掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献检索
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
International Conference on Computational Intelligence and Security
International Conference on Computational Intelligence and Security
召开年:
2014
召开地:
Kunming(CN)
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
全选(
0
)
清除
导出
1.
A User-Based Document Management Mechanism in Cloud
机译:
云中基于用户的文档管理机制
作者:
Guozhen Shi
;
Mang Su
;
Fenghua Li
;
Jiapeng Lou
;
Qiong Huang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
authorisation;
cloud computing;
cryptography;
document handling;
access control conditions;
cloud computing;
document creation;
electronic document;
novel user-based document secure management mechanism;
re-encrypted key;
Access control;
Cloud computing;
Encryption;
Protocols;
Servers;
access control;
application protocol;
document management;
re-encryption;
user-based;
2.
Application of Investment Plan Selection Based on Variable Weight Synthesis and Mahalanobis Distance
机译:
变权综合和马氏距离在投资计划选择中的应用
作者:
Ai Zhenghai
;
Si Zhongwei
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
decision making;
investment;
Mahalanobis distance;
investment plan selection;
multiple attribute decision making problem;
variable weight synthesis;
Decision making;
Educational institutions;
Indexes;
Investment;
Mathematical model;
Vectors;
Investment Plan Selection;
Mahalanobis distance;
TOPSIS;
Variable weight synthesis;
3.
Convergence Analysis of Swarm Intelligence Based on Fuzzy Random Variables
机译:
基于模糊随机变量的群体智能收敛性分析
作者:
Feng Jiqiang
;
Xu Chen
;
Zhang Weiqiang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
fuzzy set theory;
particle swarm optimisation;
random processes;
PSO process;
base theory;
bio-inspired optimization principle;
convergence analysis;
fitness function;
fuzzy random variables;
particle swarm optimizer algorithm;
random theory;
swarm intelligence algorithm;
Atmospheric measurements;
Birds;
Convergence;
Optimization;
Particle measurements;
Particle swarm optimization;
Random variables;
Convergence Analysis;
Fuzzy Random Variables;
Particle Swarm Optimizer;
Swarm Intelligence;
4.
A New Model for Energy Consumption Optimization under Cloud Computing and its Genetic Algorithm
机译:
云计算下能耗优化的新模型及其遗传算法
作者:
Hai Zhu
;
Xiaoli Wang
;
Hongfeng Wang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cloud computing;
customer services;
energy consumption;
genetic algorithms;
resource allocation;
scheduling;
virtual machines;
SLA;
cloud computing systems;
component level;
customer service level;
dynamic voltage power adjustment technology;
energy consumption optimization model;
genetic algorithm;
multidimensional variable packing problem;
resource allocation;
scheduling architecture;
service level agreement;
system level;
virtual machine deployment algorithm;
Cloud computing;
Energy consumption;
Genetic algorithms;
Optimization;
Servers;
Vectors;
Virtual machining;
cloud computing;
energy consumption optimization;
real-time task;
virtual machine deployment;
5.
Attribute-Based Keyword Search and Data Access Control in Cloud
机译:
云中基于属性的关键字搜索和数据访问控制
作者:
Jiazhi Li
;
Lei Zhang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
authorisation;
cloud computing;
information retrieval;
public key cryptography;
storage management;
attribute based encryption;
attribute-based keyword search scheme;
cloud storage;
data access policy control scheme;
public-key searchable encryption;
search policy control;
semi trusted server;
sensitive data encryption;
Access control;
Cloud computing;
Encryption;
Indexes;
Keyword search;
Cloud storage;
access control;
attribute-based encryption;
public-key searchable encryption;
6.
A Minimum-Elimination-Escape Function Method for Multimodal Optimization Problems
机译:
求解多峰优化问题的最小消除逃逸函数方法
作者:
Lei Fan
;
Xiyang Liu
;
Liping Jia
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
optimisation;
Mexican hat effect;
auxiliary function method;
local optimum;
minimum-elimination-escape function method;
multimodal optimization problems;
Algorithm design and analysis;
Benchmark testing;
Computational intelligence;
Educational institutions;
Iron;
Optimization;
Security;
Auxiliary function;
Minimization;
Minimum-elimination-escape function;
Multimodal optimization;
7.
Parallel Diversity-Controlled Quantum-Behaved Particle Swarm Optimization Algorithm
机译:
并行分集控制的量子行为粒子群优化算法
作者:
Haixia Long
;
Shulei Wu
;
Haiyan Fu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
convergence;
parallel algorithms;
particle swarm optimisation;
quantum computing;
PDCQPSO algorithm;
algorithm running time;
benchmark functions;
efficiency improvement;
parallel diversity-controlled mechanism;
population diversity;
premature convergence;
quantum-behaved particle swarm optimization algorithm;
Algorithm design and analysis;
Convergence;
Educational institutions;
Optimization;
Particle swarm optimization;
Sociology;
Statistics;
Quantum-behaved particle swarm optimiztion algorithm;
diversity;
efficiency;
parallel;
performance;
8.
Analysis and Modeling of Learning Behaviors on Intelligent Tutoring Website
机译:
智能辅导网站学习行为的分析与建模
作者:
Peng Sun
;
Ziyan Wu
;
Yunpeng Zhang
;
Yang Yang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Web sites;
intelligent tutoring systems;
teaching;
MFR model;
intelligent tutoring Web site;
learning behaviors analysis;
learning behaviors modeling;
personalized teaching method;
teaching quality;
Analytical models;
Computational intelligence;
Computational modeling;
Educational institutions;
Security;
Timing;
MFR Model?Modeling of Learning Behaviors;
9.
A New Genetic Algorithm for Release-Time Aware Divisible-Load Scheduling
机译:
释放时间感知的可分负荷调度的新遗传算法
作者:
Xiaoli Wang
;
Yuping Wang
;
Kun Meng
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
genetic algorithms;
processor scheduling;
distributed systems;
global optimization genetic algorithm;
hybrid time constraints;
information technologies;
parallel systems;
processor;
release-time aware divisible-load scheduling;
Computational modeling;
Genetic algorithms;
Optimal scheduling;
Processor scheduling;
Program processors;
Scheduling;
Time factors;
divisible-load scheduling;
genetic algorithm;
hybrid time constraints;
release time;
10.
A Rendering Algorithm for Function Call Diagram in Software Reliability Assurance
机译:
软件可靠性保证中函数调用图的渲染算法
作者:
Zhoukai Wang
;
Yikun Zhang
;
Xinhong Hei
;
Linjing Sun
;
Rui Zhou
;
Ming Zhao
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
high level languages;
quality assurance;
rendering (computer graphics);
software reliability;
Clang structure analyzer;
SVG graphics display technology;
diagram quality;
drawing efficiency;
function call diagram display;
function call diagram generation;
high level language;
rendering algorithm;
software reliability assurance;
software safety;
Algorithm design and analysis;
Rendering (computer graphics);
Software;
Software reliability;
US Department of Transportation;
Visualization;
Clang structural analyzer;
SVG;
function call diagram;
software reliability;
11.
Analysis of Distributed Consensus-Based Spectrum Sensing Algorithm in Cognitive Radio Networks
机译:
认知无线电网络中基于分布式共识的频谱感知算法分析
作者:
Hongning Li
;
Xianjun Liu
;
Leilei Xu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cognitive radio;
radio spectrum management;
sensor fusion;
telecommunication network reliability;
telecommunication security;
connectivity analysis;
distributed cognitive radio networks;
distributed consensus-based spectrum sensing algorithm;
local network;
security analysis;
sensing data updating;
spectrum sensing result consistency;
spectrum sensing result reliability;
trust neighbor;
Algorithm design and analysis;
Cognitive radio;
Convergence;
Distributed databases;
Network topology;
Security;
Sensors;
consensus-based spectrum sensing;
distributed cognitive radio network;
local networks;
security;
12.
Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme
机译:
基于属性的加密方案的动态用户吊销和密钥刷新的不安全性
作者:
Changji Wang
;
Haitao Lin
;
Xilei Xu
;
Kangjia Zheng
;
Xiaonan Xia
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cloud computing;
cryptography;
CP-ABE technology;
attribute based encryption scheme;
ciphertext policy attribute based encryption;
cloud computing;
cloud services;
data encryption;
data privacy;
data retrieval;
data security;
dynamic user revocation;
dynamic user revocation insecurity;
fine grained access control;
global IT ecosystem;
key refreshing model;
Access control;
Cloud computing;
Computational modeling;
Encryption;
Generators;
Ciphertext-Policy Attribute-Based Encryption;
Cloud Computing;
Dynamic User Revocation;
Key Refreshing;
13.
