Default Cover Image

2020 16th International Conference on Computational Intelligence and Security (CIS)

Nov. 27 2020 to Nov. 30 2020

Guangxi, China

ISBN: 978-1-6654-0445-7

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 1-1
[Copyright notice]Freely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-xiii
PrefaceFreely available from IEEE.pp. xiv-xiv
Organizing CommitteeFreely available from IEEE.pp. xv-xv
Program CommitteeFreely available from IEEE.pp. xvi-xvi
ReviewersFreely available from IEEE.pp. xvii-xvii
3R: Word and Phoneme Edition based Data Augmentation for Lexical Punctuation PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A multi-critic deep deterministic policy gradient UAV path planningFull-text access may be available. Sign in or learn about subscription options.pp. 6-10
Binary Image Geometric Calculation Algorithm Based on SNAM RepresentationFull-text access may be available. Sign in or learn about subscription options.pp. 16-19
Deep Hashing Using N-pair Loss for Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 20-24
A Flower Classification Method Combining DenseNet Architecture with SVMFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
A optimized YOLO method for object detectionFull-text access may be available. Sign in or learn about subscription options.pp. 30-34
Generalized orthogonal momentFull-text access may be available. Sign in or learn about subscription options.pp. 35-39
Panoptic Feature Pyramid Network Applications In Intelligent TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 40-43
A Modified Contracting BFGS Update for Unconstrained OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 44-48
Multi-objective Ant Colony Algorithm Based on Pheromone WeightFull-text access may be available. Sign in or learn about subscription options.pp. 49-53
Reliable Routing Design in Predictable Wireless Networks with Unreliable LinksFull-text access may be available. Sign in or learn about subscription options.pp. 54-58
The 5G NOMA networks planning based on the multi-objective evolutionary algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 59-62
Electro-optic Combination Coherent Communication System Based On OCDMA TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 63-67
Prediction of Air Quality in Major Cities of China by Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 68-72
Chinese Coreference Resolution via Bidirectional LSTMs using Word and Token Level RepresentationsFull-text access may be available. Sign in or learn about subscription options.pp. 73-76
Technology of Image Steganography and Steganalysis Based on Adversarial TrainingFull-text access may be available. Sign in or learn about subscription options.pp. 77-80
Domain-Specific Chinese Transformer-XL Language Model with Part-of-Speech InformationFull-text access may be available. Sign in or learn about subscription options.pp. 81-85
The errors analysis of natural language generation — A case study of Topic-to-Essay generationFull-text access may be available. Sign in or learn about subscription options.pp. 86-89
Graph-based Bayesian Meta Relation ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 90-94
A Deep Framework for Cell Mitosis Detection in Microscopy ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 100-103
Review of Image Classification Method Based on Deep Transfer LearningFull-text access may be available. Sign in or learn about subscription options.pp. 104-108
Machine Translation Based on Domain Adaptive Language ModelFull-text access may be available. Sign in or learn about subscription options.pp. 116-120
Sliding Mode Control of Truss Bridge Structure with GMMAsFull-text access may be available. Sign in or learn about subscription options.pp. 126-130
Research and Application of Multi-Round Dialogue Intent Recognition MethodFull-text access may be available. Sign in or learn about subscription options.pp. 131-135
Meter Recognition And Reading System Based On Machine CarFull-text access may be available. Sign in or learn about subscription options.pp. 136-139
Application of the EfficientDet Algorithm in Traffic Flow StatisticsFull-text access may be available. Sign in or learn about subscription options.pp. 140-143
Design and Implementation of the Optimization Algorithm in the Layout of Parking Lot GuidanceFull-text access may be available. Sign in or learn about subscription options.pp. 144-148
Performance Analysis of Scheduling Algorithms in Apache HadoopFull-text access may be available. Sign in or learn about subscription options.pp. 149-154
Safety helmet detection method based on YOLO v4Full-text access may be available. Sign in or learn about subscription options.pp. 155-158
A Brief Review of Two Classical Models for Asset AllocatingFull-text access may be available. Sign in or learn about subscription options.pp. 159-163
Research on the Transformation and Development Strategy of Guangdong Independent College Based on SWOT-AHPFull-text access may be available. Sign in or learn about subscription options.pp. 164-168
Analysis on Developing Dongguan's Badminton Training MarketFull-text access may be available. Sign in or learn about subscription options.pp. 174-178
Kernel Non-Negative Matrix Factorization Using Self-Constructed Cosine KernelFull-text access may be available. Sign in or learn about subscription options.pp. 186-190
