Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CIS
CIS 2014
Generate Citations
2014 Tenth International Conference on Computational Intelligence and Security (CIS)
Nov. 15 2014 to Nov. 16 2014
Kunming, Yunnan, China
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xvi
Preface
Freely available from IEEE.
pp. xvii-xvii
Conference Organization
Freely available from IEEE.
pp. xviii-xviii
Program Committee
Freely available from IEEE.
pp. xix-xix
Reviewers
Freely available from IEEE.
pp. xx-xx
A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jing Zhang
,
Huanqin Li
A New Model for Energy Consumption Optimization under Cloud Computing and its Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Hai Zhu
,
Xiaoli Wang
,
Hongfeng Wang
A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text Documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-16
by
Ya Wang
,
Ding-Cheng Ji
Adaptive Central Force Optimization with Variable Population Size
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-20
by
Liu Jie
An Adaptive Co-evolutionary Algorithm Based on Genotypic Diversity Measure
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-24
by
Mingzhao Wang
,
Xiaoli Wang
,
Yuping Wang
,
Zhen Wei
An Improved MULTI-ACS Algorithm for the Waste Collection Vehicle Arc Routing Problem with Turn Constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-29
by
Jie Liu
,
Yanfeng He
,
Aiping Zhang
Balance Function Analysis in Variable Weight Decision Making
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-34
by
Deqing Li
,
Wenyi Zeng
,
Junhong Li
,
Ping Guo
Convergence Analysis of Swarm Intelligence Based on Fuzzy Random Variables
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-38
by
Feng Jiqiang
,
Xu Chen
,
Zhang Weiqiang
Financial Time Series Forecasting Using Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-43
by
Bin Gui
,
Xianghe Wei
,
Qiong Shen
,
Jingshan Qi
,
Liqiang Guo
Improved Adaptive Median Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-46
by
Guo Zhengyang
,
Zhang Le
Improved Bacterial Foraging Optimization Algorithm with Information Communication Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-51
by
Ben Niu
,
Jing Liu
,
Ying Bi
,
Ting Xie
,
Lijing Tan
Improving Metabolic Flux Estimation of Metabolic Networks by QPSO with Penalty Function
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-57
by
Haixia Long
,
Shulei Wu
,
Haiyan Fu
Integrating Preferred Weights with Decomposition Based Multi-objective Evolutionary Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-63
by
Zhenhua Li
,
Hai-Lin Liu
Mathematical Models, GRASP Algorithms and Fitness Landscape Analysis for Aircraft Gate Assignment Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-68
by
Yajie Pi
,
Xueyan Song
,
Jizhou Sun
Multi-user Preferences Based Top-k Query Processing Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-73
by
Yunlong Wu
,
Guohua Liu
,
Yuanyuan Liu
Parallel Diversity-Controlled Quantum-Behaved Particle Swarm Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-79
by
Haixia Long
,
Shulei Wu
,
Haiyan Fu
A Feedback-Based Self-Organizing Query Structure Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-84
by
Ruilin Xu
Affinity Propagation-Based Probability Neural Network Structure Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-89
by
Yingjuan Xie
,
Xinnan Fan
,
Junfeng Chen
An Exemplar-Based Hidden Markov Model with Discriminative Visual Features for Lipreading
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-93
by
Xin Liu
,
Yiu-Ming Cheung
Asymptotical Stability Criteria for Time-Delay Static Neural Networks Subject to Stochastic Perturbations
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-98
by
Huasheng Tan
,
Mingang Hua
Brain Storm Optimization Model Based on Uncertainty Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-103
by
Junfeng Chen
,
Yingjuan Xie
,
Jianjun Ni
Design and Implementation: Adaptive Active Queue Management Algorithm Based on Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-108
