time Complexity of Evolutionary Algorithms Based on Finite Search Space. Lixin Ding, Yingzhou Bi |
| 2006 | Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML. Dong Seong Kim, Taek-Hyun Shin, Byungil Lee, Jong Sou Park |
| 2006 | Adaptive Parallel Immune Evolutionary Strategy. Cheng Bo, Zhenyu Guo, Binggang Cao, Junping Wang |
| 2006 | An Analysis About the Asymptotic Convergence of Evolutionary Algorithms. Lixin Ding, Jinghu Yu |
| 2006 | An Efficient Algorithm for Clustering Search Engine Results. Hui Zhang, Bin Pang, Ke Xie, Hui Wu |
| 2006 | An Efficient Anonymous Fingerprinting Protocol. Bo Yang, Piyuan Lin, Wenzheng Zhang |
| 2006 | An Efficient Anonymous Registration Scheme for Mobile IPv4. Xuefei Cao, Weidong Kou, Huaping Li, Jie Xu |
| 2006 | An Efficient Device Authentication Protocol Using Bioinformatic. Yoon-Su Jeong, Bong-Keun Lee, Sang Ho Lee |
| 2006 | An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection. Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko |
| 2006 | An Efficient and Secure RFID Security Method with Ownership Transfer. Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
| 2006 | An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. SeongHan Shin, Kazukuni Kobara, Hideki Imai |
| 2006 | An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting Technique. Jin Wook Shin, Ju Cheng Yang, Sook Yoon, Dong Sun Park |
| 2006 | An Improved Ant Colony System and Its Application. Xiangpei Hu, Qiulei Ding, Yongxian Li, Dan Song |
| 2006 | An Improved Entropy Function and Chaos Optimization Based Scheme for Two-Dimensional Entropic Image Segmentation. Cheng Ma, Chengshun Jiang |
| 2006 | An Improved Particle Swarm Optimizer for Truss Structure Optimization. Lijuan Li, Zhibin Huang, Feng Liu |
| 2006 | An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices. Qingqi Pei, Kefeng Fan, Jinxiu Dai, Jianfeng Ma |
| 2006 | Binary Sequences with Three and Four Level Autocorrelation. Ying Cai, Zhen Han |
| 2006 | CGA: Chaotic Genetic Algorithm for Fuzzy Job Scheduling in Grid Environment. Dan Liu, Yuanda Cao |
| 2006 | Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim |
| 2006 | Collision-Resilient Multi-state Query Tree Protocol for Fast RFID Tag Identification. Jae-Min Seol, Seong-Whan Kim |
| 2006 | Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. Jin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia |
| 2006 | DT-CWT Feature Combined with ONPP for Face Recognition. Yuehui Sun, Minghui Du |
| 2006 | Discriminatively Learning Selective Averaged One-Dependence Estimators Based on Cross-Entropy Method. Qing Wang, Chuan-Hua Zhou, Bao-Hua Zhao |
| 2006 | Edge Detection Based on Mathematical Morphology and Iterative Thresholding. Xiangzhi Bai, Fugen Zhou |
| 2006 | Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto |
| 2006 | Enhanced Security Scheme for Managing Heterogeneous Server Platforms. Jiho Kim, Duhyun Bae, Sehyun Park, Ohyoung Song |
| 2006 | Estimation of Source Signals Number and Underdetermined Blind Separation Based on Sparse Representation. Ronghua Li, Beihai Tan |
| 2006 | Face Pose Estimation and Synthesis by 2D Morphable Model. Li Yingchun, Guangda Su |
| 2006 | Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network. Zhu Lei, DaeHun Nyang, KyungHee Lee, Hyotaek Lim |
| 2006 | Feature Extraction Using Histogram Entropies of Euclidean Distances for Vehicle Classification. Ming Bao, Luyang Guan, Xiaodong Li, Jing Tian, Jun Yang |
| 2006 | Feature Weighted Rival Penalized EM for Gaussian Mixture Clustering: Automatic Feature and Model Selections in a Single Paradigm. Yiu-ming Cheung, Hong Zeng |
| 2006 | Fingerprint Matching Using Invariant Moment Features. Ju Cheng Yang, Jin Wook Shin, Dong Sun Park |
| 2006 | Forward Secure Threshold Signature Scheme from Bilinear Pairings. Jia Yu, Fanyu Kong, Rong Hao |
| 2006 | Full-Space LDA With Evolutionary Selection for Face Recognition. Xin Li, Bin Li, Hong Chen, XianJi Wang, Zhenquan Zhuang |