Algorithm-Based Countermeasures against Power Analysis Attacks for Public-Key Cryptography SM2
机译:
基于算法的公钥密码SM2功耗分析攻击对策
作者:
Xiaowei Han
;
Beibei Wang
;
An Wang
;
Liji Wu
;
Woogeun Rhee
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
digital arithmetic;
field programmable gate arrays;
public key cryptography;
FPGA board;
IMSM;
MADA;
RIP algorithm;
SPA;
TFCS;
algorithm-based countermeasures;
binary expansion;
differential power analysis;
elliptic curves;
initialized masking scalar multiplication algorithm;
modified atomic point doubling and point addition algorithm;
power analysis attacks;
public-key cryptography SM2;
side channel leakage;
simple power analysis;
template attacks;
transformed formula countermeasure;
Algorithm design and analysis;
Elliptic curve cryptography;
Elliptic curves;
Jacobian matrices;
Resists;
Transforms;
IMSM;
MADA;
SM2;
TFCS;
elliptic curve cryptography;
14.
Application of Grover's Quantum Search Algorithm to Solve the Transcendental Logarithm Problem
机译:
Grover量子搜索算法在解决先验对数问题中的应用
作者:
Yi Tang
;
Shenghui Su
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
iterative methods;
polynomials;
quantum cryptography;
search problems;
Grover iterations;
Grover quantum search algorithm application;
oracle operator;
polynomial time algorithm;
quantum computers;
signature schemes;
subexponential time algorithm;
time complexity;
transcendental logarithm problem;
Algorithm design and analysis;
Cryptography;
Quantum computing;
Quantum mechanics;
Registers;
Search problems;
Grover quantum search algorithm;
REESSE1+ public-key cryptosystem;
quantum computation;
transcendental logarithm problem;
15.
Ways to Train the Statistical Capacity of Grassroots Statisticians
机译:
培养基层统计学家统计能力的方法
作者:
Feng Tianxiang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
mathematics computing;
statistics;
Excel;
fitting function;
fourfold table chi-square test;
grassroots statisticians;
statistical capacity;
variation index;
Correlation coefficient;
Equations;
Fitting;
Humidity;
Indexes;
Mathematical model;
Production;
Excel;
Fourfold table chi-square test;
statistics;
variation index;
16.
Integrating Preferred Weights with Decomposition Based Multi-objective Evolutionary Algorithm
机译:
将首选权重与基于分解的多目标进化算法集成
作者:
Zhenhua Li
;
Hai-Lin Liu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
evolutionary computation;
Pareto front;
distributed weight vectors;
multiobjective evolutionary optimization algorithm based on decomposition technique;
Evolutionary computation;
Linear programming;
Pareto optimization;
Sociology;
Vectors;
decomposition;
desirability function;
evolutionary multiobjective optimization;
preference;
17.
Multi-user Preferences Based Top-k Query Processing Algorithm
机译:
基于多用户首选项的Top-k查询处理算法
作者:
Yunlong Wu
;
Guohua Liu
;
Yuanyuan Liu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
query processing;
relevance feedback;
PLBA preprocessing algorithm;
PPV preprocessing algorithm;
multiuser preferences;
ranking score;
relational tables;
single user preference;
top-k query processing algorithm;
Algorithm design and analysis;
Computational intelligence;
Educational institutions;
Query processing;
Security;
Vectors;
query;
query processing;
user preference;
18.
Asymptotical Stability Criteria for Time-Delay Static Neural Networks Subject to Stochastic Perturbations
机译:
随机扰动的时滞静态神经网络的渐近稳定性判据
作者:
Huasheng Tan
;
Mingang Hua
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Lyapunov methods;
asymptotic stability;
delays;
linear matrix inequalities;
neural nets;
stability criteria;
time-varying systems;
LMI;
Lyapunov-Krasovskii functional;
asymptotical stability analysis;
convex polyhedron method;
delay-dependent stability sufficient conditions;
linear matrix inequality;
stochastic perturbations;
stochastic static neural networks;
time-delay static neural networks;
time-varying delay;
Asymptotic stability;
Delays;
Numerical stability;
Recurrent neural networks;
Stability criteria;
LMI;
delay-dependent stability;
stochastic static neural networks;
time-varying delay;
19.
Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates
机译:
基于超混沌不透明谓词的重叠指令与自修改代码的混合混淆
作者:
Xin Xie
;
Fenlin Liu
;
Bin Lu
;
Fei Xiang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
program control structures;
safety-critical software;
software engineering;
code obfuscation;
control flow graph;
control transfer instructions;
hyper-chaotic opaque predicates;
program control flow analyze;
reverse analysis;
self-modify code;
Chaos;
Flow graphs;
Resistance;
Resists;
Software;
Watermarking;
code obfuscation;
hyper-chaotic opaque predicate;
overlapping instruction;
self-modify code;
20.
Stock Index Futures Basis and Liquidity of Correlation Analysis and Application Based on t-GARCH-Copula Model
机译:
基于t-GARCH-Copula模型的股指期货基础和流动性相关性分析与应用
作者:
Sulin Pang
;
Yuanxiong Chen
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
parameter estimation;
statistical testing;
stock markets;
CSI300 Stock Index Futures;
Granger causality test;
asymmetric correlation;
binary t-GARCH-Copula model;
correlation analysis liquidity;
lead-lag relationship;
lower tail dependence;
parameter estimation;
stock index futures basis;
upper tail correlation;
Contracts;
Correlation;
Fluctuations;
Indexes;
Mathematical model;
Parameter estimation;
Standards;
autocorrelation;
basis;
liquidity;
residual;
t-GARCH-Copula model;
21.
Brain Storm Optimization Model Based on Uncertainty Information
机译:
基于不确定性信息的头脑风暴优化模型
作者:
Junfeng Chen
;
Yingjuan Xie
;
Jianjun Ni
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
data mining;
optimisation;
pattern clustering;
swarm intelligence;
affinity propagation clustering;
cloud drops algorithm;
human brainstorming process;
modified brain storm optimization;
numerical optimization;
swarm intelligence;
uncertain information mining;
uncertain information utilization;
uncertainty information;
Clustering algorithms;
Educational institutions;
Optimization;
Particle swarm optimization;
Storms;
Uncertainty;
affinity propagation;
brain storm optimization;
cloud drops algorithm;
uncertainty;
22.
Design and Implementation: Adaptive Active Queue Management Algorithm Based on Neural Network
机译:
设计与实现:基于神经网络的自适应主动队列管理算法
作者:
Zhenwei Meng
;
Junlong Qiao
;
Lijun Zhang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
computer networks;
radial basis function networks;
three-term control;
transport protocols;
GRPID;
Linux kernel;
NS2 network simulator;
PID controller;
RBF neural network;
TCP/IP;
adaptive active queue management algorithm;
congestion;
network intermediate device;
neural network;
packet queue management mechanism;
performance measurement test;
response speed;
stability;
Adaptive systems;
Algorithm design and analysis;
Delays;
Educational institutions;
Kernel;
Linux;
Neural networks;
AQM;
Congestion control;
GRPID algorithm;
Linux kernel;
NS2;
23.
Improving Metabolic Flux Estimation of Metabolic Networks by QPSO with Penalty Function
机译:
具有罚函数的QPSO改进代谢网络的代谢通量估计
作者:
Haixia Long
;
Shulei Wu
;
Haiyan Fu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
microorganisms;
nonlinear programming;
particle swarm optimisation;
quantum computing;
stoichiometry;
Corynebacterium glutamicum;
QPSO;
QPSO algorithm;
central metabolic flux estimation;
constrained optimization problem;
constraint penalization;
convergence;
flux quantification;
intracellular metabolic flux quantification;
metabolic flux estimation improvement;
metabolic networks;
metabolic system;
multiple local minima;
near-optima;
nonlinear-nondifferentiable objective function;
objective function minimization;
penalty function;
quantum-behaved particle swarm optimization;
stoichiometric constraints;
unconstrained problem;
Biochemistry;
Carbon;
Convergence;
Educational institutions;
Estimation;
Labeling;
Optimization;
constrained optimization problem;
metabolic flux estimation;
metabolic networks;
penalty function;
quantum-behaved particle swarm optimization;
24.
Rapid Face Detection in Static Video Using Background Subtraction
机译:
使用背景减法的静态视频快速人脸检测
作者:
Wencai Zou
;
Yao Lu
;
Mukai Chen
;
Feng Lv
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
face recognition;
image capture;
image sequences;
image texture;
video cameras;
video signal processing;
Viola-Jones face detector;
background subtraction;
computational cost reduction;
false positive rate;
fixed camera;
foreground subimage extraction;
image regions;
rapid face detection;
static video;
texture based method;
video sequence;
Adaptation models;
Computational modeling;
Detectors;
Face;
Face detection;
Image resolution;
Video sequences;
background subtraction;
face detection;
texture;
video sequence;
25.
