2011 Seventh International Conference on Computational Intelligence … · The Seventh...
Transcript of 2011 Seventh International Conference on Computational Intelligence … · The Seventh...
Sanya, Hainan, China3-4 December 2011
Sponsors:
CIS 2011The Seventh International Conference on
Computational Intelligence and Security
Conference InformationPapers by SessionPapers by AuthorGetting StartedSearchTrademarks
Conference Information
2011 Seventh International Conference on Computational Intelligence and Security
q Prefaceq Conference Organizationq Program Committeeq Reviewersq Title Page (Book version)q Copyright Page (Book version)q Table of Contents (Book version)q Author Index (Book version)q Publisher’s Information (Book version)
Sessions
q Intelligent Computationq Intelligent Systems and Complex Systemsq Neural Networks and Neural Systemsq Learning Algorithmsq Information Security, Computer Security and Intergrityq Security Methodologies and Managementq Network & Wireless Securityq Authentication and Authorizationq Cryptography and Cryptanalysisq Access Control and Protectionq Pattern Recognithion and Knowledge Discoveryq Data Mining
Papers by Session
Intelligent Computation
q A Cloud Model Based Computational Intelligence Algorithmfor Parameter Identification of Chaotic SystemsJunfeng Chen and Tiejun Wu
q A Genetic Algorithm Based on a New Fitness Functionfor Constrained Optimization ProblemDalian Liu, Du Jinling, and Chen Xiaohua
q A Genetic Algorithm Based on Duality for Linear BilevelProgramming ProblemsHeCheng Li
q A Heuristic Genetic Process Mining AlgorithmJiafei Li, Jihong OuYang, Jiafei Li, Jihong OuYang, and Mingyong Feng
q A Hybrid Method for Solving Global Optimization ProblemsJinhua Li and Jie Liu
Papers by Session
q A Hybrid Multiobjective Differential Evolution Algorithm Basedon Improved ε-DominanceNing Dong and Yuping Wang
q A Hybrid Simplex Multi-objective Evolutionary Algorithm Basedon Preference Order RankingGuo Xiaofang
q A Line-up Competition Differential Evolution Algorithm forthe Generalized Assignment ProblemMa Li-Xiao, Zhao Zhan-fang, and Chen Shu-qing
q A New Filled Function Algorithm for Constrained GlobalOptimization ProblemsLiu Jie
q A New Improved Particle Swarm Optimization AlgorithmYuhong Duan and Yulin Gao
q Application of the PSO-SVM Model for Credit ScoringLing Yun, Qiu-yan Cao, and Hua Zhang
Papers by Session
q Approximate Solution of Fuzzy Sylvester Matrix EquationsXiao-Bin Guo
q Energy-efficient Multi-task Scheduling Based on MapReducefor Cloud ComputingXiaoli Wang and Yuping Wang
q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction NetworkDong Yun-yuan, Yang Jun, Liu Qi-jun, Wang Yong-xian, and Wang Zheng-hua
q Glowworm Swarm Optimization Algorithm for SolvingMulti-constrained QoS Multicast Routing ProblemHe Deng-xu, Zhu Hua-Zheng, and Liu Gui-qing
q Hybrid Genetic Algorithm for TSPLai Nian and Zheng Jinhua
Papers by Session
q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimizationBen Niu, Hong Wang, Lijing Tan, and Li Li
q Improved Differential Evolution Algorithm with AdaptiveMutation and Control ParametersLi Hui-rong, Gao Yue-lin, Li Chao, and Zhao Peng-jun
q Improvement of the MapReduce Model Based on MessageMiddleware Oriented Data Intensive ComputingGe Junwei, Xian Jiang, and Yiqiu Fang
q Inertia Weight Particle Swarm Optimization with BoltzmannExplorationFeng Chen, Xinxin Sun, and Dali Wei
q MOEA/D with Uniform Design for the Multiobjective 0/1Knapsack ProblemYan-Yan Tan, Yong-Chang Jiao, and Xin-Kuan Wang
Papers by Session
q Monitoring the PSO Process Based on Fuzzy RandomVariablesJ.Q. Feng, C. Xu, and W.X. Xie
q Multi-objective Optimization of Bus Dispatching Basedon Improved Genetic AlgorithmJinling Du, ChunXiao Wang, and Feng Zhang
q New Heuristic Algorithm of RNA Secondary StructurePrediction with PseudoknotsZhenDong Liu, Zhijun Zhang, Zaixue Liu, and Daming Zhu
q Optimality Conditions for Fractional Programming with B (p,r, a) Invex FunctionsXiang You Li and Qing Xiang Zhang
q Phylogenetic Tree of DNA Sequences Constructed by a NewMethod-H CurveWu Shulei, Chen Huandong, and Li Dachao
Papers by Session
q PSO-BP Neural Network in Reservoir Parameter DynamicPredictionLiumei Zhang, Jianfeng Ma, Yichuan Wang, and Shaowei Pan
q Research of Blocking Factor Combined with Improved AntColony Algorithm in VRPLiang Zhenqiu
q Research on Nonlinear Predictive Control Rolling OptimizationStrategy Based on SAPSOZhou Bi-ying
q Researching on the Growth Operator SWFZIRS of GrowthEvolution AlgorithmsSun Shengjie, Zhong Sheng, and Zhang Baihai
q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless NetworksKai Peng, Jing Xu, Wei Liu, Xiaohui Chen, and Jian Wu
Papers by Session
q Sufficient Optimality Conditions and Duality for a MinmaxFractional ProblemJihong Jia
q The 0/1 Multi-objective Knapsack Problem Based on RegionalSearchWeiqi Chen, Zhifeng Hao, and Hailin Liu
q The Overview of Feature Selection Algorithms Based SwarmIntelligence and Rough SetSun Chengmin and Liu Dayou
q Uniform Design Based Hybrid Genetic Algorithmfor Multiobjective Bilevel Convex ProgrammingLiping Jia, Yuping Wang, and Lei Fan
