| 2010 | (2, n) Secret Image Sharing Scheme with Ideal Contrast. Lin Dong, Daoshun Wang, Min Ku, Yiqi Dai |
| 2010 | 2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010 Muren Liu, Yuping Wang, Ping Guo |
| 2010 | A BCH Code with the Distance 11 for Sensornets. Gao-chang Zhao, Xiao-Lin Yang |
| 2010 | A Digital Watermarking Scheme Used for Authentication of Surveillance Video. Duanquan Xu, Jiangshan Zhang, Baochuan Pang |
| 2010 | A Fast HITON_PC Algorithm. Wei Yang |
| 2010 | A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model. Hao Wang, Qiuliang Xu, Han Jiang, Xiufeng Zhao |
| 2010 | A Genetic Algorithm Based on Modularity Density for Detecting Community Structure in Complex Networks. Guoqiang Chen, Xiaofang Guo |
| 2010 | A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems Using Genetic Algorithms. Hecheng Li, Yuping Wang |
| 2010 | A Improved Fuzzy K-Subspace Clustering and Its Application in Multiple Dominant Sparse Component Analysis. Suxian Zhang, Hai-Lin Liu |
| 2010 | A Kind of Vector Space Representation Model Based on Semantic in the Field of English Standard Information. Shibin Xiao, Zhu Shi, Kun Liu, Xueqiang Lv |
| 2010 | A Method to Find Chromatically Unique Multipartite Graphs. Haixing Zhao, Zhuma Gao, Jun Yin |
| 2010 | A Method to Prevent CW Sharing in DTV CAS. Fei Ren, Zhiguang Qin, Xianhong Liu |
| 2010 | A Multi-agent Social Evolutionary Algorithm for Resource-Constrained Project Scheduling. Xiaoying Pan, Hao Chen |
| 2010 | A Multi-objective Genetic Algorithm Approach Based on the Uniform Design Metmod. Xiaoshu Ma, Jing Huo, Qun Wang |
| 2010 | A Naive Feature Selection Method and Its Application in Network Intrusion Detection. Tieming Chen, Xiaoming Pan, Yiguang Xuan, Jixia Ma, Jie Jiang |
| 2010 | A Neural Network Clustering Based Algorithm for Privacy Preserving Data Mining. Stergios G. Tsiafoulis, Vasilios Zorkadis |
| 2010 | A New Clustering Algorithm Based on Normalized Signal for Sparse Component Analysis. Junjie Yang, Hai-Lin |
| 2010 | A New Evolutionary Algorithm Based on Simplex Crossover and PSO Mutation for Constrained Optimization Problems. Yibo Hu |
| 2010 | A New Genetic Algorithm and Its Convergence for Constrained Optimization Problems. Dalian Liu, Chunfeng Xing, Xuehai Shang |
| 2010 | A New Genetic Algorithm with Elliptical Crossover for Constrained Multi-objective Optimization Problems. Lei Fan, Yuping Wang, Meijuan Wang |
| 2010 | A New Kind of Handling Constraint Method for Optimization. Jiechang Wen, Xuefei Yao |
| 2010 | A New Multi-objective Differential Evolution Algorithm. Yuelin Gao, Jingke Zhou, Songwei Jia |
| 2010 | A New Technique of Anti-tampering Technology Based on AVS Video. Fei Ren, Zhiguang Qin, Jinfeng Yang |
| 2010 | A New Threshold Signature Scheme to Withstand the Conspiracy Attack. Jie Wang, Yongquan Cai, Jingyang He |
| 2010 | A New Volume Rendering Algorithm of Data Field. Xiaofeng Feng, Xiong Shi, Jun Chen |
| 2010 | A Non-Linear Model for Evaluating Professional Manager's Incentive Effect. Wenxue Niu, Zhenghong Wei, Quanju Zhang |
| 2010 | A Novel GEP-Based Multiple-Layers Association Rule Mining Algorithm. Hong-guo Cai, Chang-An Yuan, Jin-Guang Luo, Jin-de Huang |
| 2010 | A Novel Hybrid Particle Swarm Optimization for Feature Selection and Kernel Optimization in Support Vector Regression. Jiansheng Wu, Enhong Chen |
| 2010 | A Novel Image Classification Method Based on Double Manifold Learning. Li-Hua Ye, Rong Zhu, Jie Xu |
