CIS C

117 papers

YearTitle / Authors
2007Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers
Yuping Wang, Yiu-ming Cheung, Hai-Lin Liu
2006A Centralized Network Design Problem with Genetic Algorithm Approach.
Gengui Zhou, Zhenyu Cao, Jian Cao, Zhiqing Meng
2006A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.
JeaHoon Park, Hoon-Jae Lee, JaeCheol Ha, YongJe Choi, Howon Kim, Sang-Jae Moon
2006A Feature Selection Algorithm Based on Discernibility Matrix.
Fuyan Liu, Shaoyi Lu
2006A Further Discussion on Convergence Rate of Immune Genetic Algorithm to Absorbed-State.
Xiaoping Luo, Wenyao Pang, Ji Huang
2006A Hierarchical Key Distribution Scheme for Conditional Access System in DTV Broadcasting.
Mengyao Zhu, Ming Zhang, Xiaoling Chen, Ding Zhang, Zhijie Huang
2006A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks.
Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, Jianping Yu, Xinguo Lu
2006A Load Scattering Algorithm for Dynamic Routing of Automated Material Handling Systems.
Alex K. S. Ng, Janet Efstathiou, Henry Y. K. Lau
2006A Multi-classification Method of Temporal Data Based on Support Vector Machine.
Zhiqing Meng, Lifang Peng, Gengui Zhou, Yihua Zhu
2006A New Model Based Multi-objective PSO Algorithm.
Jingxuan Wei, Yuping Wang
2006A New Multi-objective Evolutionary Optimisation Algorithm: The Two-Archive Algorithm.
Kata Praditwong, Xin Yao
2006A New Parallel Multiplier for Type II Optimal Normal Basis.
Chang Han Kim, Yongtae Kim, Sung Yeon Ji, IlHwan Park
2006A New Schema Survival and Construction Theory for One-Point Crossover.
Liang Ming, Yuping Wang
2006A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery.
Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen
2006A Novel Optimization Strategy for the Nonlinear Systems Identification.
Xin Tan, Huaqian Yang
2006A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication.
Sung Bum Pan, Daesung Moon, Kichul Kim, Yongwha Chung
2006A Watershed Algorithmic Approach for Gray-Scale Skeletonization in Thermal Vein Pattern Biometrics.
Lingyu Wang, Graham Leedham
2006About the Time Complexity of Evolutionary Algorithms Based on Finite Search Space.
Lixin Ding, Yingzhou Bi
2006Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML.
Dong Seong Kim, Taek-Hyun Shin, Byungil Lee, Jong Sou Park
2006Adaptive Parallel Immune Evolutionary Strategy.
Cheng Bo, Zhenyu Guo, Binggang Cao, Junping Wang
2006An Analysis About the Asymptotic Convergence of Evolutionary Algorithms.
Lixin Ding, Jinghu Yu
2006An Efficient Algorithm for Clustering Search Engine Results.
Hui Zhang, Bin Pang, Ke Xie, Hui Wu
2006An Efficient Anonymous Fingerprinting Protocol.
Bo Yang, Piyuan Lin, Wenzheng Zhang
2006An Efficient Anonymous Registration Scheme for Mobile IPv4.
Xuefei Cao, Weidong Kou, Huaping Li, Jie Xu
2006An Efficient Device Authentication Protocol Using Bioinformatic.
Yoon-Su Jeong, Bong-Keun Lee, Sang Ho Lee
2006An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection.
Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko
2006An Efficient and Secure RFID Security Method with Ownership Transfer.
Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi
2006An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security.
SeongHan Shin, Kazukuni Kobara, Hideki Imai
2006An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting Technique.
Jin Wook Shin, Ju Cheng Yang, Sook Yoon, Dong Sun Park
2006An Improved Ant Colony System and Its Application.
Xiangpei Hu, Qiulei Ding, Yongxian Li, Dan Song
2006An Improved Entropy Function and Chaos Optimization Based Scheme for Two-Dimensional Entropic Image Segmentation.
Cheng Ma, Chengshun Jiang
2006An Improved Particle Swarm Optimizer for Truss Structure Optimization.
Lijuan Li, Zhibin Huang, Feng Liu
2006An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices.
Qingqi Pei, Kefeng Fan, Jinxiu Dai, Jianfeng Ma
2006Binary Sequences with Three and Four Level Autocorrelation.
Ying Cai, Zhen Han
2006CGA: Chaotic Genetic Algorithm for Fuzzy Job Scheduling in Grid Environment.
Dan Liu, Yuanda Cao
2006Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme.
Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim
2006Collision-Resilient Multi-state Query Tree Protocol for Fast RFID Tag Identification.
Jae-Min Seol, Seong-Whan Kim
2006Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Jin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia
2006DT-CWT Feature Combined with ONPP for Face Recognition.
Yuehui Sun, Minghui Du
2006Discriminatively Learning Selective Averaged One-Dependence Estimators Based on Cross-Entropy Method.
Qing Wang, Chuan-Hua Zhou, Bao-Hua Zhao
2006Edge Detection Based on Mathematical Morphology and Iterative Thresholding.