Papers by Session
Intelligent Systems and Complex Systems
q 3G-based Remote Video Surveillance and Control Systemfor Facility AgricultureFengdan Lao and Guanghui Teng
q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software ReliabilityZiqiang Luo, Peng Cao, Shengquan Ma, and Lihua Wu
q A Comparative Study on Appending Priority Relations of Rulesin BDI-Based Agent ModelYou Li, Yuming Lin, and Lingzhong Zhao
q A Fuzzy Portfolio Model Considering Transaction CostsJianhui Yang and Yuan Wang
q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality SystemGao Xin, Jia Qingxuan, Hu Huan, Sun Hanxu, and Song Jingzhou
Papers by Session
q A Model Driven Approach for Self-Healing Computing SystemLu Wei, Zhu Yian, Ma Chunyan, and Zhang Longmei
q A Model of Emotional Agent Based on Granular ComputingJun Hu and Chun Guan
q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model TheoryZiqiang Luo, Peng Cao, Guochun Tang, and Lihua Wu
q A Practical Framework for Agent-Based Hybrid IntelligentSystemsChunsheng Li and Kan Li
q A QoS-based Self-adaptive Framework for OpenAPILingyan Sun, Shizhan Chen, Qixuan Liang, and Zhiyong Feng
q Action-Seeking Team Coordination for Unmanned VehiclesTeam PlanningJiang-feng Luo, Luo-hao Tang, Cheng Zhu, and Wei-ming Zhang
Papers by Session
q Adaptive Evaluation Model of Information Systemby Triangular Fuzzy NumberLiping Chen
q Algorithm of Distribution Estimation for Node Localizationin Wireless Sensor NetworkFu Cequn, Wu Shulei, and Zhong Sheng
q An Important Property about Vertex Distance of CrossedCubes CQnXirong Xu, Aihua Deng, and Wenhua Zhai
q An Improvement of Comprehensive Evaluation ModelWenyi Zeng and Shuang Feng
q An Intelligent Vehicle Monitoring System Based on Internetof ThingsHu Lingling, Li Haifeng, Xu Xu, and Li Jian
Papers by Session
q An Optimal Architecture of Middle Agents in Multi-AgentSystemsLi Xiao-ya and Yu Song-sen
q Belief Base Change on Implicant Sets: How to Give UpElements of a Belief Based on Literal LevelCamilla Schwind
q Communities Detection with Applications to Real-WorldNetworks AnalysisBo Yang
q Cooperative Neural Network Background Modelfor Multi-Modal Video SurveillanceWang Zhiming and Bao Hong
q Design of Intelligent Decision-making System in Multi-UUVFormation Control SimulationHan Hong, Kang Fengju, and Wang Shengjie
Papers by Session
q Discretization Based on Positive Domain and InformationEntropyZhao Juan, Wang Mingchun, Liu Kun, and Wang Can
q Exponentially Synchronization of Stochastic ComplexNetworks with Time-varying Delays and Switching Topologyvia Pinning ControlJingyi Wang, Jianwen Feng, and Yi Zhao
q FBctlr - A Novel Approach for Storage PerformanceVirtualizationLiu Liu, Zhen Han Liu, Lu Xu, and Jun Wei Zhang
q Global Prefetcher Aggressiveness Controlfor Chip-MultiprocessorLimin Han, Deyuan Gao, Xiaoya Fan, Liwen Shi, and Jianfeng An
q Iterative Learning Control of Double Servo Valve ControlledElectro Hydraulic Servo SystemYu Shaojuan and Song Junjun
Papers by Session
q Lifeline: Emergency Ad Hoc NetworkSe-Hang Cheong, Kai-Ip Lee, Yain-Whar Si, and Leong Hou U
q Marshmallow: A Content-Based Publish-Subscribe Systemover Structured P2P NetworksSheng Gao, Guohui Li, and Pei Zhao
q Multi-Agents Model Analysis for the Evolution of IndustrialClustersYajuan Yang and Lian Ren
q On Cluster Synchronization for Linearly Coupled ComplexNetworksYi Zhao, Jianwen Feng, and Jingyi Wang
q Optimization of Vehicle Routing Problem Based on Max-MinAnt System with Parameter AdaptationXia Liu, Chao Yang, and Xia Liu
Papers by Session
q Qualitative Modeling for Parallel Software System ReliabilityEvaluationZiqiang Luo, Peng Cao, Shengquan Ma, and Lihua Wu
q Real-time LOD Algorithm Based on Triangle CollapseOptimizationJun Chen and Xiong Shi
q Research of Rapid Attention-Information Extractionin Human-Robot InteractionGong Fei, Xie Lun, Li Nan, and Wang Zhi-Liang
q Robust Stability for Uncertain Neutral Systemswith Time-varying and Distributed DelaysLiang Yuan-xin
q Simulation of Influence of Desired Velocity Distributionand Herd Effect on Pedestrian EvacuationYu Yanfei and Min Yonglin
Papers by Session
q Software Fault Prediction Framework Based onaiNet AlgorithmQian Yin, Ruiyi Luo, and Ping Guo
q Study on Friction Coefficient Mechanism Model of TandemCold Mill in Unstable ConditionHao Peifeng
q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value IntegralSheng-quan Ma, Fu-chuan Chen, Qiang Wang, and Zhi-qing Zhao
q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient PruningYao Lu, Gang Liu, Wei Chen, and Jesper Olsen
q Weak-pseudo-R0 AlgebrasYong-lin Liu and Xiao-bo Cai
Papers by Session
Neural Networks and Neural Systems
q A Neural Network for a Class of Horizontal LinearComplementary ProblemsXingbao Gao and Jing Wang
q Adaptive Neural Control for a Class of Perturbed Time-delayNonlinear SystemsRuliang Wang and Jie Li
q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum ReservoirKai Zhu, Huaguang Song, Jinzhu Gao, and Guojian Cheng
q Artificial Neural System Method for Solving NonlinearProgramming with Linear Equality ConstraintsQuan-ju Zhang
Papers by Session