Surveying and Analyzing Security Problems in Cloud Computing Environments
机译:
调查和分析云计算环境中的安全性问题
作者:
Jouini Mouna
;
Ben Arfa Rabai Latifa
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cloud computing;
invasive software;
virtual machines;
virtualisation;
cloud architecture;
cloud computing environments;
cloud computing security issues;
computational resources;
data breaching;
distributed computing technology;
general security requirements;
infrastructure resources;
scalable virtualized resources;
security problems;
security vulnerabilities;
virtualization technology;
Availability;
Cloud computing;
Privacy;
Security;
Servers;
Virtual machining;
Virtualization;
cloud computing;
cloud risks;
security challenges;
security requirements;
threat and countermeasures;
26.
SymWalker: Symbolic Execution in Routines of Binary Code
机译:
SymWalker:二进制代码例程中的符号执行
作者:
Jinxin Ma
;
Guowei Dong
;
Puhan Zhang
;
Tao Guo
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
binary codes;
flow graphs;
program diagnostics;
programming languages;
symbol manipulation;
SymWalker;
VEX language;
binary code routines;
binary code vulnerability detection;
control flow graphs;
disassembly codes;
program analysis;
security property rules;
software binary files;
source codes;
static analysis;
symbolic execution;
Binary codes;
Computer bugs;
Computer languages;
Computers;
Registers;
Security;
Software;
Symbolic execution;
control flow analysis;
security property;
vulnerabilities;
27.
A Modified PSO Algorithm Based on Cache Replacement Algorithm
机译:
一种基于缓存替换算法的改进的PSO算法
作者:
Mingyue Feng
;
Hua Pan
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cache storage;
evolutionary computation;
particle swarm optimisation;
search problems;
CRS-PSO hybrid evolutionary algorithm;
cache replacement search PSO algorithm;
modified PSO algorithm;
slow convergence problem;
Algorithm design and analysis;
Computers;
Convergence;
Memory management;
Particle swarm optimization;
Vectors;
cache replacement algorithm;
hybrid algorithm;
particle swarm optimization;
slow convergence;
28.
Attribute-Based Encryption for Restricted Circuits from Lattices
机译:
格的受限电路的基于属性的加密
作者:
Zhao Jian
;
Gao Haiying
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
lattice theory;
logic circuits;
polynomials;
KP-ABE scheme;
chosen plaintext attack;
key-policy attribute-based encryption scheme;
lattices;
learning-with-errors assumptions;
polynomials bounded depth;
restricted circuits;
root node;
selective model;
Encryption;
Lattices;
Logic gates;
Vectors;
Wires;
attribute-based encryption (ABE);
lattice;
learning with errors (LWE);
restricted circuits;
29.
A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted Computing Technology
机译:
采用可信计算技术的实时系统混合任务调度算法
作者:
Tingyu Jiang
;
Yahui Li
;
Yuan Dong
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
embedded systems;
scheduling;
task analysis;
trusted computing;
TBS algorithm;
advanced dynamic hybrid task schedule algorithm;
aperiodic tasks;
dynamic scheduling;
embedded systems;
hybrid tasks model;
real-time system;
security;
total bandwidth server algorithm;
trusted computing constraint;
trusted computing resources;
trusted computing technology;
Bandwidth;
Dynamic scheduling;
Embedded systems;
Real-time systems;
Schedules;
Security;
Time factors;
hybrid tasks;
real-time;
schedule algorithm;
trusted computing;
trusted-software-stack;
30.
The Automatic Classification Research to Medical Imaging Disease Based on Naïve Nayesion Algorithm
机译:
基于朴素Nayesion算法的医学影像疾病自动分类研究
作者:
Niu Luoyong
;
Hong Jiaming
;
Huo Hongbo
;
He Bishi
;
Xu Zhe
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Bayes methods;
biomedical imaging;
classification;
diseases;
information retrieval;
medical information systems;
pattern clustering;
-means algorithm;
.Net technology;
Naïve Nayesion algorithm;
automatic disease classification research;
hierarchical medical imaging examination report information retrieval;
medical imaging disease cluster;
retrieval efficiency improvement;
Bayes methods;
Biomedical imaging;
Classification algorithms;
Clustering algorithms;
Diseases;
Naïve Bayesian;
automatic classification;
hierarchical retrieval;
k-means algorithm;
31.
An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings
机译:
无双线性配对的高效基于模糊身份的签名方案
作者:
Changji Wang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
digital signatures;
fuzzy set theory;
bilinear pairings;
biometric authentication;
biometric identifiers;
biometric identity;
biometric-based signature;
cryptographic primitive;
fuzzy identity-based signature scheme;
human identification;
message attack;
predefined distance metric;
selective-set model;
standard discrete logarithm assumption;
unforgeability;
Adaptation models;
Authentication;
Biological system modeling;
Encryption;
Public key;
Biometric;
Fuzzy Identity-based Encryption;
Fuzzy Identity-based Signature;
Identity-based Signature;
Selective-Set Model;
32.
Hierarchial Identity-Based Encryption Scheme from Multilinear Maps
机译:
多线性映射的基于分层身份的加密方案
作者:
Hao Wang
;
Zhihua Zheng
;
Lei Wu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
IBE;
generic leveled multilinear map setting;
hierarchical identity-based encryption scheme;
multilinear decisional Diffie-Hellmanin assumption;
organizational hierarchy;
selective-ID model;
Encryption;
Games;
Identity-based encryption;
Vectors;
HIBE;
multilinear decisional Diffie-Hellmanin assumption;
multilinear map;
selective-ID model;
33.
A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text Documents
机译:
跨阶段切碎文本文档的两阶段重建方法
作者:
Ya Wang
;
Ding-Cheng Ji
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
document image processing;
genetic algorithms;
image matching;
image reconstruction;
text analysis;
cross-cut shredded text documents reconstruction;
genetic algorithm;
image-based techniques;
matching proportion;
memetic algorithm;
probabilistic Kruskal based heuristic;
two-stage approach;
Clustering algorithms;
Genetic algorithms;
Heuristic algorithms;
Image reconstruction;
Indexes;
Sociology;
Statistics;
Kruskal heuristic;
cluster analysis;
document reconstruction;
genetic algorithms;
memetic algorithms;
34.
Adaptive Central Force Optimization with Variable Population Size
机译:
可变人口规模的自适应中心力优化
作者:
Liu Jie
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
optimisation;
CFO;
adaptive central force optimization;
population evolution;
variable population size;
Algorithm design and analysis;
Force;
Heuristic algorithms;
Optimization;
Probes;
Sociology;
Statistics;
central force optimization;
global optimization;
population size;
35.
A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
机译:
具有代理重新加密的多用户可搜索加密方案
作者:
Zhang Ya-ling
;
Liu Kai
;
Wang Shang-ping
;
Sun Qin-dong
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
authorisation;
cloud computing;
cryptography;
data structures;
storage management;
access control strategy;
cloud computing technology;
cloud storage system;
data index structure;
multiusers searchable encryption scheme;
proxy reencryption;
secret key reencryption;
Access control;
Authentication;
Cloud computing;
Encryption;
Privacy;
Servers;
Authentication;
Cloud storage;
Multi-users;
Proxy re-encryption;
Searchable encryption;
36.
A Bayesian Analysis of Zero-Inflated Count Data: An Application to Youth Fitness Survey
机译:
零膨胀计数数据的贝叶斯分析:在青少年适应性调查中的应用
作者:
Liying Lu
;
Yingzi Fu
;
Peixiao Chu
;
Xiaolin Zhang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Bayes methods;
data handling;
regression analysis;
stochastic processes;
Bayesian analysis;
DIC criterion;
Gibbs sampler;
M-H algorithm;
Posterior Prediction P-value;
ZIP regression model;
data augmentation strategy;
excess zeroes;
model selection;
ppp-value;
public health survey;
youth fitness survey;
zero-inflated Poisson regression model;
zero-inflated count data;
Analytical models;
Bayes methods;
Computational modeling;
Data models;
Estimation;
Predictive models;
Standards;
Bayesian model selection;
Posterior Prediction P-value;
count data;
zero-inflation;
37.
A Codebook Based Background Subtraction Method for Image Defects Detection
机译:
基于码本的背景减影检测方法
作者:
Lianjun Zhang
;
Yao Lu
;
Mukai Chen
;
Wencai Zou
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
object detection;
video surveillance;
background minor motions;
background modeling method;
codebook based background subtraction method;
codebook modeling method;
complicated background;
exceptional flaw pixels;
foreground objective detection;
image defects detection;
moving objects detection;
print industry;
printed image;
video surveillance;
wished printing pattern;
Adaptation models;
Brightness;
Computational modeling;
Image color analysis;
Printing;
Real-time systems;
Robustness;
background modeling;
clutterd background;
codebook;
foreground detection;
image;
38.
