Default Cover Image

2014 Tenth International Conference on Computational Intelligence and Security (CIS)

Nov. 15 2014 to Nov. 16 2014

Kunming, Yunnan, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xvi
PrefaceFreely available from IEEE.pp. xvii-xvii
Conference OrganizationFreely available from IEEE.pp. xviii-xviii
Program CommitteeFreely available from IEEE.pp. xix-xix
ReviewersFreely available from IEEE.pp. xx-xx
A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A New Model for Energy Consumption Optimization under Cloud Computing and its Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 12-16
Adaptive Central Force Optimization with Variable Population SizeFull-text access may be available. Sign in or learn about subscription options.pp. 17-20
An Adaptive Co-evolutionary Algorithm Based on Genotypic Diversity MeasureFull-text access may be available. Sign in or learn about subscription options.pp. 21-24
An Improved MULTI-ACS Algorithm for the Waste Collection Vehicle Arc Routing Problem with Turn ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
Balance Function Analysis in Variable Weight Decision MakingFull-text access may be available. Sign in or learn about subscription options.pp. 30-34
Convergence Analysis of Swarm Intelligence Based on Fuzzy Random VariablesFull-text access may be available. Sign in or learn about subscription options.pp. 35-38
Financial Time Series Forecasting Using Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 39-43
Improved Adaptive Median FilterFull-text access may be available. Sign in or learn about subscription options.pp. 44-46
Improved Bacterial Foraging Optimization Algorithm with Information Communication MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 47-51
Improving Metabolic Flux Estimation of Metabolic Networks by QPSO with Penalty FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 52-57
Integrating Preferred Weights with Decomposition Based Multi-objective Evolutionary AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 58-63
Mathematical Models, GRASP Algorithms and Fitness Landscape Analysis for Aircraft Gate Assignment ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 64-68
Multi-user Preferences Based Top-k Query Processing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 69-73
Parallel Diversity-Controlled Quantum-Behaved Particle Swarm Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 74-79
A Feedback-Based Self-Organizing Query Structure Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 80-84
Affinity Propagation-Based Probability Neural Network Structure OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 85-89
An Exemplar-Based Hidden Markov Model with Discriminative Visual Features for LipreadingFull-text access may be available. Sign in or learn about subscription options.pp. 90-93
Asymptotical Stability Criteria for Time-Delay Static Neural Networks Subject to Stochastic PerturbationsFull-text access may be available. Sign in or learn about subscription options.pp. 94-98
Brain Storm Optimization Model Based on Uncertainty InformationFull-text access may be available. Sign in or learn about subscription options.pp. 99-103
Design and Implementation: Adaptive Active Queue Management Algorithm Based on Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 104-108
Individual Intelligence Based Optimization and Its Application to ITAE Standard FormsFull-text access may be available. Sign in or learn about subscription options.pp. 109-113
Multi-scale Monte Carlo-Based Tracking Method for Abrupt MotionFull-text access may be available. Sign in or learn about subscription options.pp. 119-123
Wireless Location on CPN Correction Environmental FactorsFull-text access may be available. Sign in or learn about subscription options.pp. 129-133
A New Genetic Algorithm for Release-Time Aware Divisible-Load SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 134-138
Design & Implementation to an RFID Based Conference Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 143-147
Detecting Driver Use of Mobile Phone Based on In-Car CameraFull-text access may be available. Sign in or learn about subscription options.pp. 148-151
Failure-Aware Resource Scheduling Policy for Hybrid CloudFull-text access may be available. Sign in or learn about subscription options.pp. 152-156
Granular Computing Model Based on Quantum Computing TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 157-160
Improved Feedback Vertex Sets in Kautz Digraphs K (d, n)Full-text access may be available. Sign in or learn about subscription options.pp. 161-165
Neuron-MOS-based Dynamic Circuits for Multiple-Valued LogicFull-text access may be available. Sign in or learn about subscription options.pp. 166-170
A Fast Image Stitching Algorithm Based on Improved SURFFull-text access may be available. Sign in or learn about subscription options.pp. 171-175
A Novel Tracking Method Based on Ensemble Metric LearningFull-text access may be available. Sign in or learn about subscription options.pp. 176-179
A Study of Deep Belief Network Based Chinese Speech Emotion RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 180-184
Action Recognition Using Local Joints Structure and Histograms of 3D JointsFull-text access may be available. Sign in or learn about subscription options.pp. 185-188
An Improved Bilinear Deep Belief Network Algorithm for Image ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 189-192
An Improved Median Filter Algorithm Based on VC in Image DenoisingFull-text access may be available. Sign in or learn about subscription options.pp. 193-196
An Improved Multi-pattern Matching Algorithm for Large-Scale Pattern SetsFull-text access may be available. Sign in or learn about subscription options.pp. 197-200
An Improved Remote Sensing Image Classification Based on K-Means Using HSV Color FeatureFull-text access may be available. Sign in or learn about subscription options.pp. 201-204
Bimodal Learning for Multi-concept Image QueryFull-text access may be available. Sign in or learn about subscription options.pp. 205-209
Design of a Flash Digital Watermarking Application Using MATLAB GUIFull-text access may be available. Sign in or learn about subscription options.pp. 210-212
Detecting Circles on Ego Network Based on StructureFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Domain-Specific Product Named Entity Recognition from Chinese MicroblogFull-text access may be available. Sign in or learn about subscription options.pp. 218-222
