CIS C

152 papers

YearTitle / Authors
2010(2, n) Secret Image Sharing Scheme with Ideal Contrast.
Lin Dong, Daoshun Wang, Min Ku, Yiqi Dai
20102010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010
Muren Liu, Yuping Wang, Ping Guo
2010A BCH Code with the Distance 11 for Sensornets.
Gao-chang Zhao, Xiao-Lin Yang
2010A Digital Watermarking Scheme Used for Authentication of Surveillance Video.
Duanquan Xu, Jiangshan Zhang, Baochuan Pang
2010A Fast HITON_PC Algorithm.
Wei Yang
2010A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model.
Hao Wang, Qiuliang Xu, Han Jiang, Xiufeng Zhao
2010A Genetic Algorithm Based on Modularity Density for Detecting Community Structure in Complex Networks.
Guoqiang Chen, Xiaofang Guo
2010A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems Using Genetic Algorithms.
Hecheng Li, Yuping Wang
2010A Improved Fuzzy K-Subspace Clustering and Its Application in Multiple Dominant Sparse Component Analysis.
Suxian Zhang, Hai-Lin Liu
2010A Kind of Vector Space Representation Model Based on Semantic in the Field of English Standard Information.
Shibin Xiao, Zhu Shi, Kun Liu, Xueqiang Lv
2010A Method to Find Chromatically Unique Multipartite Graphs.
Haixing Zhao, Zhuma Gao, Jun Yin
2010A Method to Prevent CW Sharing in DTV CAS.
Fei Ren, Zhiguang Qin, Xianhong Liu
2010A Multi-agent Social Evolutionary Algorithm for Resource-Constrained Project Scheduling.
Xiaoying Pan, Hao Chen
2010A Multi-objective Genetic Algorithm Approach Based on the Uniform Design Metmod.
Xiaoshu Ma, Jing Huo, Qun Wang
2010A Naive Feature Selection Method and Its Application in Network Intrusion Detection.
Tieming Chen, Xiaoming Pan, Yiguang Xuan, Jixia Ma, Jie Jiang
2010A Neural Network Clustering Based Algorithm for Privacy Preserving Data Mining.
Stergios G. Tsiafoulis, Vasilios Zorkadis
2010A New Clustering Algorithm Based on Normalized Signal for Sparse Component Analysis.
Junjie Yang, Hai-Lin
2010A New Evolutionary Algorithm Based on Simplex Crossover and PSO Mutation for Constrained Optimization Problems.
Yibo Hu
2010A New Genetic Algorithm and Its Convergence for Constrained Optimization Problems.
Dalian Liu, Chunfeng Xing, Xuehai Shang
2010A New Genetic Algorithm with Elliptical Crossover for Constrained Multi-objective Optimization Problems.
Lei Fan, Yuping Wang, Meijuan Wang
2010A New Kind of Handling Constraint Method for Optimization.
Jiechang Wen, Xuefei Yao
2010A New Multi-objective Differential Evolution Algorithm.
Yuelin Gao, Jingke Zhou, Songwei Jia
2010A New Technique of Anti-tampering Technology Based on AVS Video.
Fei Ren, Zhiguang Qin, Jinfeng Yang
2010A New Threshold Signature Scheme to Withstand the Conspiracy Attack.
Jie Wang, Yongquan Cai, Jingyang He
2010A New Volume Rendering Algorithm of Data Field.
Xiaofeng Feng, Xiong Shi, Jun Chen
2010A Non-Linear Model for Evaluating Professional Manager's Incentive Effect.
Wenxue Niu, Zhenghong Wei, Quanju Zhang
2010A Novel GEP-Based Multiple-Layers Association Rule Mining Algorithm.
Hong-guo Cai, Chang-An Yuan, Jin-Guang Luo, Jin-de Huang
2010A Novel Hybrid Particle Swarm Optimization for Feature Selection and Kernel Optimization in Support Vector Regression.
Jiansheng Wu, Enhong Chen
2010A Novel Image Classification Method Based on Double Manifold Learning.
Li-Hua Ye, Rong Zhu, Jie Xu
2010A Novel Weight Design in Multi-objective Evolutionary Algorithm.