| 2006 | Fuzzy Q-Map Algorithm for Reinforcement Learning. YoungAh Lee, SeokMi Hong |
| 2006 | Game Model Based Co-evolutionary Algorithm and Its Application for Multiobjective Nutrition Decision Making Optimization Problems. Gaoping Wang, Liyuan Bai |
| 2006 | Gene Selection Using Wilcoxon Rank Sum Test and Support Vector Machine for Cancer Classification. Chen Liao, Shutao Li, Zhiyuan Luo |
| 2006 | General Particle Swarm Optimization Based on Simulated Annealing for Multi-specification One-Dimensional Cutting Stock Problem. Xianjun Shen, Yuanxiang Li, Bojin Zheng, Zhifeng Dai |
| 2006 | Generalization of the Selective-ID Security Model for HIBS Protocols. Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang |
| 2006 | Genetic Algorithm and Pareto Optimum Based QoS Multicast Routing Scheme in NGI. Xingwei Wang, Pengcheng Liu, Min Huang |
| 2006 | Hardware/Software Co-design of a Secure Ubiquitous System. Masa-Aki Fukase, Hiroki Takeda, Tomoaki Sato |
| 2006 | ID-Based ( Fagen Li, Yupu Hu, Shuanggen Liu |
| 2006 | Identity-Based Key-Insulated Signature Without Random Oracles. Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma |
| 2006 | Image Denoising Based on Wavelet Support Vector Machine. Shaoming Zhang, Ying Chen |
| 2006 | Image-Adaptive Spread Transform Dither Modulation Using Human Visual Model. Xinshan Zhu |
| 2006 | Image-Adaptive Watermarking Using the Improved Signal to Noise Ratio. Xinshan Zhu |
| 2006 | Improvement of Film Scratch Inpainting Algorithm Using Sobel Based Isophote Computation over Hilbert Scan Line. Ki-Hong Ko, Seong-Whan Kim |
| 2006 | Information Assurance Evaluation for Network Information Systems. Xin Lü, Zhi Ma |
| 2006 | Knowledge Structure on Virus for User Education. Madihah Saudi, Nazean Jomhari |
| 2006 | Labeling of Human Motion by Constraint-Based Genetic Algorithm. Fuyuan Hu, Hau-San Wong, Zhi Qiang Liu, Hui-yang Qu |
| 2006 | Learning SVM with Varied Example Cost: A Chan-Yun Yang, Che-Chang Hsu, Jr-Syu Yang |
| 2006 | Linear Programming Relax-PSO Hybrid Bound Algorithm for a Class of Nonlinear Integer Programming Problems. Yuelin Gao, Chengxian Xu, Jimin Li |
| 2006 | Linkability Analysis of Some Blind Signature Schemes. Jianhong Zhang, Jian Mao |
| 2006 | Locally Weighted LS-SVM for Fuzzy Nonlinear Regression with Fuzzy Input-Output. Dug Hun Hong, Changha Hwang, JooYong Shim, Kyung Ha Seok |
| 2006 | Low-Cost Authentication Protocol of the RFID System Using Partial ID. Yong-Zhen Li, Yoon-Su Jeong, Ning Sun, Sang Ho Lee |
| 2006 | Modeling and Simulation for Security Risk Propagation in Critical Information Systems. Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik |
| 2006 | Molecular Diagnosis of Tumor Based on Independent Component Analysis and Support Vector Machines. Shulin Wang, Huowang Chen, Ji Wang, Dingxing Zhang, Shutao Li |
| 2006 | Multi-agent Coordination Schemas in Decentralized Production Systems. Gang Li, Yongqiang Li, Linyan Sun, Ping Ji |
| 2006 | Multiagent Search Strategy for Combinatorial Optimization Problems in Ant Model. SeokMi Hong, Seunggwan Lee |
| 2006 | Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Models. Kjetil Haslum, André Årnes |
| 2006 | Network Anomalous Attack Detection Based on Clustering and Classifier. Hongyu Yang, Feng Xie, Yi Lu |
| 2006 | Neurodynamic Analysis for the Schur Decomposition of the Box Problems. Quanju Zhang, Fuye Feng, Zhenghong Wei |
| 2006 | New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory. Boyun Zhang, Jianping Yin, Jingbo Hao, Shulin Wang, Dingxing Zhang |
| 2006 | New Radial Basis Function Neural Network Training for Nonlinear and Nonstationary Signals. Kah Phooi Seng, Li-Minn Ang |
| 2006 | Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment. Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyung Kim, Doo-Kwon Baik |