Xiangzhi Bai, Fugen Zhou
2006Efficient Implementation of Tate Pairing on a Mobile Phone Using Java.
Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
2006Enhanced Security Scheme for Managing Heterogeneous Server Platforms.
Jiho Kim, Duhyun Bae, Sehyun Park, Ohyoung Song
2006Estimation of Source Signals Number and Underdetermined Blind Separation Based on Sparse Representation.
Ronghua Li, Beihai Tan
2006Face Pose Estimation and Synthesis by 2D Morphable Model.
Li Yingchun, Guangda Su
2006Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network.
Zhu Lei, DaeHun Nyang, KyungHee Lee, Hyotaek Lim
2006Feature Extraction Using Histogram Entropies of Euclidean Distances for Vehicle Classification.
Ming Bao, Luyang Guan, Xiaodong Li, Jing Tian, Jun Yang
2006Feature Weighted Rival Penalized EM for Gaussian Mixture Clustering: Automatic Feature and Model Selections in a Single Paradigm.
Yiu-ming Cheung, Hong Zeng
2006Fingerprint Matching Using Invariant Moment Features.
Ju Cheng Yang, Jin Wook Shin, Dong Sun Park
2006Forward Secure Threshold Signature Scheme from Bilinear Pairings.
Jia Yu, Fanyu Kong, Rong Hao
2006Full-Space LDA With Evolutionary Selection for Face Recognition.
Xin Li, Bin Li, Hong Chen, XianJi Wang, Zhenquan Zhuang
2006Fuzzy Q-Map Algorithm for Reinforcement Learning.
YoungAh Lee, SeokMi Hong
2006Game Model Based Co-evolutionary Algorithm and Its Application for Multiobjective Nutrition Decision Making Optimization Problems.
Gaoping Wang, Liyuan Bai
2006Gene Selection Using Wilcoxon Rank Sum Test and Support Vector Machine for Cancer Classification.
Chen Liao, Shutao Li, Zhiyuan Luo
2006General Particle Swarm Optimization Based on Simulated Annealing for Multi-specification One-Dimensional Cutting Stock Problem.
Xianjun Shen, Yuanxiang Li, Bojin Zheng, Zhifeng Dai
2006Generalization of the Selective-ID Security Model for HIBS Protocols.
Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang
2006Genetic Algorithm and Pareto Optimum Based QoS Multicast Routing Scheme in NGI.
Xingwei Wang, Pengcheng Liu, Min Huang
2006Hardware/Software Co-design of a Secure Ubiquitous System.
Masa-Aki Fukase, Hiroki Takeda, Tomoaki Sato
2006ID-Based (
Fagen Li, Yupu Hu, Shuanggen Liu
2006Identity-Based Key-Insulated Signature Without Random Oracles.
Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
2006Image Denoising Based on Wavelet Support Vector Machine.
Shaoming Zhang, Ying Chen
2006Image-Adaptive Spread Transform Dither Modulation Using Human Visual Model.
Xinshan Zhu
2006Image-Adaptive Watermarking Using the Improved Signal to Noise Ratio.
Xinshan Zhu
2006Improvement of Film Scratch Inpainting Algorithm Using Sobel Based Isophote Computation over Hilbert Scan Line.
Ki-Hong Ko, Seong-Whan Kim
2006Information Assurance Evaluation for Network Information Systems.
Xin Lü, Zhi Ma
2006Knowledge Structure on Virus for User Education.
Madihah Saudi, Nazean Jomhari
2006Labeling of Human Motion by Constraint-Based Genetic Algorithm.
Fuyuan Hu, Hau-San Wong, Zhi Qiang Liu, Hui-yang Qu
2006Learning SVM with Varied Example Cost: A
Chan-Yun Yang, Che-Chang Hsu, Jr-Syu Yang
2006Linear Programming Relax-PSO Hybrid Bound Algorithm for a Class of Nonlinear Integer Programming Problems.
Yuelin Gao, Chengxian Xu, Jimin Li
2006Linkability Analysis of Some Blind Signature Schemes.
Jianhong Zhang, Jian Mao
2006Locally Weighted LS-SVM for Fuzzy Nonlinear Regression with Fuzzy Input-Output.
Dug Hun Hong, Changha Hwang, JooYong Shim, Kyung Ha Seok
2006Low-Cost Authentication Protocol of the RFID System Using Partial ID.
Yong-Zhen Li, Yoon-Su Jeong, Ning Sun, Sang Ho Lee
2006Modeling and Simulation for Security Risk Propagation in Critical Information Systems.
Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik
2006Molecular Diagnosis of Tumor Based on Independent Component Analysis and Support Vector Machines.
Shulin Wang, Huowang Chen, Ji Wang, Dingxing Zhang, Shutao Li
2006Multi-agent Coordination Schemas in Decentralized Production Systems.
Gang Li, Yongqiang Li, Linyan Sun, Ping Ji
2006Multiagent Search Strategy for Combinatorial Optimization Problems in Ant Model.