q Existence and Global Attractivity of Almost Periodic Solutionof Hopfield Neural Networks with Time DelaysYanshuang Meng
q Global Synchronization of Hybrid Coupled Neural Networkswith Time-varying DelayXuefei Wu and Chen Xu
q Minimal Echo State Networks for VisualisationTzai Der Wang, Xiaochuan Wu, and Colin Fyfe
q Predictions for Coal Spontaneous Combustion Stage Basedon an Artificial Neural NetworkGaochang Zhao
q Search Engine Optimization Based on Algorithm of BP NeuralNetworksShuo Wang, Kaiying Xu, Yong Zhang, and Fei Li
q Spares Consumption Prediction Based on BP Neural NetworkGuo Feng, Liu Chen-yu, Zhang Su-qin, and Zhou Bin
Papers by Session
q Spares Consumption Quota Model Based on BP NeuralNetworkLiu Chen-yu, Guo Feng, Li Yuan-lei, and Zhang Su-qin
q Spatial Prediction of Dissolved Organic Carbon Using GISand ANN Modeling in River NetworksYingchun Fu, Xiantie Zeng, and Xueyu Lu
q Stability Analysis of Neutral-type Fuzzy Neural Networkswith Distributed DelaysShujun Long and Liping Jia
q The Application of Neural Network in the Intelligent FaultDiagnosis SystemMing Chang, Hongwei Chen, Yingying Wang, Yueou Ren, and Hao Kang
Papers by Session
Learning Algorithms
q A Maximal Clique Partition Method for Network Basedon GranularityYan-ping Zhang, Xiao-yan Chen, Bo Hua, and Yuan Zhang
q A Spam Filtering Method Based on Multi-modal FeaturesFusionFeng Huamin, Yang Xinghua, Liu Biao, and Jiang Chao
q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive TextHaiping Zhu, Yan Chen, Yang Yang, and Chao Gao
q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural LevelBing Guo, Yan Shen, Xiao Bin Liu, Qi Li, Ji He Wang, and Yuan Sheng Wu
Papers by Session
q An Error Bound for Eigenvalues of Graph Laplacianwith Bounded Kernel FunctionYong Liu and Shizhong Liao
q An Improved Software Reliability Model Considering FaultCorrection RateZhao Liu, Rui Zhang, Denghua Mei, and Xi Zheng
q Class-Incremental Kernel Discriminative Common VectorsYunhui He
q Dynamic Fuzzy Semisupervised Multitask LearningMeiyin Dai and FanZhang Li
q Feature Selection Algorithm Based on the CommunityDiscoveryXiaoqiang Jia
q Improved Word Similarity Computation for Chinese UsingSub-word InformationPeng Jin, John Carroll, Yunfang Wu, and Diana McCarthy
Papers by Session
q Multi-Side Multi-Instance AlgorithmShu Zhao, Chao Xu, Yan-ping Zhang, and Jun Ma
q Probabilistic Trajectory Modeling of Flight Vehicles Basedon Parameter DeviationsChangqing Liu and Wencai Luo
q Reinforcement Learning for the N-Persons Iterated Prisoners’DilemmaJ. Enrique Agudo and Colin Fyfe
q Relative Local Mean Classifier with Optimized Decision RuleGuihua Wen and Lijun Jiang
q Research on the Maximum Flow in Large-scale NetworkYan-ping Zhang, Bo Hua, Juan Jiang, Yuan Zhang, and Xiao-yan Chen
q The Application of Graph Theory in Old Chinese PhonologyStudyJiaJia Hu and Ning Wang
Papers by Session
q The Estimation Algorithm of Laplacian Eigenvalues forthe Tangent BundleMengxuan Dong and FanZhang Li
q Time Series Forecasting Method Based on Huang Transformand BP Neural NetworkW.Q. Zhang and C. Xu
Papers by Session
Information Security, Computer Security and Intergrity
q A Digital Watermarking Algorithm Based on Wavelet PacketTransform and BP Neural NetworkQiao Baoming, Zhang Pulin, and Kang Qiao
q A Markov Chain-based Availability Model of Virtual ClusterNodesJianhua Che, Tao Zhang, Weimin Lin, and Houwei Xi
q A New Scheme for Information Hiding Based on DigitalImagesYan-ping Zhang, Juan Jiang, Chao Xu, Bo Hua, and Xiao-yan Chen
q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack ModelYue Qi, Qingqi Pei, Yong Zeng, Chao Yang, and Shu-po Bu
Papers by Session
q A Study on IT-security Vocabulary for Domain DocumentClassificationQian Liping and Wang Lidong
q Achieving Distributed System Information SecuritySalvatore Distefano and Antonio Puliafito
q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc NetworksWang Ke, Yang Wei-dong, Liu Ji-Zhao, and Zhang Dan-tuo
q Architecture for Component Library Retrieval on the CloudGe Junwei, Tao Cong, and Fang Yiqiu
q Construction of Overflow Attacks Based on Attack Elementand Attack TemplateNing Zhu, XingYuan Chen, and Yongfu Zhang
q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor NetworksShen Yulong, Xi Ning, Pei Qingqi, Ma Jianfeng, Xu Qijian, and Wu Zuoshun
Papers by Session
q Fingerprint Composition-Feature Extraction Using DirectionalFilter BanksLi Chao Rong, Huang Ming Qing, and Li Jianping
q Image Scrambling Based on Chaos Theory and VigenèreCipherShanshan Li and Yinghai Zhao
q Improving Privacy of Property-based Attestation withouta Trusted Third PartyZhang Xing-lan and Liu Wei-wei
q Information Hiding Algorithm Based on Stentiford VisualAttention ModelJie Ling, Ju Liu, Jiande Sun, Jianping Qiao, Feng Wang, and Feng Feng
q Model Composition and Generating Tests for WebApplicationsBo Song, Shengwen Gong, and Shengbo Chen
Papers by Session
q Modeling and Simulating the Propagation of UnstructuredPeer-to-Peer WormsXiang Fan, William W. Guo, and Mark Looi
q Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlowHe Qi and Li Huifang
q Orthogonal Test Algorithm on TD-SCDMA NetworkOptimizationHua Huang and Yuan Ding