Adaptive Chosen-Plaintext Correlation Power Analysis
机译:
自适应选择纯文本相关功率分析
作者:
Wenjing Hu
;
Liji Wu
;
An Wang
;
Xinjun Xie
;
Zhihui Zhu
;
Shun Luo
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
signal processing;
AES;
adaptive chosen-plaintext CPA;
adaptive chosen-plaintext correlation power analysis attack;
automatic software;
power traces;
signal-to-noise ratio;
Adaptation models;
Correlation;
Correlation coefficient;
Encryption;
Hamming weight;
Signal to noise ratio;
Advanced Encryption Standard;
Hamming weight power model;
adaptive chosen-plaintext attack;
correlation power analysis;
39.
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition
机译:
基于功能签名识别的密码算法分析技术研究
作者:
Rui Chang
;
Liehui Jiang
;
Hui Shu
;
Hongqi He
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
invasive software;
pattern recognition;
cryptographic algorithms analysis;
cryptographic algorithms library;
functions signature recognition technology;
malwares;
Algorithm design and analysis;
Character recognition;
Ciphers;
Feature extraction;
Libraries;
Software algorithms;
cryptographic algorithms recognition;
minimum perfect Hash function;
signature library;
40.
A Simple and Real-Time Parallel Compression of Time Series Scientific Simulation Data for Interactive and Cooperative Supercomputing
机译:
交互式和协作式超级计算的时间序列科学仿真数据的简单实时并行压缩
作者:
Wenjuan Liu
;
Xinhong Hei
;
Fukuma Shinji
;
Mori Shin-Ichiro
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
data compression;
interactive systems;
parallel processing;
real-time systems;
scientific information systems;
time series;
Think Mantissa;
bzip2 compression strategies;
compression ratio improvement;
cooperative supercomputing environment;
data transfer;
gzip compression strategies;
integer method;
interactive cooperative supercomputing;
large-scale scientific simulation data;
lossless data compression;
parallel compression;
real-time data compression;
scientific dataset entropy;
scientific simulation;
speed acceleration;
supercomputers;
time series scientific simulation data;
time-series simulation interactivity;
Computational efficiency;
Computational modeling;
Data compression;
Data models;
Fluids;
Parallel processing;
Time series analysis;
Lossless compression;
Parallel Processing;
Real-time Interaction;
Supercomputing;
41.
A Parking Guidance Method Based on Parallel Particle Swarm Optimization Algorithm
机译:
基于并行粒子群算法的停车诱导方法
作者:
Bin Wang
;
Ying Liu
;
Xinhong Hei
;
Lei Wang
;
Zhiqiang Zhang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
genetic algorithms;
intelligent transportation systems;
multi-threading;
particle swarm optimisation;
traffic control;
PHPSO;
convergence speed;
improved particle swarm optimization algorithm;
intelligent path guidance;
multithread technology;
optimal path;
parallel hybrid PSO algorithm;
parallel particle swarm optimization algorithm;
parking guidance method;
Algorithm design and analysis;
Convergence;
Heuristic algorithms;
Particle swarm optimization;
Sociology;
Statistics;
Vehicles;
GA;
PSO;
parallel computing;
parking guidance;
42.
Diversifying Results of Top-k Querys over Bounded Regions
机译:
边界区域前k个查询的多样化结果
作者:
Yu Zhou
;
Guohua Liu
;
Biying Wang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
query processing;
Euclidean space;
bounded regions;
diversification optimal subspace;
top-k bounded diversification algorithm;
top-k query processing;
Algorithm design and analysis;
Computational intelligence;
Heuristic algorithms;
Query processing;
Security;
Vectors;
Web search;
Euclidean space;
bounded diversification;
difference;
similarity;
top-k query;
43.
An Improved MULTI-ACS Algorithm for the Waste Collection Vehicle Arc Routing Problem with Turn Constraints
机译:
带有转向约束的垃圾收集车弧线问题的改进MULTI-ACS算法
作者:
Jie Liu
;
Yanfeng He
;
Aiping Zhang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
road traffic;
vehicle routing;
waste management;
3-exchange neighborhood;
AVNRP model;
CVARP;
MSW collection;
WCVARPTC model;
asymmetric vehicle node routing problem model;
improved MULTI-ACS algorithm;
reinsertion neighborhood;
substitution neighborhood;
traffic regulations;
waste collection vehicle arc routing problem with turn constraint model;
Algorithm design and analysis;
Benchmark testing;
Computational intelligence;
Educational institutions;
Routing;
Security;
Vehicles;
ACS;
Waste Collection Vehicle Arc Routing Problem with turn constraints;
reverse logistics;
waste collection management;
44.
Financial Time Series Forecasting Using Support Vector Machine
机译:
支持向量机的金融时间序列预测
作者:
Bin Gui
;
Xianghe Wei
;
Qiong Shen
;
Jingshan Qi
;
Liqiang Guo
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
financial data processing;
forecasting theory;
fuzzy set theory;
regression analysis;
stock markets;
support vector machines;
time series;
Shanghai Composite Index Week closed index;
financial markets;
financial time series forecasting methods;
fuzzy grain particle sequences;
lower bounds;
single-step prediction;
support vector machine regression;
upper bounds;
Educational institutions;
Forecasting;
Fuzzy sets;
Indexes;
Reliability;
Support vector machines;
Time series analysis;
financial time series;
information granulation;
regression;
support vector machine;
45.
Individual Intelligence Based Optimization and Its Application to ITAE Standard Forms
机译:
基于个人智能的优化及其在ITAE标准表中的应用
作者:
Qiwen Yang
;
Shanshan Fu
;
Yuncan Xue
;
Shanna Ruan
;
Junfeng Chen
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
optimisation;
swarm intelligence;
IIO;
ITAE standard forms;
PSO;
SIO optimization;
ant colony algorithm;
individual intelligence based optimization;
intelligence based optimization;
particle swarm optimization;
social creature behaviors;
solitary creatures;
swarm intelligence;
swarm intelligence based optimization;
Animals;
Educational institutions;
Integrated circuits;
Optimization;
Particle swarm optimization;
Recycling;
Standards;
ITAE;
global optimization;
individual intelligence;
swarm intelligence;
46.
A Feedback-Based Self-Organizing Query Structure Optimization Algorithm
机译:
基于反馈的自组织查询结构优化算法
作者:
Ruilin Xu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
feedback;
genetic algorithms;
query processing;
GA algorithm;
feedback;
feedback technology;
genetic algorithm;
information retrieval;
query parameter;
query structure uncertainty;
query vector;
self-organizing query structure loop;
Genetic algorithms;
Information retrieval;
Optimization;
Standards;
Uncertainty;
Vectors;
Information retrieval;
VSM;
query parameter;
query structure;
self-organizing;
uncertainty;
47.
Variational Image Decomposition in Shearlet Smoothness Spaces
机译:
Shearlet平滑空间中的变分图像分解
作者:
Min Li
;
Xiaoli Sun
;
Chen Xu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
image representation;
variational techniques;
Daubechies-Teschke's model;
anisotropic phenomena analysis;
directional information;
flexible mathematical framework;
multiscale analysis;
shearlet representation;
shearlet shrinkage schemes;
shearlet smoothness spaces;
shearlet-based regularization term;
variational image decomposition;
Image decomposition;
Mathematical model;
Minimization;
Noise measurement;
Noise reduction;
PSNR;
image decomposition;
shearlet;
variaitional;
48.
Information Flow Control Model and Method in Distribute MILS
机译:
分布式MILLS中的信息流控制模型和方法
作者:
Kaiqiang Li
;
Hao Feng
;
Yahui Li
;
Zhiwei Zhang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
avionics;
information dissemination;
security of data;
MILS;
avionics system generation;
cooperative combat environment;
data integration;
high resource sharing;
information flow control model;
multilevel information flow control policy framework;
multiple independent levels of security;
potential sensitive information leakage;
software intensive;
Aerospace electronics;
Encryption;
Kernel;
Middleware;
Ports (Computers);
distribute;
information flow control;
mils;
pcs;
security policy;
49.
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms
机译:
具有身份保护的安全网络协议,用于无人平台合作
作者:
Yahui Li
;
Wensheng Niu
;
Peng Li
;
Jianfeng Ma
;
Yulong Shen
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
computer network security;
cryptographic protocols;
data communication;
wireless LAN;
ID-based anonymous authentication scheme;
confidentiality;
data transmission;
decryption process;
dynamic networking;
four-party security information exchange protocol;
identity protection;
key management;
nonrepudiation;
secure group communication;
secure networking protocol;
secure session keys;
security domain;
unforgeability;
unmanned platforms;
wireless environments;
Ad hoc networks;
Authentication;
Protocols;
Public key;
Sensors;
anonymous authentication;
cooperation;
dynamical networking;
secure communication;
wireless network;
50.
Ensuring Reliability and QoS Optimizing for Web Service Composition
机译:
确保Web服务组合的可靠性和QoS优化
作者:
Liping Chen
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Web services;
decision making;
quality of service;
utility programs;
QoS-based optimal service selection;
Web service composition;
multiple attribute decision making approach;
service reliability;
value-added service;
Computational intelligence;
Educational institutions;
Quality of service;
Reliability;
Security;
Semantics;
Web services;
QoS property;
Reliability;
Web Service Composition;
51.