SeokMi Hong, Seunggwan Lee
2006Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Models.
Kjetil Haslum, André Årnes
2006Network Anomalous Attack Detection Based on Clustering and Classifier.
Hongyu Yang, Feng Xie, Yi Lu
2006Neurodynamic Analysis for the Schur Decomposition of the Box Problems.
Quanju Zhang, Fuye Feng, Zhenghong Wei
2006New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory.
Boyun Zhang, Jianping Yin, Jingbo Hao, Shulin Wang, Dingxing Zhang
2006New Radial Basis Function Neural Network Training for Nonlinear and Nonstationary Signals.
Kah Phooi Seng, Li-Minn Ang
2006Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment.
Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyung Kim, Doo-Kwon Baik
2006Performance Analysis of Cooperative Hopfield Networks for Stereo Matching.
Wenhui Zhou, Zhiyu Xiang, Weikang Gu
2006Population-Based Extremal Optimization with Adaptive Lévy Mutation for Constrained Optimization.
Min-Rong Chen, Yong-Zai Lu, Genke Yang
2006Practical Password-Based Authenticated Key Exchange Protocol.
Shuhua Wu, Yuefei Zhu
2006Precise Eye Localization with AdaBoost and Fast Radial Symmetry.
Wencong Zhang, Hong Chen, Peng Yao, Bin Li, Zhenquan Zhuang
2006Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant.
Jin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang
2006Range Image Based Classification System Using Support Vector Machines.
Seyed Eghbal Ghobadi, Klaus Hartmann, Otmar Loffeld, Wolfgang Weihs
2006Real-Time Expression Recognition System Using Active Appearance Model and EFM.
Kyoung-Sic Cho, Yong-Guk Kim, Yang-Bok Lee
2006Research on a Novel Hashing Stream Cipher.
Yong Zhang, Xiamu Niu, Juncao Li, Chun-ming Li
2006Secure Password Authentication for Distributed Computing.
Seung Wook Jung, Souhwan Jung
2006Secure and Efficient Trust Negotiation.
Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang
2006Securing Overlay Activities of Peers in Unstructured P2P Networks.
Jun-Cheol Park, Geonu Yu
2006Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing.
Niansheng Liu, Donghui Guo
2006Security Contexts in Autonomic Systems.
Kaiyu Wan, Vasu S. Alagar
2006Security and Privacy on Authentication Protocol for Low-Cost RFID.
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang Ho Lee
2006Seeker Optimization Algorithm.
Chaohua Dai, Yunfang Zhu, Weirong Chen
2006Senior Executives Commitment to Information Security - from Motivation to Responsibility.
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo Savola, Juha Röning
2006Simulation and Analysis of DDoS in Active Defense Environment.
Zhongwen Li, Yang Xiang, Dongsheng He
2006Software Agents Action Securities.
Vojislav Stojkovic, Hongwei Huo
2006Spatial Data Mining with Uncertainty.
Binbin He, Cuihua Chen
2006Structure-Based Rule Selection Framework for Association Rule Mining of Traffic Accident Data.
Rangsipan Marukatat
2006Study of the Wavelet Basis Selections.
Hua Cui, Guoxiang Song
2006Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking.
Vidyasagar M. Potdar, Song Han, Elizabeth Chang, Chen Wu
2006Subspace KDA Algorithm for Non-linear Feature Extraction in Face Identification.
Wen-Sheng Chen, Pong Chi Yuen, Jian-Huang Lai
2006Survey of Distance Measures for NMF-Based Face Recognition.
Yun Xue, Chong Sze Tong, Weipeng Zhang
2006Ternary Tree Based Group Key Management in Dynamic Peer Networks.
Wei Wang, Jianfeng Ma, Sang-Jae Moon
2006Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec.
Misun Moon, Dong Seong Kim, Jong Sou Park
2006Towards a Management Paradigm with a Constrained Benchmark for Autonomic Communications.
Frank Chiang, Robin Braun
2006Two Evolutionary Methods for Learning Bayesian Network Structures.
Alain Delaplace, Thierry Brouard, Hubert Cardot
2006Two-Phase Quantum Based Evolutionary Algorithm for Multiple Sequence Alignment.
Hongwei Huo, Vojislav Stojkovic
2006Using Evolving Agents to Critique Subjective Music Compositions.
Chuen-Tsai Sun, Ji-Lung Hsieh, Chung-Yuan Huang
2006Using Hybrid Hadamard Error Correcting Output Codes for Multi-class Problem Based on Support Vector Machines.
Shilei Huang, Xiang Xie, Jingming Kuang
2006Variational Decomposition Model in Besov Spaces and Negative Hilbert-Sobolev Spaces.
Min Li, Xiangchu Feng
2006Weighted Kernel Isomap for Data Visualization and Pattern Classification.
Ruijun Gu, Wenbo Xu
2006XTR
Zehui Wang, Zhiguo Zhang
2006iOBS3: An iSCSI-Based Object Storage Security System.
Jianzhong Huang, Changsheng Xie, Xu Li