q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability MatrixXing Yang, Yubao Liu, Zhan Li, and Jiajie Mo
q Researches and Simulations of Information Hiding in AlamoutiTransmission SystemLiquan Chen, Miao Lu, and Jingbo Chen
q Testing Anti-denial of Service Attacks Based on Mobile AgentHuimei Wang, Ming Xian, and Guoyu Wang
Papers by Session
q The AES Encryption and Decryption Realization Basedon FPGALuan Lan
q The Implementation of Trust Model in the P2P PatchDistribution SystemJihai Huang, Yu Su, and Min Cao
Papers by Session
Security Methodologies and Management
q A Blakley Secret Sharing Scheme without Trusted ShareDistributed CenterXue Yisheng, Wu Shulei, and Chen Huandong
q A Rational Secret Sharing Scheme Based on Repeated GameJie Wang and Yong-quan Cai
q A Security Model for Information Systems with Multi-levelSecurityChao-Qin Gao and Chuang-Bai Xiao
q A Trivariate Polynomial-based Dynamic Key ManagementScheme for Wireless Sensor NetworksJianting Ning, Xinchun Yin, and Ting Yang
q A Trust-based Dynamic Secure Service Discovery Modelfor Pervasive ComputingFang Shen, Qingqi Pei, and Shu-po Bu
Papers by Session
q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC FrameworkCheng Yameng, Shen Yulong, Ma Jianfeng, Cui Xining, and Li Yahui
q Analysis and Measurement on the ElectromagneticCompromising Emanations of Computer KeyboardsLitao Wang and Bin Yu
q Analysis of the Success Rate of the LLL Lattice BasisReductionHaibo Wu and Shenghui Su
q Analysis of Wireless Mesh Network Security Based on NodeFunctionShuxin Liu, Jianhua Peng, and Caixia Liu
q Design and Implementation of an Electromagnetic AnalysisSystem for Smart CardsKun Gu, Liji Wu, Xiangyu Li, and Xiang Min Zhang
Papers by Session
q Modeling the Uncertain Data in the K-anonymity PrivacyProtection ModelJiawei Wu and Guohua Liu
q On the Representation and Querying of Sets of PossibleWorlds in the K-anonymity Privacy Protecting ModelJieYuan Li and Guohua Liu
q Security Analysis of Some Recent Authentication Protocolsfor RFIDBen Niu, Hui Li, Xiaoyan Zhu, and Chao Lv
Papers by Session
Network & Wireless Security
q A Bilinear Pairing-Based Key Management Schemefor Wireless Sensor NetworksRongrong Jiang and Tieming Chen
q A Configurable IPSec Processor for High Performance In-LineSecurity Network ProcessorYun Niu, Liji Wu, Li Wang, Xiangmin Zhang, and Jun Xu
q A Fast Handoff Method Based on RSSI and LQI in WirelessSensor NetworkZhang Miao and Li Jingying
q A Survey on Methods of Automatic Protocol ReverseEngineeringXiangDong Li and Li Chen
q A Sybil-resilient Contribution Transaction ProtocolXu Xiang
Papers by Session
q An Automated Black-box Testing Approach for WSN SecurityProtocolsShirui Ji, Qingqi Pei, Yong Zeng, Chao Yang, and Shu-po Bu
q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWBJiongCheng Li, Henghui Xiao, Xibin Lin, and Yanbo Zhao
q An Identity-based Secure Routing Protocol in WSNsWeichang Li, Hongning Li, Min Xie, and Shupo Bu
q An Interactive Charge Scheme with Rewardand Non-repudiation for Wireless Mesh NetworkChunling Wang and Fei Yang
q Analysis of Abnormal Events in IMS and Research onthe Strategy of DetectionXiaolong Xie, Xinsheng Ji, and Caixia Liu
Papers by Session
q Design of the DS-UWB Communication System Basedon Chaotic Variable Spreading FactorDong Li and Jiang Fei Bo
q Energy-efficient MAC Protocol Designed for Wireless SensorNetwork for IoTJun Hu, Zeng Ma, and Chunsheng Sun
q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile CommunicationsCheng Yong-mao, Chen Wang-da, Qu Hui, and Cai Tian-yi
q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless NetworksYa Hui Li, Wen Sheng Niu, Ya Di Zhang, Jian Feng Ma, and Yu Long Shen
q Multi-jammer Localization in Wireless Sensor NetworksTianzhen Cheng, Ping Li, and Sencun Zhu
q Query-Aware Anonymization in Location-Based ServiceWei Li, Guangye Li, and Chunlei Liu
Papers by Session
q Recovering Coverage Holes by Using Mobile Sensorsin Wireless Sensor NetworksFei Li, Shuming Xiong, and Liangmin Wang
q Reliability Analysis of System-in-the-Loop Network PlatformBased on DelaysShen Yafen, Chen Jiaxi, Yuan Jing, and Huang Ning
q Secure Data Aggregation Scheme for Clustered WirelessSensor NetworksJiang Hong Guo, Jian Feng Ma, and Xiu Qiang Wu
q Stochastic Modeling File Population in P2P NetworkFang Qun, Wu Xu, and Xu Yong
q The Design of Cooperative Intrusion Detection SystemZhang Guojun, Chen Liping, and Ha Weitao
q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health MonitoringHao Chen, Dingyi Fang, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, and Lang Qin
Papers by Session
Authentication and Authorization
q A Design and Implement of IPS Based on SnortJianrong Xi
q A Novel Hash-based RFID Mutual Authentication ProtocolLi Huixian, Yin Ping, Wang Xuan, and Pang Liaojun
q An Application of Justification Logic to Protocol VerificationThomas Studer
q An Image Encryption and Authentication SchemeJing Qiu and Ping Wang
q Analysis of the Authentication Protocols Based on GameTheoryXinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, and Jianfeng Ma