Fangqing Gu, Hai-Lin Liu
2010A Protocol of Secure Multi-party Multiplication Based on Bilinear Pairing.
Weimin Shi, Changgen Peng
2010A Real-Time Pineapple Matching System Based on Speeded-Up Robust Features.
Bin Li, Maohua Wang, Li Li
2010A Reliable Service Quality Evaluation Model in the Web Services Community.
Liping Chen, Guojun Zhang, Weitao Ha
2010A Reputation Calculation Model in E-Shopping Websites.
Shiyu Wang, Sulin Pang
2010A Revised Discrete Particle Swarm Optimization for Cloud Workflow Scheduling.
Zhangjun Wu, Zhiwei Ni, Lichuan Gu, Xiao Liu
2010A Scenario-Based Architecture for Reliability Design of Artificial Intelligent Software.
Juguo Wang, Guoqi Li, Yun Pu
2010A Scheme for Confidentiality Protection of OpenID Authentication Mechanism.
Xiangwu Ding, Junyin Wei
2010A Sheme of Mobile Platform Based on Trusted Computing.
Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao
2010A Streamline Placement Method Highlighting Flow Field Topology.
Wenyao Zhang, Bo Sun, Yi Wang
2010A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks.
Hongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng
2010A Swarm Intelligence Algorithm Based on Boundary Mutation.
Hongwei Lin, Yuping Wang, Cai Dai
2010AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme.
Mona Hosseinkhani Loorak, Ebrahim Tarameshloo, Mehdi Shajari
2010Airport Taxi Scheduling Optimization Based on Genetic Algorithm.
Changyou Liu, Kaifeng Guo
2010An Adaptive Evaluation Model of Web Service Based on Artificial Immune Network.
Weitao Ha, Li-Ping Chen
2010An Adaptive Feature Extraction Method for Motor-Imagery BCI Systems.
Cheng Chen, Wei Song, Jiacai Zhang, Zhiping Hu, He Xu
2010An Algorithm of Collision Detection Based on Hybrid Model.
Xiaofeng Feng, Xiong Shi, Jun Chen
2010An Algorithm of Dynamic Associate Rule Based on Sliding Windows.
Zhiqing Meng, Baosheng Shao, Min Jiang
2010An Approach to Maximum Lifetime Multicast Delivery in Wireless Ad-Hoc Networks.
Dingde Jiang, Xingwei Wang, Zhengzheng Xu, Zhenhua Chen
2010An Automatic Evaluation Method for Chinese Name Recognition.
Yujian Li, Dedong Zhang, Zhen Yang
2010An EOG Artifacts Correction Method Based on Subspace Independent Component Analysis.
Da Li, Jin Wu, Jiacai Zhang
2010An Efficient Semantic Similarity Search on XML Documents.
Shengen Li, Ling Song, Qiang Lv, Yuejun Li
2010An Efficient Solver for Differential Equations with Random Inputs.
Dong Qu, Ping Chen, Jing Yang
2010An Improved DLDA Based Method- Nonparametric DLDA.
Huorong Ren, Chunxiao Li, Haizhen Wang
2010An Improved Fog-Degrading Image Enhancement Algorithm Based on the Fuzzy Contrast.
Huiyan Liu, Wenzhang He, Rui Liu
2010An Improved Genetic Algorithm for Job Shop Scheduling Problem.
Qing-dao-er-ji Ren, Yuping Wang, Xiaojing Si
2010An Improved Side Information Generation Scheme for Wyner-Ziv Video Coding.
Jinhong Di, Hongyan Hua
2010Analysis of Fuzzy Membership Function Generation with Unsupervised Learning Using Self-Organizing Feature Map.
Ruliang Wang, Kunbo Mei
2010Asymmetric Group Key Agreement with Traitor Traceability.
Xiufeng Zhao, Dawei Wei, Hao Wang
2010Automated Static Code Analysis for Classifying Android Applications Using Machine Learning.
Asaf Shabtai, Yuval Fledel, Yuval Elovici
2010Automatic Speech Corpus Construction from Broadcasting Speech Databases.