by
Zhenwei Meng
,
Junlong Qiao
,
Lijun Zhang
Individual Intelligence Based Optimization and Its Application to ITAE Standard Forms
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-113
by
Qiwen Yang
,
Shanshan Fu
,
Yuncan Xue
,
Shanna Ruan
,
Junfeng Chen
Modeling Behaviors of Browsing and Buying for Alidata Discovery Using Joint Non-negative Matrix Factorization
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-118
by
Bin Ju
,
Mincao Ye
,
Yuntao Qian
,
Rong Ni
,
Chenxi Zhu
Multi-scale Monte Carlo-Based Tracking Method for Abrupt Motion
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-123
by
Guanghao Zhang
,
Yao Lu
,
Mukai Chen
The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-128
by
Wenzhang He
,
Hongjian Xu
,
Zhengyang Guo
,
Jie Liang
,
Lina Wang
Wireless Location on CPN Correction Environmental Factors
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-133
by
Zhifeng Lin
,
Jiechang Wen
,
Qiling Chen
A New Genetic Algorithm for Release-Time Aware Divisible-Load Scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-138
by
Xiaoli Wang
,
Yuping Wang
,
Kun Meng
Analysis of Energy Saving and Performance Characteristics of Library Computer Room Intelligent High Heat Transfer and Exchanger
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-142
by
Chen Juntao
,
Wu Shulei
,
Lin Lan
,
Zhan Jinmei
Design & Implementation to an RFID Based Conference Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-147
by
Zhihua Jiang
,
Zhongwei Si
,
Chi Luo
Detecting Driver Use of Mobile Phone Based on In-Car Camera
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-151
by
Dan Wang
,
Mingtao Pei
,
Lan Zhu
Failure-Aware Resource Scheduling Policy for Hybrid Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-156
by
Zhang Hong
,
Zhu Hai
Granular Computing Model Based on Quantum Computing Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-160
by
Jun Hu
,
Chun Guan
Improved Feedback Vertex Sets in Kautz Digraphs K (d, n)
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-165
by
Xirong Xu
,
Chun Yin
,
Sijia Zhang
,
Yazhen Huang
Neuron-MOS-based Dynamic Circuits for Multiple-Valued Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-170
by
Guoqiang Hang
,
Yang Yang
,
Danyan Zhang
,
Xiaohua Li
A Fast Image Stitching Algorithm Based on Improved SURF
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-175
by
Lin Zhu
,
Ying Wang
,
Bo Zhao
,
Xiaozheng Zhang
A Novel Tracking Method Based on Ensemble Metric Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-179
by
Qirun Huo
,
Yao Lu
A Study of Deep Belief Network Based Chinese Speech Emotion Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-184
by
Bu Chen
,
Qian Yin
,
Ping Guo
Action Recognition Using Local Joints Structure and Histograms of 3D Joints
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-188
by
Yan Liang
,
Wanxuan Lu
,
Wei Liang
,
Yucheng Wang
An Improved Bilinear Deep Belief Network Algorithm for Image Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-192
by
Niu Jie
,
Bu Xiongzhu
,
Li Zhong
,
Wang Yao
An Improved Median Filter Algorithm Based on VC in Image Denoising
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-196
by
Shulei Wu
,
Huandong Chen
,
Xiangxiang Xu
,
Haixia Long
,
Wenjuan Jiang
,
Dong Xu
An Improved Multi-pattern Matching Algorithm for Large-Scale Pattern Sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-200
by
Zhan Peng
,
Yuping Wang
,
Jinfeng Xue
An Improved Remote Sensing Image Classification Based on K-Means Using HSV Color Feature
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-204
by
Shulei Wu
,
Huandong Chen
,
Zhizhong Zhao
,
Haixia Long
,
Chunhui Song
Bimodal Learning for Multi-concept Image Query
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-209
by
Haijiao Xu
,
Peng Pan
,
Yansheng Lu
,
Chunyan Xu
,
Deng Chen
Design of a Flash Digital Watermarking Application Using MATLAB GUI
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-212
by
Wen-Juan Jiang
,
Dong Xu
,
Shu-Lei Wu
,
Bin Meng
