Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CIS
CIS 2016
Generate Citations
2016 12th International Conference on Computational Intelligence and Security (CIS)
Dec. 16 2016 to Dec. 19 2016
Wuxi, China
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xvii
Preface
Freely available from IEEE.
pp. xviii-xviii
Organizing Committee
Freely available from IEEE.
pp. xix-xix
Program Committee
Freely available from IEEE.
pp. xx-xxi
Additional Reviewers
Freely available from IEEE.
pp. xxii-xxii
The PTAS of Prediction for RNA Pseudoknotted Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Zhendong Liu
,
Shimin Zhao
,
Hongchao Ye
,
Jiwei Wang
,
Dehui Kong
,
Hui Wang
Hadoop-Based Dynamic Load Balance Scheduling Algorithm of Logistics Inventory
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-8
by
Wenjing Li
,
Jie Zhou
,
Zhongming Lin
,
Xiangbo Zhang
Divisible-Load Scheduling for Network-Based Computing Systems with Processor Startup Overheads and Release Times
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-13
by
Xiaoli Wang
,
Yuping Wang
,
Junfan Lai
Bayesian Quantile Regression and Variable Selection for Count Data with an Application to Youth Fitness Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-18
by
Jing Lv
,
Yingzi Fu
Exact Solutions of the Higher Order Nonlinear Schrödinger Equation
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-22
by
Tianqi Luo
,
Xin Huang
H-DAT: An Improved Buffer Scheduling Algorithm for Multi-Channel SSD
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-27
by
MingWei Yang
,
YaHui Li
,
YaDi Zhang
,
WanRen Wang
An Improved Differential Evolution with a Novel Restart Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-32
by
Mengnan Tian
,
Xingbao Gao
,
Xueqing Yan
A New Evolutionary Algorithm Based on Decomposition for Multi-Objective Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-38
by
Cai Dai
,
Xiujuan Lei
Properly Pareto Optimality Based Multiobjective Evolutionary Algorithm for Constrained Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-43
by
Ning Dong
A Novel Spectrum Profile Fitting Method of Non-Gaussian Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-47
by
Haijing Zhu
,
Bo Qiu
,
Bochong Han
,
Yuanyuan Liu
,
Xiaodong Fan
Mixed Duality of Multi-Objective Programming Involving a Kind of Generalized Convexity
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-51
by
Xiangyou Li
An Ameliorated Teaching-Learning Based Optimization Algorithm for Nonlinear Bilevel Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-56
by
Liping Jia
,
Zhonghua Li
A Device-Free Number Gesture Recognition Approach Based on Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-63
by
Qizhen Zhou
,
Jianchun Xing
,
Juelong Li
,
Qiliang Yang
The Assessment Study of Airport Staff Work Performance Based on Fuzzy Comprehensive Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-68
by
Rong Huang
,
Xinhong Hei
,
Xiaofan Wang
,
Jing Zhao
A Framework for Compressive-Sensing of 3D Point Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-72
by
Vahid Behravan
,
Gurjeet Singh
,
Patrick Y. Chiang
Research on Distributed Logistics Inventory Model Based on Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-77
by
Wenjing Li
,
Zhongming Lin
,
Xiangbo Zhang
,
Jie Zhou
A Solution Approach to Bilevel Linear Programming with Fuzzy Coefficients
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-81
by
Aihong Ren
,
Xingsi Xue
Dynamic Ternary Logic Gate Using Neuron-MOS Literal Circuit and Double Pass-Transistor Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-86
by
Guoqiang Hang
,
Yang Yang
,
Danyan Zhang
,
Xiaohui Hu
A Novel Approach to Automatic Rating of Subjective Answers Based on Semantic Matching of Keywords
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-90
by
Shun Long
,
Qunhao Feng
,
Wenwei Chen
A Novel OCR Approach Based on Document Layout Analysis and Text Block Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-94
by
Weiheng Zhu
,
Yuanfeng Liu
,
Liang Hao
Analysis of Projection Accuracy of Synthetic Image in Combined Vision System
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-99
by
Lei Zhang
,
Zhengjun Zhai
,
Yue Cheng
,
Wensheng Niu
