Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CIS
CIS 2020
Generate Citations
2020 16th International Conference on Computational Intelligence and Security (CIS)
Nov. 27 2020 to Nov. 30 2020
Guangxi, China
ISBN: 978-1-6654-0445-7
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Table of Contents
Freely available from IEEE.
pp. v-xiii
Preface
Freely available from IEEE.
pp. xiv-xiv
Organizing Committee
Freely available from IEEE.
pp. xv-xv
Program Committee
Freely available from IEEE.
pp. xvi-xvi
Reviewers
Freely available from IEEE.
pp. xvii-xvii
3R: Word and Phoneme Edition based Data Augmentation for Lexical Punctuation Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Aihua Zheng
,
Naipeng Ye
,
Xiao Wang
,
Xiao Song
A multi-critic deep deterministic policy gradient UAV path planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-10
by
Runjia Wu
,
Fangqing Gu
,
Jie Huang
Linear Elements Separation via Vision System Feature and Seed Spreading from Topographic Maps
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-15
by
Fei Xie
,
Yanning Zhang
,
Xinming Guo
,
Wei Zhang
,
Zhaoyong Zhou
,
Pengfei Xu
Binary Image Geometric Calculation Algorithm Based on SNAM Representation
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-19
by
Xu CaiXu
,
Guo Hui
,
He Jie
Deep Hashing Using N-pair Loss for Image Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-24
by
Liefa Liao
,
Zhiming Li
A Flower Classification Method Combining DenseNet Architecture with SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-29
by
Liefa Liao
,
Saisai Zhang
A optimized YOLO method for object detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-34
by
Liang Tianjiao
,
Bao Hong
Generalized orthogonal moment
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-39
by
Yijian Zhang
,
Zhou Yuan
,
Jianwei Yang
Panoptic Feature Pyramid Network Applications In Intelligent Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-43
by
Chang Lu
,
Xiaochun Lei
,
Junlin Xie
,
Xiaolong Wang
,
XiangBoge Mu
A Modified Contracting BFGS Update for Unconstrained Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-48
by
Yiming Zhang
Multi-objective Ant Colony Algorithm Based on Pheromone Weight
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-53
by
Lei Yang
,
Xiaotian Jia
,
Ganming Liu
Reliable Routing Design in Predictable Wireless Networks with Unreliable Links
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-58
by
Mengmeng Xu
,
Hai Zhu
,
Hengzhou Xu
,
Jiongjiong Song
,
Zhen Luo
The 5G NOMA networks planning based on the multi-objective evolutionary algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-62
by
Jinli Zhang
,
Jiexin Li
,
Mingjiao Cai
,
Dining Li
,
Qiang Wang
Electro-optic Combination Coherent Communication System Based On OCDMA Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-67
by
Peng Zhou
,
Ye Lu
,
Dong Cheng
,
Chuanqi Li
Prediction of Air Quality in Major Cities of China by Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-72
by
Choujun Zhan
,
Songyan Li
,
Jianbin Li
,
Yijing Guo
,
Quansi Wen
,
WeiSheng Wen
Chinese Coreference Resolution via Bidirectional LSTMs using Word and Token Level Representations
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-76
by
Kun Ming
Technology of Image Steganography and Steganalysis Based on Adversarial Training
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-80
by
Han Zhang
,
Zhihua Song
,
Boyu Feng
,
Zhongliang Zhou
,
Fuxian Liu
Domain-Specific Chinese Transformer-XL Language Model with Part-of-Speech Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-85
by
Huaichang Qu
,
Haifeng Zhao
,
Xin Wang
The errors analysis of natural language generation — A case study of Topic-to-Essay generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-89
by
Ping Cai
,
Xingyuan Chen
,
Hongjun Wang
,
Peng Jin
Graph-based Bayesian Meta Relation Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-94
by
Zhen Wang
,
Zhenting Zhang
Intelligent decision-making based on neural network and simulation in two Islands air defense operation
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-99
by
Xianguang Liu
,
Wenfei Wang
,
Xiaojie Zhang
,
Han Zhang
,
Zhihua Song
,
Zhongliang Zhou
A Deep Framework for Cell Mitosis Detection in Microscopy Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-103
by
Jian Shi
,
Yi Xin
,
Benlian Xu
,
Mingli Lu
,
Jinliang Cong
Review of Image Classification Method Based on Deep Transfer Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-108
by
Chuanzi Li
,
Jining Feng
,
Li Hu
,
Junhong Li
,
Haibin Ma
Improved Spatio-Temporal Convolutional Neural Networks for Traffic Police Gestures Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-115
by
Zhixuan Wu
,
Nan Ma
,
Yiu-ming Cheung
,
Jiahong Li
,
Qin He
,
Yongqiang Yao
,
Guoping Zhang
Machine Translation Based on Domain Adaptive Language Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-120