| 2006 | Performance Analysis of Cooperative Hopfield Networks for Stereo Matching. Wenhui Zhou, Zhiyu Xiang, Weikang Gu |
| 2006 | Population-Based Extremal Optimization with Adaptive Lévy Mutation for Constrained Optimization. Min-Rong Chen, Yong-Zai Lu, Genke Yang |
| 2006 | Practical Password-Based Authenticated Key Exchange Protocol. Shuhua Wu, Yuefei Zhu |
| 2006 | Precise Eye Localization with AdaBoost and Fast Radial Symmetry. Wencong Zhang, Hong Chen, Peng Yao, Bin Li, Zhenquan Zhuang |
| 2006 | Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. Jin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang |
| 2006 | Range Image Based Classification System Using Support Vector Machines. Seyed Eghbal Ghobadi, Klaus Hartmann, Otmar Loffeld, Wolfgang Weihs |
| 2006 | Real-Time Expression Recognition System Using Active Appearance Model and EFM. Kyoung-Sic Cho, Yong-Guk Kim, Yang-Bok Lee |
| 2006 | Research on a Novel Hashing Stream Cipher. Yong Zhang, Xiamu Niu, Juncao Li, Chun-ming Li |
| 2006 | Secure Password Authentication for Distributed Computing. Seung Wook Jung, Souhwan Jung |
| 2006 | Secure and Efficient Trust Negotiation. Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang |
| 2006 | Securing Overlay Activities of Peers in Unstructured P2P Networks. Jun-Cheol Park, Geonu Yu |
| 2006 | Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing. Niansheng Liu, Donghui Guo |
| 2006 | Security Contexts in Autonomic Systems. Kaiyu Wan, Vasu S. Alagar |
| 2006 | Security and Privacy on Authentication Protocol for Low-Cost RFID. Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang Ho Lee |
| 2006 | Seeker Optimization Algorithm. Chaohua Dai, Yunfang Zhu, Weirong Chen |
| 2006 | Senior Executives Commitment to Information Security - from Motivation to Responsibility. Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo Savola, Juha Röning |
| 2006 | Simulation and Analysis of DDoS in Active Defense Environment. Zhongwen Li, Yang Xiang, Dongsheng He |
| 2006 | Software Agents Action Securities. Vojislav Stojkovic, Hongwei Huo |
| 2006 | Spatial Data Mining with Uncertainty. Binbin He, Cuihua Chen |
| 2006 | Structure-Based Rule Selection Framework for Association Rule Mining of Traffic Accident Data. Rangsipan Marukatat |
| 2006 | Study of the Wavelet Basis Selections. Hua Cui, Guoxiang Song |
| 2006 | Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking. Vidyasagar M. Potdar, Song Han, Elizabeth Chang, Chen Wu |
| 2006 | Subspace KDA Algorithm for Non-linear Feature Extraction in Face Identification. Wen-Sheng Chen, Pong Chi Yuen, Jian-Huang Lai |
| 2006 | Survey of Distance Measures for NMF-Based Face Recognition. Yun Xue, Chong Sze Tong, Weipeng Zhang |
| 2006 | Ternary Tree Based Group Key Management in Dynamic Peer Networks. Wei Wang, Jianfeng Ma, Sang-Jae Moon |
| 2006 | Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec. Misun Moon, Dong Seong Kim, Jong Sou Park |
| 2006 | Towards a Management Paradigm with a Constrained Benchmark for Autonomic Communications. Frank Chiang, Robin Braun |
| 2006 | Two Evolutionary Methods for Learning Bayesian Network Structures. Alain Delaplace, Thierry Brouard, Hubert Cardot |
| 2006 | Two-Phase Quantum Based Evolutionary Algorithm for Multiple Sequence Alignment. Hongwei Huo, Vojislav Stojkovic |
| 2006 | Using Evolving Agents to Critique Subjective Music Compositions. Chuen-Tsai Sun, Ji-Lung Hsieh, Chung-Yuan Huang |
| 2006 | Using Hybrid Hadamard Error Correcting Output Codes for Multi-class Problem Based on Support Vector Machines. Shilei Huang, Xiang Xie, Jingming Kuang |
| 2006 | Variational Decomposition Model in Besov Spaces and Negative Hilbert-Sobolev Spaces. Min Li, Xiangchu Feng |
| 2006 | Weighted Kernel Isomap for Data Visualization and Pattern Classification. Ruijun Gu, Wenbo Xu |
| 2006 | XTR Zehui Wang, Zhiguo Zhang |
| 2006 | iOBS3: An iSCSI-Based Object Storage Security System. Jianzhong Huang, Changsheng Xie, Xu Li |