A Novel System Architecture for Ontology Matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-102
by
Xingsi Xue
,
Jinshui Wang
,
Aihong Ren
Curvelet Shrinkage Based Iterative Regularization Method for Image Denoising
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-106
by
Min Li
,
Xiaoli Sun
Local and Non-Local Feature-Based Kernel Nonnegative Matrix Factorization Method for Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-110
by
Wensheng Chen
,
Qian Wang
,
Binbin Pan
,
Yugao Li
A Prototype Selection Algorithm Based on Extended Near Neighbor and Affinity Change
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-115
by
Juan Li
,
Xiaofang Guo
Semi-Supervised Recursive Autoencoders for Social Review Spam Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-119
by
Baohua Wang
,
Junlian Huang
,
Haihong Zheng
,
Hui Wu
Pulsar Candidate Selection by Assembling Positive Sample Emphasized Classifiers
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-124
by
Yao Yao
,
Xin Xin
,
Ping Guo
Comparison of Two Cosmic Rays Positioning Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-128
by
Bochong Han
,
Bo Qiu
,
Haijing Zhu
,
Yuanyuan Liu
,
Xiaodong Fan
Data Dynamic Mining and Its Attribute Logic Relation
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-133
by
Haiyan Fu
,
Dong Xu
Multi-Level Clustering Algorithm for Star/Galaxy Separation
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-137
by
Hui Du
,
Yuping Wang
,
Chuchu Ren
,
Junkun Zhong
,
Xiaozhi Gao
A Multi-Subgroup Hierarchical Hybrid of Central Force Optimization and Gravity Search Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-141
by
Fei Qin
,
Jie Liu
,
Jing Li
,
Bin Zhou
An Adaptively Disperse Centroids K-Means Algorithm Based on MapReduce Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-146
by
Bin Wang
,
Zheng Lv
,
Jinwei Zhao
,
Xiaofan Wang
,
Tong Zhang
Image Denoising Algorithm Based on Structure and Texture Part
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-151
by
Yifeng Cheng
,
Zengli Liu
A New Image Inpainting Algorithm Based on DCT Similar Patches Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-155
by
Jingsi Ou
,
Wensheng Chen
,
Binbin Pan
,
Yugao Li
Face Recognition Based on Discriminative Low-Rank Matrix Recovery with Sparse Constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-160
by
Xue Zhou
,
Zhengqun Wang
,
Zhibo Guo
,
Dongling Zhai
Semantic Word Rank Algorithm Based on the Relation Degree of the Words
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-164
by
Huijian Han
,
Kai Fu
,
Xiusheng Sun
,
Zhenxian Li
Sentiment Classification with Convolutional Neural Networks: An Experimental Study on a Large-Scale Chinese Conversation Corpus
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-169
by
Lei Zhang
,
Chengcai Chen
A Two Phase Approach Based on Dynamic Variable Grouping and Self-Adaptive Group Search for Large Scale Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-174
by
Haiyan Liu
,
Yuping Wang
,
Liwen Liu
,
Xiaodong Li
,
Xiaozhi Gao
A New Dominance Relation Based on Simplex for Many Objective Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-178
by
Jiawei Yuan
,
Hailin Liu
An Improved Differential Evolution Algorithm for Unconstrained Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-181
by
Jie Liu
,
Xiaofang Guo
A New Cooperative Coevolution with a New Auxiliary Function for Large Scale Global Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-185
by
Fei Wei
,
Shugang Li
,
Jing Li
Double Heuristic Optimization Based on Hierarchical Partitioning for Coverage Path Planning of Robot Mowers
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-189
by
Jingyu Wang
,
Junfeng Chen
,
Shi Cheng
,
Yingjuan Xie
Brain Storm Optimization with Discrete Particle Swarm Optimization for TSP
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-193
by
Zhoudong Hua
,
Junfeng Chen
,
Yingjuan Xie
A Renewable Energy Cooperation Scheme for OFDM Systems Using Evolutionary Many-Objective Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-197
by
Qiang Wang
,
Hailin Liu
,
Yiu-Ming Cheung
Hybridizing Differential Evolution and Nelder-Mead Simplex Algorithm for Global Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-202