A Wav-Audio Steganography Algorithm Based on Amplitude Modifying
机译:
基于幅度修改的Wav音频隐写算法
作者:
Zou Mingguang
;
Li Zhitang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
audio signal processing;
random number generation;
signal sampling;
steganography;
amplitude modifcation;
antisteganalysis ability;
blind extraction;
embedding strength;
hiding capacity;
random number generator;
sampling point;
wav-audio steganography algorithm;
Bit error rate;
Data mining;
Generators;
Histograms;
Security;
Signal processing algorithms;
Signal to noise ratio;
amplitude modifying;
audio steganography;
hiding capacity;
invisibility;
52.
Linear Input Method of Mathematical Formula
机译:
数学公式的线性输入法
作者:
Ming Cheng
;
Wei Su
;
Yuexia Xu
;
Zhiyi Qu
;
Xuan Wang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
computer aided instruction;
mathematics computing;
teaching;
Chinese users;
Greek letters;
MEIL;
education teaching rule;
elementary mathematics teachers;
finite characters;
infix formats;
linear input method;
mathematical expand infix language;
mathematical formula;
mathematical formula linear syntax format;
one-dimensional characters;
students;
two-dimensional structure computer;
Algebra;
Computers;
Indexes;
Keyboards;
Syntactics;
Writing;
MathML;
Mathematical Formula Linear Syntax Format;
Mathematical Formula Semantic;
Mathematical Formula Typesetting Layout;
53.
Real-Time Simulation in Dynamic Electromagnetic Scenes Using PipelineThread Pool
机译:
使用PipelineThread池在动态电磁场景中进行实时仿真
作者:
Mukai Chen
;
Yao Lu
;
Guanghao Zhang
;
Wencai Zou
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
digital simulation;
military computing;
missiles;
multi-threading;
dynamic electromagnetic scenes;
parallel computing;
pipeline based technology;
pipeline thread pool;
real-time simulation;
Computational modeling;
Electromagnetics;
Instruction sets;
Missiles;
Pipelines;
Radar;
Real-time systems;
dynamic electromagnetic scenes;
parallel computing;
pipeline;
pool;
real-time simulation;
54.
An Evolutionary Algorithm Based on a Space-Gridding Scheme for Constrained Multi-objective Optimization Problems
机译:
约束多目标优化问题的基于空间网格的进化算法
作者:
Wen Li
;
Hecheng Li
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Pareto optimisation;
computational complexity;
evolutionary computation;
search problems;
Pareto solutions;
computation time reduction;
constrained multiobjective optimization problems;
evolutionary algorithm;
nondominated solutions;
space-gridding search scheme;
uniform distribution;
Algorithm design and analysis;
Evolutionary computation;
Linear programming;
Optimization;
Sociology;
Statistics;
Vectors;
Multi-objective optimization problem;
evolutionary algorithm;
feasible ratio;
space-gridding;
55.
Combining TOPSIS and Particle Swarm Optimization for a Class of Nonlinear Bilevel Programming Problems
机译:
结合TOPSIS和粒子群算法求解一类非线性双层规划问题
作者:
Liping Jia
;
Guocheng Zou
;
Lei Fan
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
TOPSIS;
nonlinear programming;
particle swarm optimisation;
KKT condition;
TOPSIS PSO;
equivalent problem;
nonlinear bilevel programming problems;
particle swarm optimization;
transformed problem;
unconstrained optimization problem;
Educational institutions;
Linear programming;
Optimization;
Particle swarm optimization;
Programming;
Sociology;
Statistics;
KKT condition;
PSO;
TOPSIS;
nonlinear bilevel programming;
56.
The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative
机译:
基于最小绝对准则的交替方向迭代CT图像重建算法
作者:
Wenzhang He
;
Hongjian Xu
;
Zhengyang Guo
;
Jie Liang
;
Lina Wang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
computerised tomography;
image reconstruction;
iterative methods;
optimisation;
ART algorithm;
CT image reconstruction algorithm;
alternating direction iterative;
computed tomography;
image signal-to-noise ratio;
least absolute criterion;
objective function;
optimization problem;
reconstruction quality improvement;
Computed tomography;
Data models;
Image reconstruction;
Linear programming;
Noise;
Optimization;
Subspace constraints;
ART;
alternating direction method;
image reconstruction;
the least absolute criteria;
57.
Scalable Lightweight Authentication Protocol with Privacy Preservation
机译:
具有隐私保护功能的可扩展轻型身份验证协议
作者:
Yanfei Liu
;
Sha Feng
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptographic protocols;
data privacy;
RFID tags;
challenge-response approach;
compromise attacks;
group-based protocols;
hash functions;
key-shared protocols;
mobile phones;
privacy preservation;
privacy-preserving authentication protocols;
resynchronization attacks;
scalable lightweight authentication protocol;
tree-based protocols;
Authentication;
Mobile handsets;
Privacy;
Protocols;
Radiofrequency identification;
Servers;
RFID;
authentication;
mobile application;
privacy preservation;
scalable protocol;
58.
Quantum Algorithm for Polynomial Root Finding Problem
机译:
多项式求根问题的量子算法
作者:
Sun Guodong
;
Su Shenghui
;
Xu Maozhi
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
computational complexity;
cryptography;
quantum computing;
Brassard-Hoyer-Tapp's algorithm;
Grover's algorithm;
O(rootM/t) steps;
cryptography problem;
cryptosystem;
exhaustive search;
fundamental quantum mechanical principle;
polynomial root finding problem;
quantum computation;
quantum computing model;
searching problem;
square root time;
Algorithm design and analysis;
Cryptography;
Polynomials;
Quantum computing;
Quantum mechanics;
Search problems;
Polynomial root finding problem;
Quantum counting;
Quantum searching;
Signature algorithm;
59.
Modeling Behaviors of Browsing and Buying for Alidata Discovery Using Joint Non-negative Matrix Factorization
机译:
使用联合非负矩阵分解对Alidata发现进行浏览和购买的行为建模
作者:
Bin Ju
;
Mincao Ye
;
Yuntao Qian
;
Rong Ni
;
Chenxi Zhu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Internet;
behavioural sciences computing;
matrix decomposition;
recommender systems;
Alibaba Group;
Alidata discovery;
data competition;
factorized coefficient matrices;
joint nonnegative matrix factorization;
recommender algorithm;
user browsing behaviors;
user buying behaviors;
user-item browsing matrix;
user-item buying matrix;
Educational institutions;
Hidden Markov models;
Joints;
Matrix converters;
Matrix decomposition;
Probabilistic logic;
Recommender systems;
behavior;
joint non-negative matrix factorization;
latent factor;
60.
Two-Phase SVPWM Modulation Method and Its Application in Stepper Motor
机译:
两相SVPWM调制方法及其在步进电机中的应用
作者:
Na Dong
;
Zhengfeng Ming
;
Tao Wen
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
pulse width modulation;
stepping motors;
space voltage vector pulse width modulation;
two-phase SVPWM modulation method application;
two-phase hybrid stepping motor;
AC motors;
MATLAB;
Mathematical model;
Space vector pulse width modulation;
Vectors;
Windings;
Matlab/Simulink;
Two-phase hybrid stepping motor;
61.
A Reliable Supervision Model and Implementation for the Trading of Digital Works
机译:
数字作品交易的可靠监督模型与实现
作者:
Guozhen Shi
;
Ying Shen
;
Fenghua Li
;
Mang Su
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
authorisation;
copyright;
data encapsulation;
electronic publishing;
abnormal data;
authorizer;
copyright owner;
data encapsulation;
digital works;
integrated trade data;
invisible digital works;
publishers;
reliable supervision model;
robust upload data protocol;
seller;
system implementation;
trading count;
trading process;
trusted third-part platform;
Authorization;
Data models;
Databases;
Protocols;
Radiation detectors;
Reliability;
digital works trading;
reliable supervision;
trading count;
trading dispute;
trusted third-part;
62.
Design Implementation to an RFID Based Conference Management System
机译:
基于RFID的会议管理系统的设计与实现
作者:
Zhihua Jiang
;
Zhongwei Si
;
Chi Luo
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
radiofrequency identification;
telecommunication network management;
China Mobile two-dimensional code electronic voucher;
OCR recognition;
RFID based conference management system;
conference procedure;
image field acquisition;
information statistic;
intelligent conference management system;
interminable sign-in list;
manual identification;
multiconference management enabled;
super-rapid increasing market scope;
text message platform;
Cameras;
Conference management;
Mobile communication;
Privacy;
Radiofrequency identification;
Security;
Time-frequency analysis;
OCR;
RFID;
conference management system;
information statistic;
two-dimensional code;
63.