q Design of a Digital Forensics Evidence Reconstruction Systemfor Complex and Obscure Fragmented File CarvingVrizlynn L.L. Thing, Tong-Wei Chua, and Ming-Lee Cheong
Papers by Session
q Evaluating the Effect of Loading Forensic Tools on the VolatileMemory for Digital EvidencesZhen Su and Lian Hai Wang
q Hierarchical ID-Based Blind Signature from LatticesChen Liang, Cui Yongquan, Tang Xueming, Hu Dongping, and Wan Xin
q Identity-based SIP Authentication and Key AgreementWu Shao Bo and Li Cheng Shu
q Obtaining the Resonant Frequency of the Bubble in the ShipWake by ANSYSZhang Qun and Yingmin Wang
q Security Authentication Scheme Based on CertificatelessSignature and Fingerprint RecognitionZhu Yanqiong, Xu Hui, and Gao Zhan
q Security Problems and Countermeasures with CommercialBanking Computer NetworksYunCheng Liu, Xingchun Sun, and Xiaoqin Mao
Papers by Session
q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy ProcessBaojing Cui, Ce Bian, Tao Guo, Yongle Hao, and Jianxin Wang
q Systematical Vulnerability Detection in Browser ValidationMechanismZeng Chufeng and Wang Qingxian
q The Analysis of Influence Factors of the Confidence Levelon University Students’ Network ShoppingJunfeng He and Hui Sun
q Traitor Tracing and Revocation Mechanismswith Privacy-PreservingYi Ding and Lei Fan
Papers by Session
Cryptography and Cryptanalysis
q 2-out-of-2 Rational Secret Sharing in Extensive FormYilei Wang and Qiuliang Xu
q A Construction of Balanced Odd-variable Boolean Functionwith Optimum Algebraic ImmunityYinDong Chen
q A New Cross-realm Group Password-based AuthenticatedKey Exchange ProtocolQing Dai, Xiufeng Zhao, Qiuliang Xu, and Han Jiang
q A Novel Group Signature Scheme Based on NTRUJunping Yao, Zefeng Dong, and Xinshe Li
q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional SpaceYong-long Luo, Chao Cheng, Cai-xia Chen, and Hong Zhong
Papers by Session
q A Watermarking-based Visual Cryptography Schemewith Meaningful SharesHan Yan-yan, Cheng Xiao-ni, and He Wen-cai
q Accelerating Block Cryptography Algorithms in ProcedureLevel SpeculationYaobin Wang, Hong An, Zhiqin Liu, Kang Xu, and Wanli Dong
q An ID-based (k, t, n) Threshold Group Signature SchemeWei Fu and Guang-liang Liu
q An Image Encryption Algorithm Based on Scramblingand Substitution Using Hybrid Chaotic SystemsXiang Fei and Guo Xiao-cong
q An Improved Signcryption with Proxy Re-encryption andits ApplicationCaifen Wang and Xiaojun Cao
Papers by Session
q An Improvement and a New Design of Algorithms for Seekingthe Inverse of an NTRU PolynomialNa Zhao and Shenghui Su
q Attack on the Cryptosystem Based on DLPXiaobo Feng and Mingqiang Wang
q Attribute-Based Authenticated Key Exchange Protocolwith General RelationsHao Wang, Qiuliang Xu, Han Jiang, and Rui Li
q Attribute-based Signcryption with Ciphertext-policyand Claim-predicate MechanismChangji Wang and Jiasen Huang
q Certificateless Broadcast Signcryption with Forward SecrecyMing Luo, Chun-hua Zou, and Jianfeng Xu
q Co-Z Addition Operation of Hessian CurveLeibo Li and Tao Zhan
Papers by Session
q Concurrent Non-malleable Statistically Hiding CommitmentRui Li, Qiuliang Xu, and Hao Wang
q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm SettingJing-feng Li, Wei-feng Guo, Lai-shun Zhang, and Yun-peng Li
q Differential Energy Watermarking Based on Macro-blockPredictionQian Zeng and Guorui Feng
q Efficient Password-Based Authenticated Key Exchangefrom LatticesYi Ding and Lei Fan
q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis AttacksKeke Wu, Huiyun Li, XuCheng Yin, and Guoqing Xu
Papers by Session
q Hierarchical Identity-based Broadcast Encryption Schemeon LatticesZhang Jinman and Chen Qin
q K-times Proxy Re-encryptionXu An Wang, Ziqing Wang, Yi Ding, and Shujun Bai
q Multi-Undeniable Signature SchemesShen Xunxun, Xu Maozhi, and Zhao Yanhui
q Novel Quantization Watermarking Based on Random AngleModulationXinshan Zhu and Shuoling Peng
q Optimized Approach for Computing Multi-base ChainsXinchun Yin, Ting Yang, and Jianting Ning
q Proxy Re-encryption with Keyword Search from AnonymousConditional Proxy Re-encryptionWeiDong Zhong, Xu An Wang, Ziqing Wang, and Yi Ding
Papers by Session
q VVCS: Verifiable Visual Cryptography SchemeHan Yanyan, Cheng Xiaoni, Yao Dong, and He Wencai
Papers by Session
Access Control and Protection
q A Generic Scheme for the Construction of ContextualSignatures with Hash Function in Intrusion DetectionYuxin Meng and Lam-for Kwok
q A New Approach for Adaptive Intrusion DetectionHassina Bensefia and Nacira Ghoualmi
q A Security API for Multimodal Multi-biometric ContinuousAuthenticationAdriana Esmeraldo de Oliveira and Gustavo Henrique Matos Bezerra Motta
q A Wavelet-Based Detection Approach to Traffic AnomaliesDingde Jiang, Peng Zhang, Zhengzheng Xu, Cheng Yao, and Wenda Qin
q An Access Control Mode Based on Information Flow GraphWang Chao, Chen Xing Yuan, and Li Na
Papers by Session
q An Enhanced Role-Based Access Control Mechanismfor Hospital Information SystemsChen-Guang He, Cun-Zhang Cao, and Shu-Di Bao
q Fast Network Traffic Anomaly Detection Based on IterationHua Jiang and Liaojun Pang
q Kernel-based Behavior Analysis for Android MalwareDetectionTakamasa Isohara, Keisuke Takemori, and Ayumu Kubota