by
Lingling Li
,
Xianlong Chen
,
Yiling Xu
Ternary Compound Matching of Biomedical Ontologies with Compact Multi-Objective Evolutionary Algorithm Based on Adaptive Objective Space Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-125
by
Xingsi Xue
,
Jiawei Lu
,
Junfeng Chen
Sliding Mode Control of Truss Bridge Structure with GMMAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-130
by
Yalin Chen
,
Zhijun Li
,
Bin Dong
,
Shuangyang Zuo
Research and Application of Multi-Round Dialogue Intent Recognition Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-135
by
Jie Song
,
Qifeng Luo
,
Jichang Nie
Meter Recognition And Reading System Based On Machine Car
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-139
by
Wang Xiaolong
,
Chen Junyan
,
Tang Yongqing
,
Gao Jie
,
Wang Xingbo
,
Zhan Pufan
Application of the EfficientDet Algorithm in Traffic Flow Statistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-143
by
Kaihao Lin
,
Junyan Chen
,
Aoge Chen
,
Hu Huang
Design and Implementation of the Optimization Algorithm in the Layout of Parking Lot Guidance
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-148
by
Zbendong Liu
,
Yurong Yang
,
Dongyan Li
,
Xiaofeng Li
,
Xinrong Lv
,
Xi Chen
Performance Analysis of Scheduling Algorithms in Apache Hadoop
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-154
by
Yang Li
Safety helmet detection method based on YOLO v4
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-158
by
Deng Benyang
,
Lei Xiaochun
,
Ye Miao
A Brief Review of Two Classical Models for Asset Allocating
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-163
by
Ya-Juan Yang
,
Liang-Liang Zhang
,
Yi Niu
,
Ouan-Ju Zhang
Research on the Transformation and Development Strategy of Guangdong Independent College Based on SWOT-AHP
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-168
by
Hai-Dong Li
,
Lan Zhang
Research on the Dimensions and Influencing Factors of Enterprise Humanism Management — An Empirical Study Based on the Questionnaire of Dongguan Enterprises
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-173
by
Cheng-jun Wang
,
Han-ming Xu
,
Ming-hua Jiang
Analysis on Developing Dongguan's Badminton Training Market
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-178
by
Le Yu
,
Lun Yu
Analysis on the Impact of China's Foreign Trade Pattern in the process of the Reduction of Carbon Emission Intensity in China
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-185
by
Yong-Ting He
,
Zhi-Gang Tang
Kernel Non-Negative Matrix Factorization Using Self-Constructed Cosine Kernel
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-190
by
Huihui Qian
,
Wen-Sheng Chen
,
Binbin Pan
,
Bo Chen
An Optimization Method for Elasticsearch Index Shard Number
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-195
by
Bizhong Wei
,
Jian Dai
,
Liqiang Deng
,
Haiyan Huang
A kind of problem for hypermonogenic functions in Clifford analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-200
by
Si Zhongwei
Numerical Analysis of Influence of Medicine Cover Structure on Cutting Depth
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-205
by
Kai Li
,
Chang Liu
,
Yang Hu
,
Changshuan Wang
,
Wei Peng
,
Qiang Gao
,
Yun Zhang
,
Tongsheng Shu
,
Wensheng Wang
,
Chengwen Lei
,
Lin Liu
,
Junfeng Chen
Energy Accumulating Cutting Technology in Steel Plate Cutting of Reservoir Gate
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Kai Li
,
Chang Liu
,
Yang Hu
,
Changshuan Wang
,
Wei Peng
,
Qiang Gao
,
Yun Zhang
,
Tongsheng Shu
,
Wensheng Wang
,
Chengwen Lei
,
Lin Liu
,
Junfeng Chen
New Equivalent Circuit of Oil-Paper Insulation and Its Parameters Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-212
by
Dehua He
,
Ruliang Wang
Design of Intelligent Fighting Robot Construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-216
by
Qinghua Meng
,
Youli Long
,
Ruiyang Wang
,
Fuxian He
,
Xuheng Lu
,
Xin Huang
Efficient attribute reduction based on rough sets and differential evolution algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
Si-Yuan Jing
,
Jun Yang
Fuzzy C-means clustering algorithm for automatically determining the number of clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-227
by
Zhihe Wang
,
Shuyan Wang
,
Hui Du
,
Hao Guo
Enterprise Credit Risk Assessment Using Feature Selection Approach and Ensemble Learning Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-233
by
Di Wang
,
Zuoquan Zhang
The Improvement on Self-Adaption Select Cluster Centers Based on Fast Search and Find of Density Peaks Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-237
by
Hui Du
,
Yiyang Ni
Emotional Analysis on the Public Sentiment of Students Returning to University under COVID-19
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-242
by
Liping Jia
,
Zhonghua Li