A Countermeasure for DES with Both Rotating Masks and Secured S-Boxes
机译:
带有旋转掩模和固定S盒的DES的对策
作者:
Zeleng Zhuang
;
Jiachao Chen
;
Haosheng Zhang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
DES algorithm;
data encryption standard;
differential power attack;
first-order DPA;
hiding technique;
high-order DPA attacks;
mixed protection scheme;
rotating masks;
second-order DPA;
secured s-boxes;
side channel attack;
Ciphers;
Educational institutions;
Hardware;
Registers;
Timing;
Data Encryption Standard (DES);
Differential Power Attack(DPA);
Power Analysis;
Rotating Masks;
Secured SBoxs;
Side-Channel Attacks (SCA);
64.
A Low-Cost PKC-based RFID Authentication Protocol and its Implementation
机译:
一种基于低成本PKC的RFID认证协议及其实现
作者:
Lili Wei
;
Zhaotong Luo
;
Qiang Qu
;
Qing He
;
Jingwei Xu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Internet of Things;
computer network security;
cryptographic protocols;
data protection;
public key cryptography;
radiofrequency identification;
Internet of Things privacy protection;
coupon injection protocol;
cryptoGPS scheme;
efficient flexible key management scheme;
low-cost PKC-based RFID authentication protocol implementation;
low-cost multiplier;
low-cost mutual authentication protocol;
public key cryptography;
radio frequency identification technology;
security protection;
synopsys design complier;
Authentication;
Elliptic curve cryptography;
Protocols;
Radiofrequency identification;
ECC;
IOT;
PKC;
RFID;
cryptoGPS;
65.
Optimal Pricing with Yield Management in M/M/c
机译:
M / M / c中具有收益管理的最优定价
作者:
Xin Li
;
Zhaotong Lian
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
catering industry;
customer services;
pricing;
queueing theory;
M/M/c queue;
bar;
discount price;
hair saloon;
optimal pricing;
price discrimination;
price paid;
queue length;
restaurant management;
restaurant profit expectation maximization;
seat allocation;
service industries;
two-dependent-queue model;
waiting line;
yield management;
Computational intelligence;
Educational institutions;
Industries;
Markov processes;
Pricing;
Resource management;
Security;
M/M/c;
Yield Management;
pricing;
66.
Simulation Study on the Keep-Right-Except-to-Pass Rule Model Based on Cellular Automata
机译:
基于元胞自动机的通行权保留规则模型的仿真研究
作者:
Xin Yang
;
Linna Wang
;
Hongbo Zai
;
Yanrong Ren
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cellular automata;
road safety;
road traffic;
stochastic processes;
KRETP rule;
STCA model;
active drivers;
conservative drivers;
keep-right-except-to-pass rule;
keep-right-except-to-pass rule model;
multi-lane freeways;
single-lane stochastic cellular automata model;
traffic flow;
traffic safety;
Accidents;
Analytical models;
Automata;
Mathematical model;
Roads;
Safety;
Vehicles;
Cellular Automaton;
Lane-changing;
Rule;
Stochastic cellular automata;
Traffic flow;
67.
Image Up-Scaling: Based on Self Similarity and Local Information
机译:
图像放大:基于自相似度和局部信息
作者:
Xin Zheng
;
Chenlei Lv
;
Qingqing Xu
;
Ping Guo
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
image sampling;
image texture;
interpolation;
rendering (computer graphics);
image up-scaling algorithm;
interpolation method;
local information;
self similarity;
structural information;
texture rendering;
up-sampling technique;
up-scaling image quality;
Educational institutions;
Image edge detection;
Image resolution;
Information science;
Interpolation;
Rendering (computer graphics);
Streaming media;
Image upscaling;
image sampling;
self similarity;
68.
Choice of Regularization Parameter in Constrained Total Variational Image Restoration Model
机译:
约束总变分图像恢复模型中正则化参数的选择
作者:
Zhibin Chen
;
Man Wang
;
Youwei Wen
;
Zhining Zhu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
image restoration;
box constrained total variation minimization;
constrained total variational image restoration model;
discrepancy principle;
ill-conditioning;
image formation process;
image restoration problem;
numerical scheme;
numerical simulations;
primal-dual method;
regularization parameter;
total variational based minimization problem;
variable splitting method;
Dynamic range;
Image restoration;
Imaging;
Mathematical model;
Minimization;
Satellites;
TV;
Total variational;
box constraints;
discrepancy principle;
regularization parameter;
69.
A Novel Template Attack on wNAF Algorithm of ECC
机译:
针对ECC的wNAF算法的新型模板攻击
作者:
Zhenbin Zhang
;
Liji Wu
;
Zhaoli Mu
;
Xiangmin Zhang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
public key cryptography;
CPA;
Chinese public key cryptosystem standard;
DTTA;
ECC;
Riscure platform;
SPA;
multiple countermeasures;
multivariate normal distribution;
private key;
side channel attack;
smart IC card;
template attack;
template matching method;
template matching phase;
wNAF algorithm;
Algorithm design and analysis;
Buildings;
Correlation;
Elliptic curve cryptography;
Gaussian distribution;
Power demand;
SM2;
power analysis;
public key decryption;
scalar multiplication;
template attack;
wNAF;
70.
Joint Sequential Shape Classification and Piecewise Elastic Motion Estimation
机译:
关节顺序形状分类和分段弹性运动估计
作者:
Feng Lv
;
Huijun Di
;
Yao Lu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Markov processes;
image classification;
motion estimation;
Markov chain;
joint sequential shape classification and piecewise elastic motion estimation;
nonrigid motion estimation;
whole motion sequence;
Coherence;
Legged locomotion;
Motion estimation;
Motion segmentation;
Shape;
Temperature measurement;
Tracking;
elastic motion;
motion connection;
motion estimation;
shape classification;
71.
Analysis of Energy Saving and Performance Characteristics of Library Computer Room Intelligent High Heat Transfer and Exchanger
机译:
图书馆机房智能高热交换器节能性能特点分析
作者:
Chen Juntao
;
Wu Shulei
;
Lin Lan
;
Zhan Jinmei
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
energy conservation;
heat exchangers;
heat transfer;
air-conditioner;
energy consumption analysis;
energy saving effect;
energy saving technologies;
heat exchanger;
library computer room intelligent high heat transfer;
Air conditioning;
Computers;
Energy consumption;
Energy measurement;
Heat transfer;
Heating;
Libraries;
Emission reduction;
Energy conservation;
Heat exchanger;
High rate of heat exchanging;
Library computer room;
intelligent control;
72.
Wireless Location on CPN Correction Environmental Factors
机译:
CPN校正环境因素的无线定位
作者:
Zhifeng Lin
;
Jiechang Wen
;
Qiling Chen
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
environmental factors;
maximum likelihood estimation;
wireless sensor networks;
CPN correction environmental factors;
complex nonlinear characteristics;
maximum likelihood estimation method;
mobile target tracking error;
nodes position;
non line-of-sight environment;
received signal strength;
smart space mobile targeting;
wireless location;
Educational institutions;
Estimation;
Neurons;
Training;
Vectors;
Wireless communication;
Wireless sensor networks;
counter propagation networks;
maximum likelihood estimate;
received signal strength indicator(RSSI);
wireless sensor network;
73.
Verification of Artifact Lifecycle Model
机译:
工件生命周期模型的验证
作者:
Xiaomei Wan
;
Guohua Liu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
business data processing;
formal verification;
graph theory;
FSM;
artifact lifecycle model verification;
business compliance checks;
business departments;
business process;
business rules;
finite state machine;
graph construction;
information lifecycle;
information model;
real-time monitoring processing;
Artificial intelligence;
Business;
Computational intelligence;
Computational modeling;
Educational institutions;
Finite element analysis;
Polynomials;
artifact;
artifact lifecycle;
business process;
verification;
74.
Visualization of Police Intelligence Data Based on Word Clouds
机译:
基于词云的警察情报数据可视化
作者:
Peng Wei
;
Tongge Xu
;
Xi Qin
;
Chao Wang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cloud computing;
data visualisation;
police data processing;
text analysis;
incidents data visualization;
police intelligence data visualization;
police intelligence system;
text visualization method;
word clouds technique;
Artificial intelligence;
Data mining;
Data visualization;
Databases;
Dictionaries;
Security;
Tag clouds;
110 incidents data;
visualization;
word clouds;
75.
Hardware Design and Implementation of SM3 Hash Algorithm for Financial IC Card
机译:
金融IC卡SM3哈希算法的硬件设计与实现
作者:
Ye Hu
;
Liji Wu
;
An Wang
;
Beibei Wang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
VLSI;
cryptography;
field programmable gate arrays;
financial data processing;
integrated circuit design;
smart cards;
FPGA verification;
SM3 IP core design;
SM3 hash algorithm;
SMIC technology;
VLSI architecture;
behavioral simulation;
circuit design;
current 1 mA;
financial IC card;
gate-level simulation;
hardware design;
power analysis;
size 0.13 mum;
voltage 1.2 V;
Algorithm design and analysis;
Hardware;
Integrated circuit modeling;
Logic gates;
Registers;
Standards;
SM3 Cryptographic Hash Algorithm;
financial IC card;
low power;
small area;
76.