Detecting Circles on Ego Network Based on Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Qiguang Miao
,
Xing Tang
,
Yining Quan
,
Kai Deng
Domain-Specific Product Named Entity Recognition from Chinese Microblog
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-222
by
Xianxiang Yang
,
Heyan Huang
,
Xin Xin
,
Quanchao Liu
,
Xiaochi Wei
Experiments with Feature-Prior Hybrid Ensemble Method for Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-227
by
Junyang Zhao
,
Zhili Zhang
,
Chongzhao Han
,
Lijiang Sun
Image Denoising Using Low-Rank Dictionary and Sparse Representation
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-232
by
Tao Li
,
Weiwei Wang
,
Long Xu
,
Xiangchu Feng
Image Up-Scaling: Based on Self Similarity and Local Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-237
by
Xin Zheng
,
Chenlei Lv
,
Qingqing Xu
,
Ping Guo
Joint Sequential Shape Classification and Piecewise Elastic Motion Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-241
by
Feng Lv
,
Huijun Di
,
Yao Lu
Multiview Face Retrieval in Surveillance Video by Active Training Sample Collection
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-246
by
Xu Xiao-Ma
,
Pei Ming-Tao
Nonlocal Diffusion Tensor for Visual Saliency Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-251
by
Xiujun Zhang
,
Chen Xu
,
Min Li
Rapid Face Detection in Static Video Using Background Subtraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-255
by
Wencai Zou
,
Yao Lu
,
Mukai Chen
,
Feng Lv
Spatio-Temporal Context for More Accurate Dense Point Trajectories Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-259
by
Qingxuan Shi
,
Yao Lu
,
Tianfei Zhou
Tracking Non-rigid Object Using Discriminative Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-263
by
Qian Wang
,
Qingxuan Shi
,
Xuedong Tian
Vehicle Color Recognition Based on License Plate Color
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-267
by
Yanmei Dong
,
Mingtao Pei
,
Xiameng Qin
A New Biclustering Algorithm for Time-Series Gene Expression Data Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-272
by
Yun Xue
,
Zhengling Liao
,
Meihang Li
,
Jie Luo
,
Xiaohui Hu
,
Guiyin Luo
,
Wen-Sheng Chen
A Parallel Algorithm for Datacleansing in Incomplete Information Systems Using MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-277
by
Fei Chen
,
Lin Jiang
Application of Investment Plan Selection Based on Variable Weight Synthesis and Mahalanobis Distance
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-282
by
Ai Zhenghai
,
Si Zhongwei
Extracting Hyponymy of Ontology Concepts from Patent Documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-287
by
Junfeng Li
,
Xueqiang Lv
,
Kehui Liu
Identifying Relevant Messages for Social TV
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-292
by
Weibo Li
,
Chunhong Zhang
,
Xiaofeng Qiu
,
Yang Ji
N-gram Index Structure Study for Semantic Based Mathematical Formula
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-298
by
Yuexia Xu
,
Wei Su
,
Ming Cheng
,
Zhiyi Qu
,
Hui Li
On Modeling and Querying of Text Corpora
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-303
by
Dingjia Liu
,
Guohua Liu
,
Yuanyuan Liu
Relative Efficiency of Third-Grade General Public Hospitals in Zhejiang Province, China
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-307
by
Lin Kai
,
Ni Rong
,
Shao Yan-Hua
,
Wu Si-Jing
,
Ma Xiao-Jiao
The Automatic Classification Research to Medical Imaging Disease Based on Naïve Nayesion Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-311
by
Niu Luoyong
,
Hong Jiaming
,
Huo Hongbo
,
He Bishi
,
Xu Zhe
A Minimum-Elimination-Escape Function Method for Multimodal Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-316
by
Lei Fan
,
Xiyang Liu
,
Liping Jia
An Evolutionary Algorithm Based on a Space-Gridding Scheme for Constrained Multi-objective Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-320
by
Wen Li
,
Hecheng Li
Combining TOPSIS and Particle Swarm Optimization for a Class of Nonlinear Bilevel Programming Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-325