Wei Zhang, Ranran Du, Minhui Pang, Qiuhong Wang
2010Capability Simulating Model for Complex Communication Network.
Wang Yu, Xu Feng
2010Chaotic Synchronization with Single-Ring Erbium-Doped Fiber Laser Systems.
Liwen Zhang, Ming Shao
2010Chinese Sentiment Orientation Analysis.
Wenbin Pan, Yanquan Zhou
2010Cluster Features of Bluetooth Mobile Phone Virus and Research on Strategies of Control & Prevention.
Wenjuan Zhang, Zhaohui Li, Yonghui Hu, Wei Xia
2010Computer Realization of Solving Tri-diagonal Equations by Gauss-Seidel Method.
Tianxiang Feng, Dingxiu He, Hongxia Liu
2010Computing the Scattering Number of Bicyclic Graphs.
Bing Chen, Shenggui Zhang
2010Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree.
Fengrong Zhang, Yupu Hu, Hua Ma, Min Xie
2010Continuous Verification Using Keystroke Dynamics.
Tomer Shimshon, Robert Moskovitch, Lior Rokach, Yuval Elovici
2010Convertible Perfect Concurrent Signature Protocol.
Han Jiang, Qiuliang Xu, Chenghui Zhang
2010Correlation Power Analysis Against Stream Cipher MICKEY v2.
Junrong Liu, Dawu Gu, Zheng Guo
2010Credit Card Customer Segmentation and Target Marketing Based on Data Mining.
Wei Li, Xuemei Wu, Yayun Sun, Quanju Zhang
2010DST Feature Based Locality Preserving Projections for Face Recognition.
Wei Wang, Wen-Sheng Chen
2010Data Hiding in Block Truncation Coding.
Xiaotian Wu, Wei Sun
2010Design Verification of BJUT Library Management System with PVS.
Jingang Niu, Shenghui Su
2010Design and Implementation of Object-Oriented Encryption Storage System Based on Trusted Computing Platform.
Junjian Chen, Jingning Liu, Dan Feng
2010Differential Fault Analysis on PRESENT Key Schedule.
Gaoli Wang, Shaohui Wang
2010Discrete Bayesian-Based Scheme of Software Reliability Demonstration Testing with Decreasing Function for the Safety Critical Software.
Xuecheng Wang, Risheng Yang, Minyan Lu, Haifeng Li
2010Dynamic Fluzzy Clustering Algorithm for Web Documents Mining.
Qi Luo
2010Efficient Client Puzzle Schemes to Mitigate DoS Attacks.
Qiang Tang, Arjan Jeckmans
2010Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor Networks.
JiangHong Guo, Zhichu Zhong
2010Efficient and Secure Authentication Protocol for VANET.
Hui Liu, Hui Li, Zhanxin Ma
2010Energy Based Robust Video Hash Algorithm.
Yuenan Li
2010Essence of Two-Dimensional Principal Component Analysis.
Caikou Chen, Jingyu Yangzhou
2010Evolutionary Algorithm for Zero-One Constrained Optimization Problems Based on Objective Penalty Function.
Zhiqing Meng, Min Jiang, Chuangyin Dang
2010Existence of the Solution for General Complementarity Problems.
Xiuyu Wang, Xingwu Jiang, Xiaogang Dong, Qinghuai Liu
2010Game Analysis of Non-trusted Threshold Authentication Scheme.
Jie Wang, Yongquan Cai
2010Game-Based Analysis and Improvement of a Fair Contract Signing Protocol.
Xueming Wang, Lichen Weng
2010Generalized Additive Models of DEA and Generalized Non-Dominated Solution in Multi-objective Programming.
Hongye Song
2010Graph-Based Answer Passage Ranking for Question Answering.
Xin Li, Enhong Chen
2010Hybrid Genetic Algorithm for the Multi-objective Flexible Scheduling Problem.
Jinling Du, Dalian Liu
2010IMP-Filters of R0-Algebras.
Yong-lin Liu, Mei-ying Ren
2010Identity Authentication Based on Fuzzy Vault and Digital Certificate.
