Default Cover Image

2016 12th International Conference on Computational Intelligence and Security (CIS)

Dec. 16 2016 to Dec. 19 2016

Wuxi, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xvii
PrefaceFreely available from IEEE.pp. xviii-xviii
Organizing CommitteeFreely available from IEEE.pp. xix-xix
Program CommitteeFreely available from IEEE.pp. xx-xxi
Additional ReviewersFreely available from IEEE.pp. xxii-xxii
The PTAS of Prediction for RNA Pseudoknotted StructureFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Hadoop-Based Dynamic Load Balance Scheduling Algorithm of Logistics InventoryFull-text access may be available. Sign in or learn about subscription options.pp. 5-8
Bayesian Quantile Regression and Variable Selection for Count Data with an Application to Youth Fitness SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 14-18
Exact Solutions of the Higher Order Nonlinear Schrödinger EquationFull-text access may be available. Sign in or learn about subscription options.pp. 19-22
H-DAT: An Improved Buffer Scheduling Algorithm for Multi-Channel SSDFull-text access may be available. Sign in or learn about subscription options.pp. 23-27
An Improved Differential Evolution with a Novel Restart MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 28-32
A New Evolutionary Algorithm Based on Decomposition for Multi-Objective Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 33-38
Properly Pareto Optimality Based Multiobjective Evolutionary Algorithm for Constrained OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 39-43
A Novel Spectrum Profile Fitting Method of Non-Gaussian ModelFull-text access may be available. Sign in or learn about subscription options.pp. 44-47
Mixed Duality of Multi-Objective Programming Involving a Kind of Generalized ConvexityFull-text access may be available. Sign in or learn about subscription options.pp. 48-51
An Ameliorated Teaching-Learning Based Optimization Algorithm for Nonlinear Bilevel ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 52-56
A Device-Free Number Gesture Recognition Approach Based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 57-63
The Assessment Study of Airport Staff Work Performance Based on Fuzzy Comprehensive EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 64-68
A Framework for Compressive-Sensing of 3D Point CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 69-72
Research on Distributed Logistics Inventory Model Based on Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 73-77
A Solution Approach to Bilevel Linear Programming with Fuzzy CoefficientsFull-text access may be available. Sign in or learn about subscription options.pp. 78-81
Dynamic Ternary Logic Gate Using Neuron-MOS Literal Circuit and Double Pass-Transistor LogicFull-text access may be available. Sign in or learn about subscription options.pp. 82-86
A Novel Approach to Automatic Rating of Subjective Answers Based on Semantic Matching of KeywordsFull-text access may be available. Sign in or learn about subscription options.pp. 87-90
A Novel OCR Approach Based on Document Layout Analysis and Text Block ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 91-94
Analysis of Projection Accuracy of Synthetic Image in Combined Vision SystemFull-text access may be available. Sign in or learn about subscription options.pp. 95-99
A Novel System Architecture for Ontology MatchingFull-text access may be available. Sign in or learn about subscription options.pp. 100-102
Curvelet Shrinkage Based Iterative Regularization Method for Image DenoisingFull-text access may be available. Sign in or learn about subscription options.pp. 103-106
Local and Non-Local Feature-Based Kernel Nonnegative Matrix Factorization Method for Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 107-110
A Prototype Selection Algorithm Based on Extended Near Neighbor and Affinity ChangeFull-text access may be available. Sign in or learn about subscription options.pp. 111-115
Semi-Supervised Recursive Autoencoders for Social Review Spam DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 116-119
Pulsar Candidate Selection by Assembling Positive Sample Emphasized ClassifiersFull-text access may be available. Sign in or learn about subscription options.pp. 120-124
Comparison of Two Cosmic Rays Positioning AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 125-128
Data Dynamic Mining and Its Attribute Logic RelationFull-text access may be available. Sign in or learn about subscription options.pp. 129-133
Multi-Level Clustering Algorithm for Star/Galaxy SeparationFull-text access may be available. Sign in or learn about subscription options.pp. 134-137
A Multi-Subgroup Hierarchical Hybrid of Central Force Optimization and Gravity Search AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 138-141
An Adaptively Disperse Centroids K-Means Algorithm Based on MapReduce ModelFull-text access may be available. Sign in or learn about subscription options.pp. 142-146
Image Denoising Algorithm Based on Structure and Texture PartFull-text access may be available. Sign in or learn about subscription options.pp. 147-151
A New Image Inpainting Algorithm Based on DCT Similar Patches FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 152-155
Face Recognition Based on Discriminative Low-Rank Matrix Recovery with Sparse ConstraintFull-text access may be available. Sign in or learn about subscription options.pp. 156-160
Semantic Word Rank Algorithm Based on the Relation Degree of the WordsFull-text access may be available. Sign in or learn about subscription options.pp. 161-164
A New Dominance Relation Based on Simplex for Many Objective Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 175-178
An Improved Differential Evolution Algorithm for Unconstrained Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 179-181
A New Cooperative Coevolution with a New Auxiliary Function for Large Scale Global OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 182-185
Brain Storm Optimization with Discrete Particle Swarm Optimization for TSPFull-text access may be available. Sign in or learn about subscription options.pp. 190-193
Hybridizing Differential Evolution and Nelder-Mead Simplex Algorithm for Global OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 198-202
A Novel Method of Correlation Power Analysis on SM4 Hardware ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 203-207