| 2010 | A Novel Weight Design in Multi-objective Evolutionary Algorithm. Fangqing Gu, Hai-Lin Liu |
| 2010 | A Protocol of Secure Multi-party Multiplication Based on Bilinear Pairing. Weimin Shi, Changgen Peng |
| 2010 | A Real-Time Pineapple Matching System Based on Speeded-Up Robust Features. Bin Li, Maohua Wang, Li Li |
| 2010 | A Reliable Service Quality Evaluation Model in the Web Services Community. Liping Chen, Guojun Zhang, Weitao Ha |
| 2010 | A Reputation Calculation Model in E-Shopping Websites. Shiyu Wang, Sulin Pang |
| 2010 | A Revised Discrete Particle Swarm Optimization for Cloud Workflow Scheduling. Zhangjun Wu, Zhiwei Ni, Lichuan Gu, Xiao Liu |
| 2010 | A Scenario-Based Architecture for Reliability Design of Artificial Intelligent Software. Juguo Wang, Guoqi Li, Yun Pu |
| 2010 | A Scheme for Confidentiality Protection of OpenID Authentication Mechanism. Xiangwu Ding, Junyin Wei |
| 2010 | A Sheme of Mobile Platform Based on Trusted Computing. Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao |
| 2010 | A Streamline Placement Method Highlighting Flow Field Topology. Wenyao Zhang, Bo Sun, Yi Wang |
| 2010 | A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks. Hongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng |
| 2010 | A Swarm Intelligence Algorithm Based on Boundary Mutation. Hongwei Lin, Yuping Wang, Cai Dai |
| 2010 | AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme. Mona Hosseinkhani Loorak, Ebrahim Tarameshloo, Mehdi Shajari |
| 2010 | Airport Taxi Scheduling Optimization Based on Genetic Algorithm. Changyou Liu, Kaifeng Guo |
| 2010 | An Adaptive Evaluation Model of Web Service Based on Artificial Immune Network. Weitao Ha, Li-Ping Chen |
| 2010 | An Adaptive Feature Extraction Method for Motor-Imagery BCI Systems. Cheng Chen, Wei Song, Jiacai Zhang, Zhiping Hu, He Xu |
| 2010 | An Algorithm of Collision Detection Based on Hybrid Model. Xiaofeng Feng, Xiong Shi, Jun Chen |
| 2010 | An Algorithm of Dynamic Associate Rule Based on Sliding Windows. Zhiqing Meng, Baosheng Shao, Min Jiang |
| 2010 | An Approach to Maximum Lifetime Multicast Delivery in Wireless Ad-Hoc Networks. Dingde Jiang, Xingwei Wang, Zhengzheng Xu, Zhenhua Chen |
| 2010 | An Automatic Evaluation Method for Chinese Name Recognition. Yujian Li, Dedong Zhang, Zhen Yang |
| 2010 | An EOG Artifacts Correction Method Based on Subspace Independent Component Analysis. Da Li, Jin Wu, Jiacai Zhang |
| 2010 | An Efficient Semantic Similarity Search on XML Documents. Shengen Li, Ling Song, Qiang Lv, Yuejun Li |
| 2010 | An Efficient Solver for Differential Equations with Random Inputs. Dong Qu, Ping Chen, Jing Yang |
| 2010 | An Improved DLDA Based Method- Nonparametric DLDA. Huorong Ren, Chunxiao Li, Haizhen Wang |
| 2010 | An Improved Fog-Degrading Image Enhancement Algorithm Based on the Fuzzy Contrast. Huiyan Liu, Wenzhang He, Rui Liu |
| 2010 | An Improved Genetic Algorithm for Job Shop Scheduling Problem. Qing-dao-er-ji Ren, Yuping Wang, Xiaojing Si |
| 2010 | An Improved Side Information Generation Scheme for Wyner-Ziv Video Coding. Jinhong Di, Hongyan Hua |
| 2010 | Analysis of Fuzzy Membership Function Generation with Unsupervised Learning Using Self-Organizing Feature Map. Ruliang Wang, Kunbo Mei |
| 2010 | Asymmetric Group Key Agreement with Traitor Traceability. Xiufeng Zhao, Dawei Wei, Hao Wang |
| 2010 | Automated Static Code Analysis for Classifying Android Applications Using Machine Learning. Asaf Shabtai, Yuval Fledel, Yuval Elovici |