Fen Li, Quan Liu, Liaojun Pang, Qingqi Pei
2010Image Denoising Using Nonseparable Wavelet and SURE-LET.
Wu Zeng, Xiubao Jiang, Zhengquan Xu, Long Zhou
2010Implementation and Improvement of Simulated Annealing Algorithm in Neural Net.
Jianlan Guo, Yuqiang Chen, Xuanzi Hu
2010Improved Differential Cryptanalysis of Serpent.
Gaoli Wang, Shaohui Wang
2010Improved Electromagnetism-Like Mechanism Algorithm for Constrained Optimization Problem.
Yun Shang, Jian Chen, Qun Wang
2010Industrial Clusters Evolution Research Based on the SGA.
Yajuan Yang, Pingan Wang, Wenxue Niu
2010Infrared Face Recognition Based on Blood Perfusion and Weighted Block-DCT in Wavelet Domain.
Cuiqun He, Guodong Liu, Zhihua Xie
2010Intelligent Digital Photo Management System Using Ontology and SWRL.
Yanmei Chai, Tian Xia, Jianming Zhu, Haifeng Li
2010Lattice-Based Proxy Signature.
Yali Jiang, Fanyu Kong, Xiuling Ju
2010Motion Analysis Based on Spatial-Temporal Visual Attention.
Shunbin Liu, Huicheng Zheng
2010Motion Segmentation Using Central Distance Features and Low-Pass Filter.
Shu-Juan Peng
2010Neural Network Method for Solving Linear Fractional Programming.
Li Xiao
2010New CCA-Secure Proxy Re-encryption Scheme without Random Oracles.
Xu An Wang, Ping Wei, Minqing Zhang
2010New Results on H∞ Filter Design for Continue-Time Systems with Time-Varying Delay.
Yating Wang, Wuneng Zhou, Jinliang Liu, Da Luo
2010Non-Adjacent Form Recursive Algorithm on Elliptic Curves Cryptograph.
Jing Zhang, Pingan Wang
2010Observer-Based Adaptive Neural Network Robust Control of Nonlinear Time-Delay Systems with Unmodeled Dynamics.
Ruliang Wang, Huiying Jiang
2010On Trust Degree-Based Usage Control in DRM System.
Fen Li, Quan Liu, Qingqi Pei, Liaojun Pang
2010On the Reliability of Unicyclic Networks with Vertex Failure.
Zhanlan Li
2010Online Segmentation Algorithm for Time Series Based on BIRCH Clustering Features.
Yu Tu, Yubao Liu, Zhijie Li
2010Outward Foreign Direct Investment and Industry Structural Optimization: Analysis and Testing on Data of Republic of Korea.
Ren Liang, Li Bing
2010P2P-Based Semantic Policy Infrastucture for Pervasive Computing.
Fang Pu, Linlang Liu, Yu Shen, Qiying Cao
2010Performance Analysis Based on Transform Matrix of MLE in CICA.
Zhenyou Wang, Xuejun Gao
2010Prediction Discrete Data Used BP Network Based on AGO.
Xuejun Gao, Zhenyou Wang
2010Privacy-Preserving Classification on Horizontally Partitioned Data.
Tian Tian, Hua Duan, Guoping He
2010Probability Based Approach for Target Detection and Pose Estimation in Infrared Images.
Weiguang Liu, Hailing Lai
2010Proxy Re-encryption from CLE to CBE.
Ping Wei, Xu An Wang, Xiaoyuan Yang
2010Research of Signal Frequency Domain Resolution Based-EMD.
Meng Hou, Zeng-li Liu, Haiyan Quan, Yong-de Zhang
2010Research on Double Objective Optimization of Master Production Schedule Based on Ant Colony Algorithm.
Zhengjia Wu, Wen Wang, Jin Zhou, Fen-fen Ren, Cheng Zhang
2010Research on Feature Extraction Based on Genetic Algorithm in Text Categorization.
Juan Zou, Jinhua Zheng
2010Research on Game Algorithm for Zhang Chess.
Zhenzhen Zhang, Defu Zhang
2010Research on Validity Evaluation of Mandatory Access Control Policy under LSM Framework.