q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors ClassifiersJozsef Hegedus, Yoan Miche, Alexander Ilin, and Amaury Lendasse
q Performance Analysis of the Single Pattern MatchingAlgorithm Based on Prefix SearchingWu Xi-hong
Papers by Session
q Property-Based Remote Attestation Oriented to CloudComputingSiYuan Xin, Yong Zhao, and Yu Li
q Research and Implementation of DPA-resistant SMS4 BlockCipherXiaoyi Duan, Ronglei Hu, and Xiu Ying Li
q Research of Access Control in Electronic Medical RecordBased on UCONJu JianGuo, Chen Weihe, and Zhan YongZhao
q Research on Access Control Mechanism for Digital ProductsTradingLi Fenghua, Yu Yinyan, Li Dongdong, and Zhang Jinghui
q Study on Role-Based Access Control with Time ConstraintZhenghong Liu, Yuhong Jia, and Tieli Sun
Papers by Session
Pattern Recognithion and Knowledge Discovery
q A New Algorithm for Auto-Exposure Based on the AnalogyHistogramZhang Haifeng, Cao Jianzhong, Tang Linao, and Wang Huawei
q A Novel Subspace Discriminant Locality PreservingProjections for Face RecognitionWei He, Wen-Sheng Chen, and Bin Fang
q A Saliency Detection Model Based on Multi-feature FusionZheng Yang, Liu Chunping, Wang Zhaohui, Ji Yi, and Gong Shengrong
q A Secondary Image Denoising Model Based on the LocalEnergy OperatorXu Chen, Sun Xiao-li, and Li Min
q Active Contours with Adaptively Normal Biased GradientVector Flow External ForceHengbo Zhao and LiXiong Liu
Papers by Session
q Adaptive Filter for Color Impulsive Removal Based on the HSIColor SpaceShi Yan-xin and Cheng Yong-mei
q An Efficient Linear Text Segmentation Algorithm UsingHierarchical Agglomerative ClusteringJi-Wei Wu, Judy C.R. Tseng, and Wen-Nung Tsai
q Automatic Detection of Lumina in Mouse LiverImmunohistochemical Color Image Using Support VectorMachine and Cellular Neural NetworkWang Hui, Zhou Zhi Guo, and Jie Long Mei
q Automatic Parameter Determination Based on a ModifiedDiscriminant Criterion for Face RecognitionTaiquan Huang and Wen-Sheng Chen
q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge CueBaochuan Pang, Long Zhou, Wu Zeng, and Xinge You
Papers by Session
q Construction of a Bilingual Cognitive Property KnowledgebaseBin Li, Haibo Kuang, Xiaohe Chen, Xuri Tang, and Chen Chen
q Contours-Matching in Building Reconstruction from a SingleImageXin Zheng, Xiumin Zhang, Fuqing Duan, and Wei Liu
q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning AlgorithmsTae Rim Lee, Bon Min Goo, Hun Kim, and Sang Uk Shin
q Face Recognition with Statistical Local Line Binary PatternZheng-Chun Sun and Jian Cheng
q Face Reconstruction from Skull Based on Partial LeastSquares RegressionDonghua Huang, Fuqing Duan, Qingqiong Deng, Zhongke Wu, and Mingquan Zhou
q Fast and Effectively Identify Pornographic ImagesYanjun Fu and Weiqiang Wang
Papers by Session
q Fast Iris Boundary Location Based on Window MappingMethodYu Li and Zhou Xue
q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar FieldYiping Xu, Jing Tan, Hongping Li, and Yan Tian
q Image Quality Assessment Based on Binary StructureInformationChun-Hsien Chou and Yun-Hsiang Hsu
q Improving the Performance of Personalized Recommendationwith Ontological User Interest ModelSu Zhenglian, Yan Jun, Chen Haisong, and Zhang Jiaojiao
q Inducing Chinese Selectional Preference Based on HowNetYuxiang Jia, Hongying Zan, and Ming Fan
q Knowledge Discovery Method from Abnormal Monitoring DataShiSong Zhu, Liang Chen, and Shuhong Cao
Papers by Session
q Learning Local Binary Patterns with Enhanced Boostingfor Face RecognitionFanyi Xiao, YiXiong Liang, and Xiaohui Qu
q Level Set Region Based Image Segmentation Using LatticeBoltzmann MethodSouleymane Balla-Arabé, Bin Wang, and Xinbo Gao
q Local Reconstruction Error of l2 Norm for Discriminant FeatureExtractionYu Hou and Caikou Chen
q Multi-Level Kernel Machine for Scene Image ClassificationJunlin Hu and Ping Guo
q Multiresolution Streamline Placement for 2D Flow FieldsWenyao Zhang, Manrui Zhang, and Bo Sun
q Parabolic Adjustment of Image Clearness Algorithm Basedon Retinex TheoryWenZhang He, Rui Liu, and Ruimin Zhao
Papers by Session
q Pedestrian Detection Based on HOG-LBP FeatureGuolong Gan and Jian Cheng
q Pedestrian Recognition Based on Saliency Detectionand Kalman Filter Algorithm in Aerial VideoWang Xingbao, Liu Chunping, Liu Gong, Liu Long, and Gong Shengrong
q Research and Implementation on the Digital Medical ImageEnhancement Methods Based on Gradient Smoothand Context SmoothLiu Jing and Xiong Jie
q Research on Improved Greedy Algorithm for TrainReschedulingZhenhuan He
q Saliency-based Adaptive Scaling for Image RetargetingTanchao Zhu, Weiming Wang, Ping Liu, and Yongming Xie
Papers by Session
q Schistosoma Cercariae Image Recognition via SparseRepresentationShenhai Yan, Yang Liu, and Xiantong Huang
q Soft-Voting Classification using Locally Linear ReconstructionXiaohui Tian and Rong Wang
q Sparse Representation for Multi-Label Image AnnotationBingxin Xu and Ping Guo
q Speech Feature Analysis Using Temporal Linear EmbeddingLifang Xue and XiusHuang Yi
q Streamline-based Visualization of 3D Explosion FieldsYi Wang, Wenyao Zhang, and JianGuo Ning