Method of Non-reference Image Quality Assessment of SSIM Based on Regional Weighted Entropy
机译:
基于区域加权熵的SSIM非参考图像质量评估方法
作者:
Zhang Tong
;
Zhao Shuna
;
Li Xue
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
image processing;
SSIM;
average weighted structural similarity;
human visual system;
image assessing index;
image edge features;
nonreference image quality assessment;
regional weighted information entropy index;
space influence factor;
Entropy;
Image edge detection;
Image quality;
Indexes;
Information entropy;
Noise;
Visualization;
Human Visual System;
quality assessment;
regional weighted entropy;
structural similarity;
visual region of interest;
77.
Internet Security Protection in Personal Sensitive Information
机译:
个人敏感信息中的Internet安全保护
作者:
Yubin Wang
;
Chao Li
;
Nan Cheng
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Internet;
security of data;
Internet security protection;
Web application security;
database security;
encrypt/decrypt technology;
information security protection strategies;
personal sensitive information protection;
protocol security;
safety method;
Databases;
Encryption;
Information security;
Internet;
Protocols;
information security;
internet security;
personal sensitive information;
78.
Detecting Compromised VM via Application-Aware Anomaly Detection
机译:
通过应用程序感知异常检测来检测受损的VM
作者:
Kai Luo
;
Shouzhong Tu
;
Chunhe Xia
;
Dan Zhou
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cloud computing;
computer network security;
telecommunication traffic;
virtual machines;
virtualisation;
AADS;
IaaS cloud;
VM behavior monitoring;
VM security;
Xen hypervisor;
anomalous VM behavior detection;
application-aware anomaly detection;
application-aware anomaly detection system;
attacker target;
compromised VM detection;
correlated approach;
infrastructure as a service;
network level;
process granularity;
system level;
virtual machine security;
virtualization;
Feature extraction;
Malware;
Monitoring;
Ports (Computers);
Training;
Virtual machining;
anomaly detection;
security monitor;
virtual machine;
virtual machine introspection;
79.
Design of a Masked S-Box for SM4 Based on Composite Field
机译:
基于复合场的SM4蒙版S盒设计
作者:
Hao Liang
;
Liji Wu
;
Xiangmin Zhang
;
Jiabin Wang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
SM4;
composite field;
isomorphism bit matrices;
masked S-box design;
masking scheme;
simulated CPA;
smart cards;
Ciphers;
Computational intelligence;
Encryption;
Galois fields;
Hardware;
SM4;
composite field;
normal basis;
s-box;
80.
Experiments with Feature-Prior Hybrid Ensemble Method for Classification
机译:
特征优先混合集成法进行分类的实验
作者:
Junyang Zhao
;
Zhili Zhang
;
Chongzhao Han
;
Lijiang Sun
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
feature selection;
pattern classification;
base classifiers;
classification;
classifier ensemble;
feature selection;
feature-prior FS-IS hybrid ensemble method;
feature-prior hybrid ensemble method;
instance selection;
instance-prior method;
multiple classifier systems;
training data;
Accuracy;
Bagging;
Classification algorithms;
Diversity reception;
Iris recognition;
Support vector machines;
Training;
Instance selection;
classifier ensemble;
feature selection;
multiple classifier systems;
81.
Image Denoising Using Low-Rank Dictionary and Sparse Representation
机译:
低秩字典和稀疏表示的图像降噪
作者:
Tao Li
;
Weiwei Wang
;
Long Xu
;
Xiangchu Feng
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
image denoising;
image representation;
image restoration;
singular value decomposition;
BM3D;
K-SVD algorithm;
LRSR;
NLM;
TDNL;
denoising performance;
image denoising model;
low-rank dictionary;
nonlocal patches;
restoration quality;
sparse representation;
state-of-the-art denoising methods;
Dictionaries;
Image denoising;
Image edge detection;
Noise;
Noise level;
Noise reduction;
Image denoising;
Low-rank dictionary learning;
Nonlocal similarity;
Sparse representation;
82.
Bimodal Learning for Multi-concept Image Query
机译:
用于多概念图像查询的双峰学习
作者:
Haijiao Xu
;
Peng Pan
;
Yansheng Lu
;
Chunyan Xu
;
Deng Chen
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
image retrieval;
BLMQ model;
bimodal image retrieval;
bimodal learning;
bimodal multiconcept image query methods;
image visual data;
multiconcept image query model;
multiconcept query performance;
multilabel classification challenge;
textual tag data;
Context;
Detectors;
Kernel;
Semantics;
Support vector machines;
Training;
Visualization;
bimodal learning;
multi-concept query;
supervised learning;
83.
A Random Sampling Algorithm for SVP Challenge Based on y-Sparse Representations of Short Lattice Vectors
机译:
基于短格向量的y-稀疏表示的SVP挑战随机采样算法
作者:
Dan Ding
;
Guizhen Zhu
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
random processes;
sampling methods;
vectors;
SVP algorithms;
SVP solver;
lattice-based cryptography;
random sampling algorithm;
short lattice vectors;
shortest vector problem;
y-sparse representations;
Algorithms;
Complexity theory;
Cryptography;
Lattices;
Polynomials;
Vectors;
Lattice-Based Cryptography;
Random Sampling;
Shortest Vector Problem (SVP);
y-Sparse Representation;
84.
Improved Adaptive Median Filter
机译:
改进的自适应中值滤波器
作者:
Guo Zhengyang
;
Zhang Le
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
adaptive filters;
edge detection;
image denoising;
image filtering;
median filters;
adaptive median filter;
image edge protection;
noise pixel removal;
pepper noise removal;
salt noise removal;
signal pixel;
Adaptive filters;
Educational institutions;
Filtering algorithms;
Filtering theory;
Noise;
Standards;
adaptive median filter;
noise detection;
salt and pepper noise;
85.
Improved Bacterial Foraging Optimization Algorithm with Information Communication Mechanism
机译:
信息通信机制的改进细菌觅食优化算法
作者:
Ben Niu
;
Jing Liu
;
Ying Bi
;
Ting Xie
;
Lijing Tan
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
optimisation;
topology;
SRBFO;
SRBFO-DN;
SRBFO-FC;
SRBFO-Ri;
SRBFO-ST;
SRBFO-VN;
information communication mechanism;
structure-redesigned-based bacterial foraging optimization;
topology structures;
Benchmark testing;
Convergence;
Heuristic algorithms;
Microorganisms;
Optimization;
Security;
Topology;
Bacterial Foraging Optimization;
information communication;
neighborhood topology;
86.
A Developing Method for Parallel Program Based on System Generator
机译:
基于系统生成器的并行程序开发方法
作者:
Wei Han
;
Jianchun Xie
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
computational fluid dynamics;
field programmable gate arrays;
local area networks;
parallel programming;
peripheral interfaces;
software performance evaluation;
CFD;
EULER3D kernel algorithm;
FPGA board;
Gigabit Ethernet MAC interface;
PC+FPGA solution;
computational fluid dynamics;
data exchange;
development cycle;
parallel programs;
software performance;
system generator blocks;
Algorithm design and analysis;
Computational modeling;
Field programmable gate arrays;
Generators;
Mathematical model;
Software packages;
FPGA;
System Generator;
computational fluid dynamics(CFD);
model-based design;
performance optimization;
87.
A Fast Image Stitching Algorithm Based on Improved SURF
机译:
基于改进SURF的快速图像拼接算法
作者:
Zhu Lin
;
Wang Ying
;
Zhao Bo
;
Zhang Xiaozheng
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
feature extraction;
image classification;
image fusion;
image registration;
image sequences;
learning (artificial intelligence);
RELIEF-F algorithm;
SURF based stitching algorithms;
SURF descriptor;
binary classifier;
dimension reduction;
fast image stitching algorithm;
image fusion;
key feature point extraction identification;
machine learning method;
nonkey feature point removal;
spatial image sequence alignment;
spatial image sequence registration;
speeded up robust feature;
threshold-based weighted fusion algorithm;
Algorithm design and analysis;
Classification algorithms;
Feature extraction;
Image fusion;
Image registration;
Machine learning algorithms;
Robustness;
RELIEF-F algorithm;
SURF algorithm;
fast image stitching;
image fusion;
machine learning;
88.