by
Hongwei Lin
A Novel Method of Correlation Power Analysis on SM4 Hardware Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-207
by
Sulong Tang
,
Liji Wu
,
Xiangmin Zhang
,
Xingjun Wu
,
Beibei Wang
Perturbation Correction Calculation Method for Remote Rendezvous between Non-Coplanar Elliptic Orbits
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-212
by
Yan Chang
,
Yong Xian
,
Jie Li
,
Daqiao Zhang
,
Jing Gao
Toward Automatic Review of Building Energy Efficiency Based on Building Information Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Qin Zhao
,
Zeyu Chen
,
Yiyun Zhu
,
Zhe Li
,
Xinhong Hei
Salient Object Detection via Video Spatio-Temporal Difference and Coherence
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-222
by
Lei Huang
,
Bin Luo
Multi-User and Keyword-Based Searchable Encryption Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-227
by
Yaling Zhang
,
Lijun Liu
,
Shangping Wang
An Efficient Ring Signature Scheme Based on Syndrome Decoding Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-232
by
Siyuan Chen
,
Peng Zeng
,
Kim-Kwang Raymond Choo
,
Qin Wang
Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-236
by
Kun Jiang
,
Bing Zhao
,
Weijun Shan
,
Lihui Wang
,
Jing Liu
A Dynamic Trust Management Mechanism in Distributed CRNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-242
by
Zhenyue Long
,
Linbin Zhan
,
Guiteng Chen
Analysis of Information Security of Electric Power Big Data and Its Countermeasures
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-248
by
Junfeng Zhao
,
Yongmei Wang
,
Yuanyi Xia
A Security Evaluation and Certification Management Database Based on ISO/IEC Standards
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-253
by
Huilin Chen
,
Da Bao
,
Hongbiao Gao
,
Jingde Cheng
A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-258
by
Rui Chang
,
Liehui Jiang
,
Qing Yin
,
Wei Liu
,
Shengqiao Zhang
Research on the Reasoning Mechanism of Copyright Protection of Digital Content Based on the Petri Net
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-262
by
Yingjiu Guo
,
Xuemei Liu
Discussion on the Intension and Value of Design Techniques of Chinese Character in Word Stock
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-266
by
Jiujun Cheng
A Security Threats Taxonomy for Routing System Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-270
by
Fu Miao
,
Zhenxing Wang
,
Yi Guo
,
Liancheng Zhang
Secure Identity-Based Authentication Scheme Suitable for Limited-Resource Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Toan-Thinh Truong
,
Vi-Minh Luong
,
Minh-Triet Tran
,
Anh-Duc Duong
Scalable Group Audio-Based Authentication Scheme for IoT Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-281
by
Zhonglei Gu
,
Yang Liu
Design and Application of IBE Email Encryption Based on Pseudo RSA Certificate
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-286
by
Jinglin Wu
,
Yihong Long
,
Qiang Huang
,
Wei Wang
The Distributed Dissimilar Redundancy Architecture of Fly-by-Wire Flight Control System
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-293
by
Ying Xue
,
Zhenqiang Yao
,
Wei Niu
Security-Aware Routing and Core Allocation in Elastic Optical Network with Multi-core
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-298
by
Hejun Xuan
,
Yuping Wang
,
Shanshan Hao
,
Zhanqi Xu
,
Xiaodong Li
,
Xiaozhi Gao
Multiple Object Tracking Based on Robust Network Flow Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-303
by
Shuangyan Yi
,
Hongpeng Wang
,
Zhenyu He
,
Yi Li
,
Wensheng Chen
A Novel Storage and Search Scheme in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-308
by
Jing Fang
,
Jingsha He
,
Muhammad Salman Pathan
,
Mengchen Gao
Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-313
by
Ran Ji
,
Haifeng Li
,
Chaojing Tang
A Port Hopping Based DoS Mitigation Scheme in SDN Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-317
by
Liancheng Zhang
,
Yi Guo
,
Huiqiang Yuwen
,
Yu Wang
Testing Network Protocol Binary Software with Selective Symbolic Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-322
by
Shameng Wen
,
Chao Feng
,
Qingkun Meng
,
Bin Zhang
,
Ligeng Wu
,
Chaojing Tang