q The Application of Binary Particle Swarm Algorithm in FaceRecognitionGuojian Cheng, Caiyun Shi, Kai Zhu, and Kevin Gong
Papers by Session
q The Iterative Regularization Method Based on ImageDecomposition ModelLi Min, Xu Chen, Sun Xiaoli, and Zhang Weiqiang
q The Multispectral Image Edge Detection Based on CliffordGradientHui Liu, Chen Xu, and Wenming Cao
q Using the Callback Function Realization Touch ScreenGestures Recognition of ComputerMa ShuangCheng
Papers by Session
Data Mining
q A Boundary Detection Algorithm of Clusters based on DualThreshold SegmentationBaozhi Qiu and Shuang Wang
q A Combined Music Label Propagation ModelJing Cai, Heng Li, and Bo Lang
q A Method for New Word Extraction on Chinese Large-scaleQuery LogsRui Sun, Peng Jin, and Juan Lai
q A New Community Structure Detection Method Basedon Structural SimilarityQi Luo
q A Real Time Multi-Scale Correlation Analysis Method andits Application on the Data Mining in Thermodynamic ProcessWang Qi and Liu Xin-Ping
Papers by Session
q A Simple But Effective Stream Maximal Frequent ItemsetMining AlgorithmHaifeng Li and Ning Zhang
q A Weighted K-hyperline Clustering Algorithm for Mixing MatrixEstimation on Bernoulli-Gaussian SourcesJun-jie Yang and Hai-lin Liu
q An Empirical Study on Credit Scoring Model for Credit Cardby Using Data Mining TechnologyWei Li and Jibiao Liao
q An Improved ID3 Based on Weighted Modified InformationGainChun Guan and Xiaoqin Zeng
q Analysis on Cloud Computing-based Logistics InformationNetwork ModeXing Wang
Papers by Session
q Another View of the Features in Supervised Chinese WordSense DisambiguationPengYuan Liu
q Application of Cloud Storage in Traffic Video DetectionRu Xue, Zong-Sheng Wu, and A-Ning Bai
q Approximation Kernel 2DPCA by Mixture of Vector and MatrixRepresentationLin Wang and Xiuling Zhou
q Clustering Based Image Denoising Using SURE-LETWu Zeng, Long Zhou, Xiubao Jiang, Xinge You, and Mingming Gong
q Data Mining Technique in the Internal Auditing of EnterpriseGroupsAijun Yang and Ping Song
q Data Sources of WebometricsShi Longqing and Zhao Qingfeng
Papers by Session
q Measuring Semantic Relatedness between Words UsingLexical ContextWei He, Xiaoping Yang, and Dupei Huang
q Methodology for Statistical Distribution Determinationof Various Data SourcesChangqing Liu and Wencai Luo
q Neural Network in the Application of EEG Signal ClassificationMethodHuaping Jia
q Normalizing Modularity Matrices for Data ClusteringRong Wang
q Pattern Recognition with Spatial Data Mining in Web: AnInfrastructure to Engineering of the Urban CadasterAndré Fabiano de Moraes and Lia Caetano Bastos
q Promotion Analysis Based on Fitting in Multi-Level SpaceLi Sun, Ming Zhu, and Jiyun Li
Papers by Session
q Research on Characteristics of Plates on Chinese StockMarketPeng Lin and Jianhui Yang
q Research on Industrial Building’s Reliability AssessmentBased on Projection Pursuit ModelZhang Lei and Jie Liu
q Research on Privacy-preserving in Distributed Mining Basedon the Attribute SimilarityQiu Lu and Xiao-hui Cheng
q Sequential Bayesian Method for Formulating Uncertaintyin Sparse DataChangqing Liu and Wencai Luo
q Similarity Matching over Uncertain Time SeriesYanfei Zuo, Guohua Liu, Xiaoli Yue, Wei Wang, and Honghua Wu
Papers by Session
q Simplified Business Process Model Mining Basedon Structuredness MetricWeiDong Zhao, Xi Liu, and Anhua Wang
q Spectral Clustering and its Research ProgressFu Chuanyi, Chen Huandong, and Xing Jieqing
q SVM Combined with FCM and PSO for Fuzzy ClusteringYifang Yang, Guoqiang Chen, and Yanchun Guo
q The Classification of k-anonymity DataLin Bingchun and Liu Guohua
q The Estimation of Mixing Matrix Based on Bernoulli-GaussianModelJiechang Wen and Taowen Wang
q The Finite Element Analysis of the Electromagnetic LevitationSystem Based on the Large Air GapZhengfeng Ming and Rui Wen
Papers by Session
q The Problem about Grey Incidence Cluster AnalysisYanping Cao and Chunmei Gong
q TKNN: An Improved KNN Algorithm Based on Tree StructureLi Juan
Papers by Session
System Analysis and Modeling
q A Data Distribution Platform Based on Event-DrivenMechanismWang Wei, Tan Enmin, and Feng Bing
q A General Edge Detection Method Based on the ShearTransformQiguang Miao, Pengfei Xu, Weisheng Li, and Hai Zhu
q A Lower Bound for the Smarandache Function ValueGuo Yanchun, Ren Ganglian, and Yang Yifang
q A New Method for Interval Multiple Attribute Decision MakingBased on Minimum Variance and Approach DegreeZhenhai Ai
q A Novel Two-stage Analysis Method for Customer’sRequirementHai Zhu, Zengfa Dou, and Wengang Zhou
Papers by Session
q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPSXinhong Hei, Lining Chang, Weigang Ma, and Guo Xie
q Achievement of Proxy Cache System for Streaming MediaBased on Patch AlgorithmWeitao Ha
q An Implementation Method for Converting the Erhu Musicfrom Wav to MidZiqing Nie and Shiying Yang
q Analysis of the Impact of Polarization Mode Dispersionon Optical Fiber CommunicationWei Zhao
q Analytical Models for Data Dependence Violation Checkingin TLSXin Lai, Cong Liu, Zhiying Wang, and Quanyou Feng
Papers by Session