| 2010 | Automatic Speech Corpus Construction from Broadcasting Speech Databases. Wei Zhang, Ranran Du, Minhui Pang, Qiuhong Wang |
| 2010 | Capability Simulating Model for Complex Communication Network. Wang Yu, Xu Feng |
| 2010 | Chaotic Synchronization with Single-Ring Erbium-Doped Fiber Laser Systems. Liwen Zhang, Ming Shao |
| 2010 | Chinese Sentiment Orientation Analysis. Wenbin Pan, Yanquan Zhou |
| 2010 | Cluster Features of Bluetooth Mobile Phone Virus and Research on Strategies of Control & Prevention. Wenjuan Zhang, Zhaohui Li, Yonghui Hu, Wei Xia |
| 2010 | Computer Realization of Solving Tri-diagonal Equations by Gauss-Seidel Method. Tianxiang Feng, Dingxiu He, Hongxia Liu |
| 2010 | Computing the Scattering Number of Bicyclic Graphs. Bing Chen, Shenggui Zhang |
| 2010 | Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree. Fengrong Zhang, Yupu Hu, Hua Ma, Min Xie |
| 2010 | Continuous Verification Using Keystroke Dynamics. Tomer Shimshon, Robert Moskovitch, Lior Rokach, Yuval Elovici |
| 2010 | Convertible Perfect Concurrent Signature Protocol. Han Jiang, Qiuliang Xu, Chenghui Zhang |
| 2010 | Correlation Power Analysis Against Stream Cipher MICKEY v2. Junrong Liu, Dawu Gu, Zheng Guo |
| 2010 | Credit Card Customer Segmentation and Target Marketing Based on Data Mining. Wei Li, Xuemei Wu, Yayun Sun, Quanju Zhang |
| 2010 | DST Feature Based Locality Preserving Projections for Face Recognition. Wei Wang, Wen-Sheng Chen |
| 2010 | Data Hiding in Block Truncation Coding. Xiaotian Wu, Wei Sun |
| 2010 | Design Verification of BJUT Library Management System with PVS. Jingang Niu, Shenghui Su |
| 2010 | Design and Implementation of Object-Oriented Encryption Storage System Based on Trusted Computing Platform. Junjian Chen, Jingning Liu, Dan Feng |
| 2010 | Differential Fault Analysis on PRESENT Key Schedule. Gaoli Wang, Shaohui Wang |
| 2010 | Discrete Bayesian-Based Scheme of Software Reliability Demonstration Testing with Decreasing Function for the Safety Critical Software. Xuecheng Wang, Risheng Yang, Minyan Lu, Haifeng Li |
| 2010 | Dynamic Fluzzy Clustering Algorithm for Web Documents Mining. Qi Luo |
| 2010 | Efficient Client Puzzle Schemes to Mitigate DoS Attacks. Qiang Tang, Arjan Jeckmans |
| 2010 | Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor Networks. JiangHong Guo, Zhichu Zhong |
| 2010 | Efficient and Secure Authentication Protocol for VANET. Hui Liu, Hui Li, Zhanxin Ma |
| 2010 | Energy Based Robust Video Hash Algorithm. Yuenan Li |
| 2010 | Essence of Two-Dimensional Principal Component Analysis. Caikou Chen, Jingyu Yangzhou |
| 2010 | Evolutionary Algorithm for Zero-One Constrained Optimization Problems Based on Objective Penalty Function. Zhiqing Meng, Min Jiang, Chuangyin Dang |
| 2010 | Existence of the Solution for General Complementarity Problems. Xiuyu Wang, Xingwu Jiang, Xiaogang Dong, Qinghuai Liu |
| 2010 | Game Analysis of Non-trusted Threshold Authentication Scheme. Jie Wang, Yongquan Cai |
| 2010 | Game-Based Analysis and Improvement of a Fair Contract Signing Protocol. Xueming Wang, Lichen Weng |
| 2010 | Generalized Additive Models of DEA and Generalized Non-Dominated Solution in Multi-objective Programming. Hongye Song |
| 2010 | Graph-Based Answer Passage Ranking for Question Answering. Xin Li, Enhong Chen |
| 2010 | Hybrid Genetic Algorithm for the Multi-objective Flexible Scheduling Problem. Jinling Du, Dalian Liu |