by
Liping Jia
,
Guocheng Zou
,
Lei Fan
Dependence System and its Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-329
by
Xuejun Huang
,
Xiaobin Qu
On the Field Patterns in Elliptic-Shaped Microshield Lines Loaded with Left-Handed Materials by the Edge-Based Finite Element Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-333
by
Hai Sun
Optimal Pricing with Yield Management in M/M/c
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-337
by
Xin Li
,
Zhaotong Lian
Simulation Study on the Keep-Right-Except-to-Pass Rule Model Based on Cellular Automata
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-342
by
Xin Yang
,
Linna Wang
,
Hongbo Zai
,
Yanrong Ren
The Hilbert Boundary Value Problem for Beltrami Equation in Clifford Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-347
by
Si Zhongwei
,
Liang Lina
,
Ai Zhenghai
,
Jiang Zhihua
The Sufficiency of Solution for Multi-objective Semi-infinite Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-351
by
Xiangyou Li
,
Qingxiang Zhang
Variational Image Decomposition in Shearlet Smoothness Spaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-355
by
Min Li
,
Xiaoli Sun
,
Chen Xu
A 6 Dimensional Chaotic Generalized Synchronization System and Design of Pseudorandom Number Generator with Application in Image Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-362
by
Lequan Min
,
Xu Lan
,
Longjie Hao
,
Xiuping Yang
A Chosen-Plaintext Method of CPA on SM4 Block Cipher
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-366
by
Weijun Shan
,
Lihui Wang
,
Qing Li
,
Limin Guo
,
Shanshan Liu
,
Zhimin Zhang
A New Sybil Attack Detection for Wireless Body Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-370
by
Ruixia Liu
,
Yinglong Wang
A Trust-Role Based Context Aware Access Control Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-376
by
Chen Lu
,
Zhou Qing
,
Huang Gao-feng
,
Zhang Li-qiang
A User-Based Document Management Mechanism in Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-381
by
Guozhen Shi
,
Mang Su
,
Fenghua Li
,
Jiapeng Lou
,
Qiong Huang
Attribute-Based Keyword Search and Data Access Control in Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-386
by
Jiazhi Li
,
Lei Zhang
Design of a Masked S-Box for SM4 Based on Composite Field
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-391
by
Hao Liang
,
Liji Wu
,
Xiangmin Zhang
,
Jiabin Wang
Detecting Compromised VM via Application-Aware Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-396
by
Kai Luo
,
Shouzhong Tu
,
Chunhe Xia
,
Dan Zhou
IP Traceback Algorithm Based on Deterministic Linear Network Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-401
by
Qiao Yan
,
Nan Lu
,
Tu-Wen Ning
,
Xi-Yan Yao
,
Bao-Guang Li
Study on the Pass Rate of NIST SP800-22 Statistical Test Suite
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-404
by
Dong Lihua
,
Zeng Yong
,
Ji Ligang
,
Han Xucang
Wavelet-Based Noise Reduction in Power Analysis Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-409
by
Wei Liu
,
Liji Wu
,
Xiangmin Zhang
,
An Wang
A Countermeasure for DES with Both Rotating Masks and Secured S-Boxes
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-414
by
Zeleng Zhuang
,
Jiachao Chen
,
Haosheng Zhang
A Low-Cost PKC-based RFID Authentication Protocol and its Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-419
by
Lili Wei
,
Zhaotong Luo
,
Qiang Qu
,
Qing He
,
Jingwei Xu
A Method of Multiple Encryption and Sectional Encryption Protocol Reverse Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-424
by
Wei Lin
,
Jinlong Fei
,
Yuefei Zhu
,
Xiaolong Shi
A Random Sampling Algorithm for SVP Challenge Based on y-Sparse Representations of Short Lattice Vectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 425-429
by
Dan Ding
,
Guizhen Zhu
A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICs
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-434
by
Liang Dai
,
Huiyun Li
,
Guoqing Xu
,
Liying Xiong
Showing 100 out of 179
Load More
Load All