Perturbation Correction Calculation Method for Remote Rendezvous between Non-Coplanar Elliptic OrbitsFull-text access may be available. Sign in or learn about subscription options.pp. 208-212
Toward Automatic Review of Building Energy Efficiency Based on Building Information ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Salient Object Detection via Video Spatio-Temporal Difference and CoherenceFull-text access may be available. Sign in or learn about subscription options.pp. 218-222
Multi-User and Keyword-Based Searchable Encryption SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 223-227
An Efficient Ring Signature Scheme Based on Syndrome Decoding ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 228-232
Profiling Attack on Modular Multiplication of Elliptic Curve CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 233-236
A Dynamic Trust Management Mechanism in Distributed CRNsFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
Analysis of Information Security of Electric Power Big Data and Its CountermeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 243-248
A Security Evaluation and Certification Management Database Based on ISO/IEC StandardsFull-text access may be available. Sign in or learn about subscription options.pp. 249-253
A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 254-258
Research on the Reasoning Mechanism of Copyright Protection of Digital Content Based on the Petri NetFull-text access may be available. Sign in or learn about subscription options.pp. 259-262
Discussion on the Intension and Value of Design Techniques of Chinese Character in Word StockFull-text access may be available. Sign in or learn about subscription options.pp. 263-266
A Security Threats Taxonomy for Routing System Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 267-270
Secure Identity-Based Authentication Scheme Suitable for Limited-Resource DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
Scalable Group Audio-Based Authentication Scheme for IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 277-281
Design and Application of IBE Email Encryption Based on Pseudo RSA CertificateFull-text access may be available. Sign in or learn about subscription options.pp. 282-286
The Distributed Dissimilar Redundancy Architecture of Fly-by-Wire Flight Control SystemFull-text access may be available. Sign in or learn about subscription options.pp. 287-293
Security-Aware Routing and Core Allocation in Elastic Optical Network with Multi-coreFull-text access may be available. Sign in or learn about subscription options.pp. 294-298
Multiple Object Tracking Based on Robust Network Flow ModelFull-text access may be available. Sign in or learn about subscription options.pp. 299-303
A Novel Storage and Search Scheme in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 304-308
Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules LearningFull-text access may be available. Sign in or learn about subscription options.pp. 309-313
A Port Hopping Based DoS Mitigation Scheme in SDN NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 314-317
Testing Network Protocol Binary Software with Selective Symbolic ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
Predicting User Retweet Behaviors Based on Energy OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 327-330
An Outlier Detection Method Based on PageRank AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 331-335
The Threat Assessments of the Cracks to the Soil Sites via Image AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 336-339
Research on Performance of Motion Platform of 3-RPS Flight SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 340-344
Research on Surface Movement Parameters of Shallow Buried Coal Seam with Central Force OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 345-348
Data-Based Axle Temperature Prediction of High Speed Train by Multiple Regression AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 349-353
An Optimized Algorithm in Risk CalculatingFull-text access may be available. Sign in or learn about subscription options.pp. 354-357
Ensemble Model for Stock Price Movement Trend Prediction on Different Investing PeriodsFull-text access may be available. Sign in or learn about subscription options.pp. 358-361
A Comprehensive Research on Evaluation of Port Competitiveness FactorsFull-text access may be available. Sign in or learn about subscription options.pp. 362-365
Research on the Urbanization Strategy of Rural PopulationFull-text access may be available. Sign in or learn about subscription options.pp. 366-369
Study on Logistics Outsourcing Strategy of E-Commerce Based on Revenue Sharing ContractFull-text access may be available. Sign in or learn about subscription options.pp. 370-373
One Algorithm of Gesture Animation SynthesisFull-text access may be available. Sign in or learn about subscription options.pp. 374-377
Research on Cloud Computing Resource Management Model Based on Multi-Agent SystemFull-text access may be available. Sign in or learn about subscription options.pp. 378-381
Research on the Multi-Tenant Placement Genetic Algorithm Based on Eucalyptus PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 382-385
A Prediction Method Based on Stepwise Regression Analysis for Train Axle TemperatureFull-text access may be available. Sign in or learn about subscription options.pp. 386-390
Study on the Relation between Virus and Host Cell by Alignment-Free Sequence ComparisonFull-text access may be available. Sign in or learn about subscription options.pp. 391-394
Evaluation of Regional Logistics Industry Development Level Based on Grey EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 395-398
A Hybrid LWNN-Based Stochastic Noise Eliminating Method for Fiber Optic GyroFull-text access may be available. Sign in or learn about subscription options.pp. 399-402
License Plate Segmentation and Recognition of Chinese Vehicle Based on BPNNFull-text access may be available. Sign in or learn about subscription options.pp. 403-406
Research Status of Artificial Neural Network and Its Application Assumption in AviationFull-text access may be available. Sign in or learn about subscription options.pp. 407-410
A Job Shop Scheduling Algorithm Using Big Bang-Big Crunch StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 411-414
Energy-Aware Scheduling of Workflow in Cloud Center with Deadline ConstraintFull-text access may be available. Sign in or learn about subscription options.pp. 415-418
Showing 100 out of 169