| 2010 | IMP-Filters of R0-Algebras. Yong-lin Liu, Mei-ying Ren |
| 2010 | Identity Authentication Based on Fuzzy Vault and Digital Certificate. Fen Li, Quan Liu, Liaojun Pang, Qingqi Pei |
| 2010 | Image Denoising Using Nonseparable Wavelet and SURE-LET. Wu Zeng, Xiubao Jiang, Zhengquan Xu, Long Zhou |
| 2010 | Implementation and Improvement of Simulated Annealing Algorithm in Neural Net. Jianlan Guo, Yuqiang Chen, Xuanzi Hu |
| 2010 | Improved Differential Cryptanalysis of Serpent. Gaoli Wang, Shaohui Wang |
| 2010 | Improved Electromagnetism-Like Mechanism Algorithm for Constrained Optimization Problem. Yun Shang, Jian Chen, Qun Wang |
| 2010 | Industrial Clusters Evolution Research Based on the SGA. Yajuan Yang, Pingan Wang, Wenxue Niu |
| 2010 | Infrared Face Recognition Based on Blood Perfusion and Weighted Block-DCT in Wavelet Domain. Cuiqun He, Guodong Liu, Zhihua Xie |
| 2010 | Intelligent Digital Photo Management System Using Ontology and SWRL. Yanmei Chai, Tian Xia, Jianming Zhu, Haifeng Li |
| 2010 | Lattice-Based Proxy Signature. Yali Jiang, Fanyu Kong, Xiuling Ju |
| 2010 | Motion Analysis Based on Spatial-Temporal Visual Attention. Shunbin Liu, Huicheng Zheng |
| 2010 | Motion Segmentation Using Central Distance Features and Low-Pass Filter. Shu-Juan Peng |
| 2010 | Neural Network Method for Solving Linear Fractional Programming. Li Xiao |
| 2010 | New CCA-Secure Proxy Re-encryption Scheme without Random Oracles. Xu An Wang, Ping Wei, Minqing Zhang |
| 2010 | New Results on H∞ Filter Design for Continue-Time Systems with Time-Varying Delay. Yating Wang, Wuneng Zhou, Jinliang Liu, Da Luo |
| 2010 | Non-Adjacent Form Recursive Algorithm on Elliptic Curves Cryptograph. Jing Zhang, Pingan Wang |
| 2010 | Observer-Based Adaptive Neural Network Robust Control of Nonlinear Time-Delay Systems with Unmodeled Dynamics. Ruliang Wang, Huiying Jiang |
| 2010 | On Trust Degree-Based Usage Control in DRM System. Fen Li, Quan Liu, Qingqi Pei, Liaojun Pang |
| 2010 | On the Reliability of Unicyclic Networks with Vertex Failure. Zhanlan Li |
| 2010 | Online Segmentation Algorithm for Time Series Based on BIRCH Clustering Features. Yu Tu, Yubao Liu, Zhijie Li |
| 2010 | Outward Foreign Direct Investment and Industry Structural Optimization: Analysis and Testing on Data of Republic of Korea. Ren Liang, Li Bing |
| 2010 | P2P-Based Semantic Policy Infrastucture for Pervasive Computing. Fang Pu, Linlang Liu, Yu Shen, Qiying Cao |
| 2010 | Performance Analysis Based on Transform Matrix of MLE in CICA. Zhenyou Wang, Xuejun Gao |
| 2010 | Prediction Discrete Data Used BP Network Based on AGO. Xuejun Gao, Zhenyou Wang |
| 2010 | Privacy-Preserving Classification on Horizontally Partitioned Data. Tian Tian, Hua Duan, Guoping He |
| 2010 | Probability Based Approach for Target Detection and Pose Estimation in Infrared Images. Weiguang Liu, Hailing Lai |
| 2010 | Proxy Re-encryption from CLE to CBE. Ping Wei, Xu An Wang, Xiaoyuan Yang |
| 2010 | Research of Signal Frequency Domain Resolution Based-EMD. Meng Hou, Zeng-li Liu, Haiyan Quan, Yong-de Zhang |
| 2010 | Research on Double Objective Optimization of Master Production Schedule Based on Ant Colony Algorithm. Zhengjia Wu, Wen Wang, Jin Zhou, Fen-fen Ren, Cheng Zhang |
| 2010 | Research on Feature Extraction Based on Genetic Algorithm in Text Categorization. Juan Zou, Jinhua Zheng |
| 2010 | Research on Game Algorithm for Zhang Chess. Zhenzhen Zhang, Defu Zhang |