A Feasible Control Strategy for LQG Control Problem with Parameter and Structure Uncertainties
机译:
参数和结构不确定的LQG控制问题的可行控制策略
作者:
Guo Xie
;
Dan Zhang
;
Xinhong Hei
;
Fucai Qian
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Bayes methods;
linear quadratic Gaussian control;
parameter estimation;
performance index;
uncertain systems;
Bayesian theorem;
LQG control problem;
control gain minimization;
control strategy;
linear quadratic Gaussian control problem;
parameter estimation;
parameter uncertainties;
performance index;
receding horizon strategy;
structure uncertainties;
Filtering;
Mathematical model;
Optimal control;
Performance analysis;
Process control;
Symmetric matrices;
Uncertainty;
LQG;
parameter uncertainties;
receding horizon;
structure uncertainty;
89.
An Improved Remote Sensing Image Classification Based on K-Means Using HSV Color Feature
机译:
基于HSV颜色特征的基于K均值的改进遥感图像分类
作者:
Shulei Wu
;
Huandong Chen
;
Zhizhong Zhao
;
Haixia Long
;
Chunhui Song
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
data mining;
feature extraction;
image classification;
remote sensing;
HSV color feature;
feature extraction;
k-means clustering;
remote sensing image classification;
Accuracy;
Classification algorithms;
Educational institutions;
Feature extraction;
Image classification;
Image color analysis;
Remote sensing;
Color Feature;
HSV;
Image Classification;
90.
A New Sybil Attack Detection for Wireless Body Sensor Network
机译:
无线人体传感器网络的新型Sybil攻击检测
作者:
Ruixia Liu
;
Yinglong Wang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
RSSI;
body sensor networks;
cryptography;
telecommunication security;
BSN;
ID;
RSSI;
key encryption technology;
multiple node identifiers;
received signal strength indicator;
security protection;
sybil attack detection;
transmission power;
wireless body sensor network;
Body area networks;
Body sensor networks;
Computational intelligence;
Peer-to-peer computing;
Security;
Simulation;
BSN;
RSSI;
atack dection;
sybil attackt;
91.
Provably Secure Identity-Based Threshold Decryption on Access Structure
机译:
在访问结构上基于安全的基于身份的阈值解密
作者:
Huawang Qin
;
Xiaohua Zhu
;
Yuewei Dai
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
authorisation;
private key cryptography;
set theory;
PKG;
access structure;
adaptive chosen-ciphertext security;
adversary structure;
ciphertext decryption;
formal proof;
ingeniously distributed private key;
provably secure identity-based threshold decryption;
random oracle model;
set theory;
Algorithm design and analysis;
Computers;
Encryption;
Interpolation;
Silicon;
access structure;
cryptography;
identity;
provably security;
threshold decryption;
92.
An Exemplar-Based Hidden Markov Model with Discriminative Visual Features for Lipreading
机译:
基于范例的具有判别视觉特征的隐藏Markov模型用于唇读
作者:
Xin Liu
;
Yiu-ming Cheung
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
geometry;
hidden Markov models;
shape recognition;
vectors;
FED vector sequences;
HMM;
contour-constrained spatial histogram;
discriminative visual features;
exemplar-based hidden Markov model;
frame to exemplar distance vector;
geometric shape parameters;
high-dimensional frame features;
lipreading;
speech utterance;
Feature extraction;
Hidden Markov models;
Speech;
Speech recognition;
Training;
Vectors;
Visualization;
Exemplar;
FED vector;
HMM;
Lipreading;
93.
A Trust-Role Based Context Aware Access Control Model
机译:
基于信任角色的上下文感知访问控制模型
作者:
Chen Lu
;
Zhou Qing
;
Huang Gao-feng
;
Zhang Li-qiang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
authorisation;
trusted computing;
ubiquitous computing;
dynamic access control;
enforce authority;
platform environment;
resource sharing;
sharing resources;
trust role based context aware access control model;
user behavior;
Authorization;
Computational modeling;
Context;
Context modeling;
Lattices;
Information security;
context aware access control;
resource sharing;
trusted computing;
94.
A Chosen-Plaintext Method of CPA on SM4 Block Cipher
机译:
基于SM4分组密码的CPA选择明文方法
作者:
Weijun Shan
;
Lihui Wang
;
Qing Li
;
Limin Guo
;
Shanshan Liu
;
Zhimin Zhang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
CPA attack effect improvement;
CPA method;
SM4 block cipher;
Sasebo-Gii;
chosen-plaintext method;
computation complexity reduction;
key recovery;
power analysis;
round register value;
transformed CPA attack;
Ciphers;
Correlation;
Hamming distance;
Hamming weight;
Power demand;
SM4 block cipher;
chosen-plaintext;
power analysis attack;
95.
Tracking Non-rigid Object Using Discriminative Features
机译:
使用区分特征跟踪非刚性对象
作者:
Qian Wang
;
Qingxuan Shi
;
Xuedong Tian
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Markov processes;
Monte Carlo methods;
object tracking;
MCMC-PF;
Markov Chain Monte Carlo-based particle filter;
deformable rectangle;
discriminative features;
geometric appearance changes;
nonrigid object tracking algorithm;
Adaptation models;
Feature extraction;
Image color analysis;
Object tracking;
Target tracking;
Visualization;
MCMC-PF;
discriminative feature;
non-rigid object tracking;
96.
IP Traceback Algorithm Based on Deterministic Linear Network Coding
机译:
基于确定性线性网络编码的IP回溯算法
作者:
Qiao Yan
;
Nan Lu
;
Tu-Wen Ning
;
Xi-Yan Yao
;
Bao-Guang Li
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
IP networks;
computational complexity;
computer network security;
network coding;
DDoS;
IP traceback algorithm;
NS2 environment;
attack path;
computational complexity;
deterministic linear network coding;
distributed denial of service attack;
false alarm rate;
probabilistic packet marking algorithm;
Algorithm design and analysis;
Encoding;
Equations;
IP networks;
Mathematical model;
Network coding;
Vectors;
DDoS;
IP traceback;
Network Coding;
Probabilistic packet marking (PPM);
97.
Spatio-Temporal Context for More Accurate Dense Point Trajectories Estimation
机译:
时空上下文,用于更精确的密集点轨迹估计
作者:
Qingxuan Shi
;
Yao Lu
;
Tianfei Zhou
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
Markov processes;
image sequences;
motion estimation;
object recognition;
video signal processing;
MIT sequences;
MRF;
Markov random field;
action recognition;
consecutive frames;
dense motion trackers;
dense point trajectories estimation;
motion estimation;
scene context prior;
trajectories spatio-temporal context;
Context;
Estimation;
Markov processes;
Motion estimation;
Reliability;
Tracking;
Trajectory;
Markov random fields;
dense point trajectories estimation;
spatio-temporal context;
98.
An Improved Multi-pattern Matching Algorithm for Large-Scale Pattern Sets
机译:
大规模模式集的改进多模式匹配算法
作者:
Peng Zhan
;
Wang Yuping
;
Xue Jinfeng
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
data structures;
image matching;
WM algorithm;
Wu-Manber algorithm;
binary search;
computer science;
data structure;
hash table;
improved multipattern matching algorithm;
index table;
large-scale pattern sets;
Algorithm design and analysis;
Computer science;
Educational institutions;
Indexes;
Pattern matching;
Security;
Time complexity;
Wu-Manber algorithm;
multi-pattern matching;
string matching;
99.
A New Packet Filter Schema Based on Multi-level Signature Hash and DFA Grouping
机译:
基于多级签名哈希和DFA分组的新数据包过滤器架构
作者:
Wang Yumeng
;
Wang Yuping
;
Xue Xingsi
;
Zhang Chen
;
Huo Yuanliang
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
cryptography;
telecommunication security;
telecommunication traffic;
DFA grouping;
DFA matching;
DFA pseudosplit;
REGEXP;
REGular EXPressions;
deep packet inspection system;
high speed match engine;
intrusion detection system;
matching speed;
memory footprint;
multilevel signature hash;
network security;
packet filter schema;
single-level signature hash;
traffic monitoring;
Algorithm design and analysis;
Educational institutions;
Filtering algorithms;
Hardware;
Inspection;
Security;
Silicon;
DFA signature;
Deep Packet Inspection;
Intrusion Detection System;
Packet Filter System;
100.
A Wireless Sensor System for the Training of Hammer Throwers
机译:
用于训练掷锤者的无线传感器系统
作者:
Ye Wang
;
Shaotsung Chang
;
Gongbing Shan
;
Hua Li
会议名称:
《International Conference on Computational Intelligence and Security》
|
2014年
关键词:
biomechanics;
data communication;
displacement measurement;
sport;
telecontrol;
wireless sensor networks;
Arduino processor;
XBees;
biomechanical feedback device;
data transmission;
displacement measurements;
hammer throwers training;
hip vertical movement;
infrared proximity sensor;
load cell;
training routes;
training targets;
wire tension;
wireless sensor system;
wireless system control;
Monitoring;
Receivers;
Security;
Training;
Wireless communication;
Wireless sensor networks;
Wires;
Arduino;
XBee;
ZigBee;
biofeedback training;
hammer-throw;
motion analysis;
wireless sensor network;
意见反馈
回到顶部
回到首页