An Optimization Method for Elasticsearch Index Shard NumberFull-text access may be available. Sign in or learn about subscription options.pp. 191-195
A kind of problem for hypermonogenic functions in Clifford analysisFull-text access may be available. Sign in or learn about subscription options.pp. 196-200
New Equivalent Circuit of Oil-Paper Insulation and Its Parameters IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 210-212
Design of Intelligent Fighting Robot ConstructionFull-text access may be available. Sign in or learn about subscription options.pp. 213-216
Efficient attribute reduction based on rough sets and differential evolution algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
Fuzzy C-means clustering algorithm for automatically determining the number of clustersFull-text access may be available. Sign in or learn about subscription options.pp. 223-227
Enterprise Credit Risk Assessment Using Feature Selection Approach and Ensemble Learning TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 228-233
The Improvement on Self-Adaption Select Cluster Centers Based on Fast Search and Find of Density Peaks ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 234-237
Emotional Analysis on the Public Sentiment of Students Returning to University under COVID-19Full-text access may be available. Sign in or learn about subscription options.pp. 238-242
A novel additive consistency for intuitionistic fuzzy preference relationsFull-text access may be available. Sign in or learn about subscription options.pp. 243-247
Data Preprocessing Method For The Analysis Of Incomplete Data On Students In PovertyFull-text access may be available. Sign in or learn about subscription options.pp. 248-252
Beetle Antennae Search Algorithm for Community Detection in Complex NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 253-258
A Novel Hybrid Tabu Search Algorithm With Binary Differential Operator for Knapsack ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 259-263
A Differential Evolution Algorithm with Adaptive Strategies for Constrained Optimization ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 264-268
An Improved Differential Evolution for Constrained Multi-Objective Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 269-273
Order of Servers for Periodic Multi-Installment SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 274-277
Attacking FPGA-based Dual Complementary AES Implementation Using HD and SD ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 278-282
The security and privacy of blockchain-enabled EMR storage management schemeFull-text access may be available. Sign in or learn about subscription options.pp. 283-287
A Mobile Application of Face Recognition Based on Android PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 288-292
Reverse logistics network design model for used power battery under the third-party recovery modeFull-text access may be available. Sign in or learn about subscription options.pp. 293-297
SLFB-CNN: An interpretable neural network privacy protection frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 298-302
RVBT: A Remote Voting Scheme Based on Three-BallotFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Full Coverage Detection of Immune Detector for Public Data SetFull-text access may be available. Sign in or learn about subscription options.pp. 308-312
Credit Platform Construction of Vocational Education Group Based on BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 313-317
Unsupervised learning based target localization method for pantograph videoFull-text access may be available. Sign in or learn about subscription options.pp. 318-323
Image Super-Resolution Reconstruction Based on Online dictionary learning AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 324-327
The Covariance Matrix Evolution Strategy Algorithm Based On Cloud Model And Cholesky FactorFull-text access may be available. Sign in or learn about subscription options.pp. 328-332
A differential evolution SAF-DE algorithm which jumps out of local optimalFull-text access may be available. Sign in or learn about subscription options.pp. 333-337
Chinese Sentiment Classification Model of Neural Network Based on Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 338-341
The seismic electromagnet signal recognition using convolutional neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 347-350
Predicting Algorithms and Complexity in RNA Structure Based on BHGFull-text access may be available. Sign in or learn about subscription options.pp. 351-355
SM9 Digital Signature with Non-repudiationFull-text access may be available. Sign in or learn about subscription options.pp. 356-361
A New Feature Selection Method for Intrusion Detection System Dataset – TSDR methodFull-text access may be available. Sign in or learn about subscription options.pp. 362-365
A Convolutional Encoder Network for Intrusion Detection in Controller Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 366-369
Connected Domain Algorithm Based on Asymmetric Square NAMFull-text access may be available. Sign in or learn about subscription options.pp. 370-373
A High Accuracy DNS Tunnel Detection Method Without Feature EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 374-377
Author IndexFreely available from IEEE.pp. 379-381
Showing 87 out of 87