A Scheme of MIDI Music Emotion Classification Based on Fuzzy Theme Extraction and Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-326
by
Peilin Chen
,
Lei Zhao
,
Zongyu Xin
,
Yumeng Qiang
,
Ming Zhang
,
Tiemeng Li
Predicting User Retweet Behaviors Based on Energy Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-330
by
Hai Zhu
,
Guoheng Ren
,
Dongxia Qin
,
Wei Wang
,
Fei Wei
,
Ying Cao
An Outlier Detection Method Based on PageRank Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-335
by
Zhan Huang
,
Shun Long
,
Yuying Jiang
,
Qian Chen
The Threat Assessments of the Cracks to the Soil Sites via Image Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-339
by
Pengfei Xu
,
Nana Ding
,
Feng Chen
Research on Performance of Motion Platform of 3-RPS Flight Simulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-344
by
Hongwei Han
,
Shuwen Dang
Research on Surface Movement Parameters of Shallow Buried Coal Seam with Central Force Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-348
by
Jinhua Li
,
Shuancheng Gu
,
Huaqiang Fang
,
Xing Hong
Data-Based Axle Temperature Prediction of High Speed Train by Multiple Regression Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-353
by
Guo Xie
,
Zhuxin Wang
,
Xinhong Hei
,
Sei Takahashi
,
Hideo Nakamura
An Optimized Algorithm in Risk Calculating
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-357
by
Yubin Wang
,
Wei Wu
,
Gaofeng Zhan
Ensemble Model for Stock Price Movement Trend Prediction on Different Investing Periods
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-361
by
Jian Yang
,
Ruonan Rao
,
Pei Hong
,
Peng Ding
A Comprehensive Research on Evaluation of Port Competitiveness Factors
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-365
by
Xing Wang
,
Mingyun Chen
Research on the Urbanization Strategy of Rural Population
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-369
by
Congmou Yuan
,
Wenxue Niu
,
Dansong Zhang
Study on Logistics Outsourcing Strategy of E-Commerce Based on Revenue Sharing Contract
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-373
by
Fangfang Guo
,
Yaoguang Zhong
,
Quanju Zhang
One Algorithm of Gesture Animation Synthesis
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-377
by
Huijian Han
,
Rongjun Song
,
Yanqiang Fu
Research on Cloud Computing Resource Management Model Based on Multi-Agent System
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-381
by
Qiang Chen
Research on the Multi-Tenant Placement Genetic Algorithm Based on Eucalyptus Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-385
by
Feng Wang
,
Junhuai Li
,
Jing Zhang
,
Qiang Huang
A Prediction Method Based on Stepwise Regression Analysis for Train Axle Temperature
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-390
by
Weigang Ma
,
Siyu Tan
,
Xinhong Hei
,
Jinwei Zhao
,
Guo Xie
Study on the Relation between Virus and Host Cell by Alignment-Free Sequence Comparison
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-394
by
Xuemei Liu
,
Xiang Zang
,
Tianlai Huang
,
Zhe Yang
,
Wen Li
,
Yuzhong Ye
,
Shan Hu
,
Jing Li
Evaluation of Regional Logistics Industry Development Level Based on Grey Entropy
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-398
by
Chaoling Li
,
Lin Lu
A Hybrid LWNN-Based Stochastic Noise Eliminating Method for Fiber Optic Gyro
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-402
by
Shu-wen Dang
,
Kang-le Wang
,
Hong-wei Han
,
Peng-zhan Cheng
License Plate Segmentation and Recognition of Chinese Vehicle Based on BPNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-406
by
Naiguo Wang
,
Xiangwei Zhu
,
Jian Zhang
Research Status of Artificial Neural Network and Its Application Assumption in Aviation
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-410
by
Taoran Cheng
,
Pengcheng Wen
,
Yang Li
A Job Shop Scheduling Algorithm Using Big Bang-Big Crunch Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-414
by
Yan Kang
,
Hao Li
,
Chunhui Wang
,
Li Dai
Energy-Aware Scheduling of Workflow in Cloud Center with Deadline Constraint
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-418
by
Hao Li
,
Hai Zhu
,
Guoheng Ren
,
Hongfeng Wang
,
Hong Zhang
,
Liyong Chen
Showing 100 out of 169
Load More
Load All