Gaozu Wang, Weihuai Li, Wenbin Li
2010Research on Wireless Sensor Network Security.
Yan-Xiao Li, Lian Qin, Qian Liang
2010Risk Assessment Model of Ship Integrated Navigation System Based on Fuzzy Artificial Neural Network.
Hong-bo Li, Yan-ling Hao
2010Robust Adaptive Neural Control for a Class of Stochastic Nonlinear Systems.
Ruliang Wang, Chaoyang Chen
2010Secure Communication Model of WSN Based on Secret Sharing.
Xiaohui Zhao, Liaojun Pang, Jingjuan Bi, Qingqi Pei, Huixian Li
2010Secure Signcryption Scheme Based on a Hybrid Encryption.
Chuanrong Zhang, Lianqing Zheng, Mingwen Xia, Yuqing Zhang
2010Securing GPRS Tunnel Protocol in 3G Core Network.
Xuena Peng, Yingyou Wen, Hong Zhao
2010Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms.
Li Yang, Jianfeng Ma, Junwei Zhang
2010Semantic Modeling: Computational Models of the Concepts.
Viacheslav Wolfengagen
2010Ship 3D Collaborate Design Integration System Research.
Shao-juan Su, Yin-Dong Liu, Xiao-Ming Liu
2010Soft Information Improvement for PN Sequence Iterative Acquisition.
Wei Wang, Nianke Zong, Jie Tang, Sangarapillai Lambotharan
2010Some New Optimal Pairings.
He Shang, Mingqiang Wang
2010Stock Index Futures Margin Level Settings by Hill Estimation and Empirical Analysis.
Manqi Wu, Sulin Pang
2010Study on Commercial Bank Branches Performance Evaluation Using Self-Adaptive RBFNN and UDM.
Xiaohua Diao, Shiying Kang
2010Synchronization Algorithm for Multi-hop in Wireless Sensor Networks.
Hong Yao, Wuneng Zhou
2010Target-Acquisition-Performance-Model-Based Quality Metric for Multisensor Image Fusion.
Yang Cui, Li Qian, Wu Jie, Zhang Jianqi
2010The Analysis of Yeast Cell Morphology Using a Robot Scientist.
Yihui Liu, Katherine Martin, Andrew Sparkes, Ross D. King
2010The Application of Dominant-Recessive Diploid Codes in MOGA.
Na Li, Qing-dao-er-ji Ren
2010The Approach of ACARS Data Encryption and Authentication.
Meng Yue, Xiaofeng Wu
2010The Bipanconnectivity and Hamiltonian-Connectivity of Enhanced Hypercube.
Yingying Liu, Hongmei Liu
2010The Comparison of Two Kinds of Reproduction in Multiobjective Optimization.
Xue-fei Yao, Hai-Lin
2010The Particle Swarm Optimization with Decaying ICMIC for Shortest Path Computation in Computer Networks.
Huidang Zhang, Yifei Zhang
2010The Research of Internet of Things' Supporting Technologies Which Face the Logistics Industry.
Yuqiang Chen, Jianlan Guo, Xuanzi Hu
2010The Research on Multi-viewpoint Navigation Based on Spherical Panoramic Images.
Xiong Shi, Xiaofeng Feng, Jun Chen
2010The Study of Credit Risk Evaluation Based on DEA Method.
Huaipeng Li, Sulin Pang
2010TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks.
Tieming Chen, Liang Ge, Xiaohao Wang, Jiamei Cai
2010Tool Wear Detection Based on Wavelet Packet and BP Neural Network.
Yuxia Qin, Lanshen Guo, Jian Wang
2010Tripartite Key Agreement Protocols Based on Digital Certification.
Junbing Li, Wei Ji
2010USB Key-Based Dual-Factor Dynamic Authentication Scheme.
Lei Li, Quan Liu, Xuemei Jiang
2010Unsupervised Image Change Detection Based on 2-D Fuzzy Entropy.
Wenbang Sun, Hexin Chen, Haiyan Tang, Di Wu
2010Violence Detection in Movies with Auditory and Visual Cues.
Jian Lin, Yi Sun, Weiqiang Wang