Experiments with Feature-Prior Hybrid Ensemble Method for ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 223-227
Image Denoising Using Low-Rank Dictionary and Sparse RepresentationFull-text access may be available. Sign in or learn about subscription options.pp. 228-232
Image Up-Scaling: Based on Self Similarity and Local InformationFull-text access may be available. Sign in or learn about subscription options.pp. 233-237
Joint Sequential Shape Classification and Piecewise Elastic Motion EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 238-241
Multiview Face Retrieval in Surveillance Video by Active Training Sample CollectionFull-text access may be available. Sign in or learn about subscription options.pp. 242-246
Nonlocal Diffusion Tensor for Visual Saliency DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 247-251
Rapid Face Detection in Static Video Using Background SubtractionFull-text access may be available. Sign in or learn about subscription options.pp. 252-255
Spatio-Temporal Context for More Accurate Dense Point Trajectories EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 256-259
Tracking Non-rigid Object Using Discriminative FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 260-263
Vehicle Color Recognition Based on License Plate ColorFull-text access may be available. Sign in or learn about subscription options.pp. 264-267
A New Biclustering Algorithm for Time-Series Gene Expression Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 268-272
A Parallel Algorithm for Datacleansing in Incomplete Information Systems Using MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 273-277
Application of Investment Plan Selection Based on Variable Weight Synthesis and Mahalanobis DistanceFull-text access may be available. Sign in or learn about subscription options.pp. 278-282
Extracting Hyponymy of Ontology Concepts from Patent DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 283-287
Identifying Relevant Messages for Social TVFull-text access may be available. Sign in or learn about subscription options.pp. 288-292
N-gram Index Structure Study for Semantic Based Mathematical FormulaFull-text access may be available. Sign in or learn about subscription options.pp. 293-298
On Modeling and Querying of Text CorporaFull-text access may be available. Sign in or learn about subscription options.pp. 299-303
Relative Efficiency of Third-Grade General Public Hospitals in Zhejiang Province, ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 304-307
The Automatic Classification Research to Medical Imaging Disease Based on Naïve Nayesion AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 308-311
A Minimum-Elimination-Escape Function Method for Multimodal Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 312-316
An Evolutionary Algorithm Based on a Space-Gridding Scheme for Constrained Multi-objective Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 317-320
Combining TOPSIS and Particle Swarm Optimization for a Class of Nonlinear Bilevel Programming ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 321-325
Dependence System and its StructureFull-text access may be available. Sign in or learn about subscription options.pp. 326-329
On the Field Patterns in Elliptic-Shaped Microshield Lines Loaded with Left-Handed Materials by the Edge-Based Finite Element MethodFull-text access may be available. Sign in or learn about subscription options.pp. 330-333
Optimal Pricing with Yield Management in M/M/cFull-text access may be available. Sign in or learn about subscription options.pp. 334-337
Simulation Study on the Keep-Right-Except-to-Pass Rule Model Based on Cellular AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 338-342
The Hilbert Boundary Value Problem for Beltrami Equation in Clifford AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 343-347
The Sufficiency of Solution for Multi-objective Semi-infinite ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 348-351
Variational Image Decomposition in Shearlet Smoothness SpacesFull-text access may be available. Sign in or learn about subscription options.pp. 352-355
A Chosen-Plaintext Method of CPA on SM4 Block CipherFull-text access may be available. Sign in or learn about subscription options.pp. 363-366
A New Sybil Attack Detection for Wireless Body Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 367-370
A Trust-Role Based Context Aware Access Control ModelFull-text access may be available. Sign in or learn about subscription options.pp. 371-376
A User-Based Document Management Mechanism in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 377-381
Attribute-Based Keyword Search and Data Access Control in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 382-386
Design of a Masked S-Box for SM4 Based on Composite FieldFull-text access may be available. Sign in or learn about subscription options.pp. 387-391
Detecting Compromised VM via Application-Aware Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 392-396
IP Traceback Algorithm Based on Deterministic Linear Network CodingFull-text access may be available. Sign in or learn about subscription options.pp. 397-401
Study on the Pass Rate of NIST SP800-22 Statistical Test SuiteFull-text access may be available. Sign in or learn about subscription options.pp. 402-404
Wavelet-Based Noise Reduction in Power Analysis AttackFull-text access may be available. Sign in or learn about subscription options.pp. 405-409
A Countermeasure for DES with Both Rotating Masks and Secured S-BoxesFull-text access may be available. Sign in or learn about subscription options.pp. 410-414
A Low-Cost PKC-based RFID Authentication Protocol and its ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 415-419
A Method of Multiple Encryption and Sectional Encryption Protocol Reverse EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 420-424
A Random Sampling Algorithm for SVP Challenge Based on y-Sparse Representations of Short Lattice VectorsFull-text access may be available. Sign in or learn about subscription options.pp. 425-429
A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICsFull-text access may be available. Sign in or learn about subscription options.pp. 430-434
Showing 100 out of 179