A novel additive consistency for intuitionistic fuzzy preference relations
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-247
by
Xiao-Yun Lu
,
He-Cheng Li
Data Preprocessing Method For The Analysis Of Incomplete Data On Students In Poverty
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-252
by
Haiyan Huang
,
Bizhong Wei
,
Jian Dai
,
Wenlong Ke
Beetle Antennae Search Algorithm for Community Detection in Complex Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Liefa Liao
,
Fan Zhang
A Novel Hybrid Tabu Search Algorithm With Binary Differential Operator for Knapsack Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-263
by
Jun Hu
,
Qingfu Zhang
,
Yong-Chang Jiao
A Differential Evolution Algorithm with Adaptive Strategies for Constrained Optimization Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-268
by
Cuo Wanma
,
Hecheng Li
,
Erping Song
An Improved Differential Evolution for Constrained Multi-Objective Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-273
by
Erping Song
,
Hecheng Li
,
Cuo Wanma
Order of Servers for Periodic Multi-Installment Scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-277
by
Hui Wang
,
Xiaobo Song
,
Zhihao Tong
,
Xiaoli Wang
Attacking FPGA-based Dual Complementary AES Implementation Using HD and SD Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-282
by
Wenlong Cao
,
Fan Huang
,
Mengce Zheng
,
Honggang Hu
The security and privacy of blockchain-enabled EMR storage management scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-287
by
Guangfu Wu
,
Yingjun Wang
A Mobile Application of Face Recognition Based on Android Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-292
by
Wei Deng
,
XinLun Zhang
,
Zhe Jiang
Reverse logistics network design model for used power battery under the third-party recovery mode
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-297
by
Qian Guan
,
Yuxiang Yang
SLFB-CNN: An interpretable neural network privacy protection framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-302
by
De Li
,
Yuhang Hu
,
Jinyan Wang
RVBT: A Remote Voting Scheme Based on Three-Ballot
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-307
by
Jun Yang
,
Siyuan Jing
,
Liping Jia
Full Coverage Detection of Immune Detector for Public Data Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-312
by
Caiming Liu
,
Yan Zhang
,
Qin Li
,
Luxin Xiao
Credit Platform Construction of Vocational Education Group Based on Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-317
by
Jie Chen
,
Xian Su
,
WeiSheng Wen
,
Hao-Tian Wu
Unsupervised learning based target localization method for pantograph video
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-323
by
Rui Sun
,
Liming Li
,
Xingjie Chen
,
Ji Wang
,
Xiaodong Chai
,
Shubin Zheng
Image Super-Resolution Reconstruction Based on Online dictionary learning Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-327
by
Chunman Yan
,
Yuyao Zhang
The Covariance Matrix Evolution Strategy Algorithm Based On Cloud Model And Cholesky Factor
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-332
by
Lei Yang
,
Neng Li
,
Yitian Chen
,
Haoran Chen
,
Zhihao Chen
,
Decai Liang
A differential evolution SAF-DE algorithm which jumps out of local optimal
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-337
by
HuChunAn
,
WenHao
Chinese Sentiment Classification Model of Neural Network Based on Particle Swarm Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-341
by
Yaling Zhang
,
Jiale Li
,
Shibo Bai
A Neural Network-Based Intelligent Decision-Making in the Air-Offensive Campaign with Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-346
by
Gang Hu
,
Chuhan Zhou
,
Xiaojie Zhang
,
Han Zhang
,
Zhihua Song
,
Zhongliang Zhou
The seismic electromagnet signal recognition using convolutional neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-350
by
Wei Ding
,
Ji Han
,
Dijin Wang
Predicting Algorithms and Complexity in RNA Structure Based on BHG
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-355
by
Zhendong Liu
,
Yurong Yang
,
Xinrong Lv
,
Dongyan Li
,
Xi Chen
,
Xiaofeng Li
SM9 Digital Signature with Non-repudiation
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-361
by
Meng Wang
,
Yihong Long
A New Feature Selection Method for Intrusion Detection System Dataset – TSDR method
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-365
by
Tao Yu
,
Zhen Liu
,
Yuaning Liu
,
Huaibin Wang
,
Nodir Adilov
A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-369
by
Xing Zhang
,
Xiaotong Cui
,
Kefei Cheng
,
Liang Zhang
Connected Domain Algorithm Based on Asymmetric Square NAM
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-373
by
Cen Caichun
,
He Jie
,
Guo Hui
A High Accuracy DNS Tunnel Detection Method Without Feature Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-377
by
Yang Chen
,
XiaoYong Li
Author Index
Freely available from IEEE.
pp. 379-381
Showing 87 out of 87