| 2010 | Research on Validity Evaluation of Mandatory Access Control Policy under LSM Framework. Gaozu Wang, Weihuai Li, Wenbin Li |
| 2010 | Research on Wireless Sensor Network Security. Yan-Xiao Li, Lian Qin, Qian Liang |
| 2010 | Risk Assessment Model of Ship Integrated Navigation System Based on Fuzzy Artificial Neural Network. Hong-bo Li, Yan-ling Hao |
| 2010 | Robust Adaptive Neural Control for a Class of Stochastic Nonlinear Systems. Ruliang Wang, Chaoyang Chen |
| 2010 | Secure Communication Model of WSN Based on Secret Sharing. Xiaohui Zhao, Liaojun Pang, Jingjuan Bi, Qingqi Pei, Huixian Li |
| 2010 | Secure Signcryption Scheme Based on a Hybrid Encryption. Chuanrong Zhang, Lianqing Zheng, Mingwen Xia, Yuqing Zhang |
| 2010 | Securing GPRS Tunnel Protocol in 3G Core Network. Xuena Peng, Yingyou Wen, Hong Zhao |
| 2010 | Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms. Li Yang, Jianfeng Ma, Junwei Zhang |
| 2010 | Semantic Modeling: Computational Models of the Concepts. Viacheslav Wolfengagen |
| 2010 | Ship 3D Collaborate Design Integration System Research. Shao-juan Su, Yin-Dong Liu, Xiao-Ming Liu |
| 2010 | Soft Information Improvement for PN Sequence Iterative Acquisition. Wei Wang, Nianke Zong, Jie Tang, Sangarapillai Lambotharan |
| 2010 | Some New Optimal Pairings. He Shang, Mingqiang Wang |
| 2010 | Stock Index Futures Margin Level Settings by Hill Estimation and Empirical Analysis. Manqi Wu, Sulin Pang |
| 2010 | Study on Commercial Bank Branches Performance Evaluation Using Self-Adaptive RBFNN and UDM. Xiaohua Diao, Shiying Kang |
| 2010 | Synchronization Algorithm for Multi-hop in Wireless Sensor Networks. Hong Yao, Wuneng Zhou |
| 2010 | Target-Acquisition-Performance-Model-Based Quality Metric for Multisensor Image Fusion. Yang Cui, Li Qian, Wu Jie, Zhang Jianqi |
| 2010 | The Analysis of Yeast Cell Morphology Using a Robot Scientist. Yihui Liu, Katherine Martin, Andrew Sparkes, Ross D. King |
| 2010 | The Application of Dominant-Recessive Diploid Codes in MOGA. Na Li, Qing-dao-er-ji Ren |
| 2010 | The Approach of ACARS Data Encryption and Authentication. Meng Yue, Xiaofeng Wu |
| 2010 | The Bipanconnectivity and Hamiltonian-Connectivity of Enhanced Hypercube. Yingying Liu, Hongmei Liu |
| 2010 | The Comparison of Two Kinds of Reproduction in Multiobjective Optimization. Xue-fei Yao, Hai-Lin |
| 2010 | The Particle Swarm Optimization with Decaying ICMIC for Shortest Path Computation in Computer Networks. Huidang Zhang, Yifei Zhang |
| 2010 | The Research of Internet of Things' Supporting Technologies Which Face the Logistics Industry. Yuqiang Chen, Jianlan Guo, Xuanzi Hu |
| 2010 | The Research on Multi-viewpoint Navigation Based on Spherical Panoramic Images. Xiong Shi, Xiaofeng Feng, Jun Chen |
| 2010 | The Study of Credit Risk Evaluation Based on DEA Method. Huaipeng Li, Sulin Pang |
| 2010 | TinyStream: A Lightweight and Novel Stream Cipher Scheme for Wireless Sensor Networks. Tieming Chen, Liang Ge, Xiaohao Wang, Jiamei Cai |
| 2010 | Tool Wear Detection Based on Wavelet Packet and BP Neural Network. Yuxia Qin, Lanshen Guo, Jian Wang |
| 2010 | Tripartite Key Agreement Protocols Based on Digital Certification. Junbing Li, Wei Ji |
| 2010 | USB Key-Based Dual-Factor Dynamic Authentication Scheme. Lei Li, Quan Liu, Xuemei Jiang |
| 2010 | Unsupervised Image Change Detection Based on 2-D Fuzzy Entropy. Wenbang Sun, Hexin Chen, Haiyan Tang, Di Wu |
| 2010 | Violence Detection in Movies with Auditory and Visual Cues. Jian Lin, Yi Sun, Weiqiang Wang |