q CFD Numerical Simulation of Exhaust MufflerJun Chen and Xiong Shi
q Closed-loop Supply Chain Network Horizontal IntegrationProblemYang Yu-xiang and Zhou Gen-gui
q Computer Realization of Quadratic Spline InterpolationFeng Tianxiang and Liu Hongxia
q Constructing the Expandability Web Service Based LinuxRong Shan
q Co-op Advertising Analysis within a Supply Chain Basedon the Product Life CycleHong Zhang and Sheng Zhong
q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit BoardZou Su, Li Chuanri, Xu Fei, and Qiao Liang
Papers by Session
q DBS Application to Chinese AdjectivesQiuxiang Feng, Degen Huang, Xiuying Li, and Rongpei Wang
q Design and Implement of SerialPort Class on Upper MachineSystemFu Chuanyi, Zhan Jinmei, and Chen Juntao
q Design and Implementation of Bus Net Routing AlgorithmMin Luo, Haiquan Wang, Chunhe Xia, Lihua Wang, and Ya Wang
q Design of Instrument Control System Based on LabViewKang Jianhua, She Fangyi, Yang FangZheng, and Wang Tao
q Dynamic Risk Measurement of Futures based on WaveletTheoryJianhui Yang and Peng Lin
q Existence of Almost Periodic and Almost AutomorphicSolutions for Second Order Differential EquationsLan Li
Papers by Session
q Experimental Study the Measurement of Acoustic Wave FlightTime under Strong Noise in the BoilerFeng Tian and Chenghui Zhang
q Fast Verification of Memory Consistency for ChipMulti-ProcessorZheng Lv, Hao Chen, Feng Chen, and Yi Lv
q Finite Volume Methods for the Second Order SingularPerturbation ProblemsChongnan He
q FTA Based Runtime Evaluation of System Reliabilityfor Autonomous Unmanned VehicleGuoqi Li
q Geometric Recognitions Models of Fault Characteristicsin Mobile Core NetworkSulin Pang and ShouYang Wang
Papers by Session
q Multiobjective Interaction Programming for Two-PersonsMin Jiang, Zhiqing Meng, Xinsheng Xu, Rui Shen, and Gengui Zhou
q Multi-user Detection Method for MIMO-OFDM UplinkTransmissionWang Yanli
q Off-line Text-independent Writer Identification Using a Mixtureof Global and Local FeaturesYiu-ming Cheung and Junping Deng
q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid AlgorithmFeng Tian, HaiYang Wang, Xiaoping Sun, Jia Liu, and Chuanyun Wang
q Qualitative Analysis for a Kind of Predator-Prey Modelof Holling III-Function Response with Nonlinear DensityDependentWei-wei Zheng, Li-gui Luo, and Lei Zhao
Papers by Session
q Relative Stability of Solution for Hua’s Macroeconomic ModelJing Zhang and Jinjie Zhang
q Robust Adaptive Sliding Mode Control Design for a Classof Uncertain Neutral Systems with Distributed DelaysRuliang Wang, Dongmei Gao, and Yanbo Li
q Stock Selection Based on Data Clustering MethodRuizhong Wang
q Structural Health Monitoring via Dynamic VisualizationPeng Sun and Xin Guo
q The Application of the Internet of Things in Hainan TourismScenic SpotYuanguai Lin
q The Application Study about Lucene in Document Retrievalfor OfficeDaiwen Wu
Papers by Session
q The BSC Alarm Management System Based on Rough SetTheory in Mobile CommunicationChao Deng and Sulin Pang
q The Construction and Application of Distance and OpenExperimental PlatformYu Jiangfeng and Qi Youju
q The Guidance and Control of Small Net-recovery UAVJiatong Chen and Yong Wang
q The Simulation of Trajectory for Homing Depth ChargeAttacking the Submarine with Different Guide OrderlinessLi Zong-ji, Cheng Shan-Zheng, and Ren Lei
q The Study of Improved Marker-Controlled Watershed CrownSegmentation AlgorithmGuang Deng and ZengYuan Li
Papers by Session
q Using Organizational Evolutionary Particle Swarm Techniquesto Generate Test Cases for Combinatorial TestingXiaoying Pan and Hao Chen
q VAR Model Analysis on Japan’s OFDI and Industrial StructuralUpgradingRen Liang
Papers by Author
A
q Agudo, J. Enriqueq Ai, Zhenhaiq An, Hongq An, Jianfeng
B
q Bai, A-Ningq Bai, Shujunq Baihai, Zhangq Balla-Arabé, Souleymaneq Bao, Shu-Diq Baoming, Qiao
q Bastos, Lia Caetanoq Bensefia, Hassinaq Bian, Ceq Biao, Liuq Bin, Zhouq Bing, Fengq Bingchun, Linq Bi-ying, Zhouq Bo, Jiang Feiq Bo, Wu Shaoq Bu, Shupoq Bu, Shu-po
Papers by Author
C
q Cai, Jingq Cai, Xiao-boq Cai, Yong-quanq Can, Wangq Cao, Cun-Zhangq Cao, Minq Cao, Pengq Cao, Qiu-yanq Cao, Shuhongq Cao, Wenmingq Cao, Xiaojun
q Cao, Yanpingq Carroll, Johnq Cequn, Fuq Chang, Liningq Chang, Mingq Chao, Jiangq Chao, Liq Chao, Wangq Che, Jianhuaq Chen, Caikouq Chen, Cai-xiaq Chen, Chenq Chen, Feng
Papers by Author
q Chen, Fu-chuanq Chen, Guoqiangq Chen, Haoq Chen, Hongweiq Chen, Jiatongq Chen, Jingboq Chen, Junq Chen, Junfengq Chen, Liq Chen, Liangq Chen, Lipingq Chen, Liquanq Chen, Shengbo
q Chen, Shizhanq Chen, Tiemingq Chen, Weiq Chen, Weiqiq Chen, Wen-Shengq Chen, Xiaoheq Chen, Xiaohuiq Chen, Xiaojiangq Chen, Xiao-yanq Chen, XingYuanq Chen, Xuq Chen, Yanq Chen, YinDong
Papers by Author
q Cheng, Chaoq Cheng, Guojianq Cheng, Jianq Cheng, Tianzhenq Cheng, Xiao-huiq Chengmin, Sunq Chen-yu, Liuq Cheong, Ming-Leeq Cheong, Se-Hangq Cheung, Yiu-mingq Chou, Chun-Hsienq Chua, Tong-Weiq Chuanri, Li
q Chuanyi, Fuq Chufeng, Zengq Chunping, Liuq Chunyan, Maq Cong, Taoq Cui, Baojing
d
q de Moraes, André Fabianoq de Oliveira, Adriana
Esmeraldo
D
q Dachao, Li
Papers by Author
q Dai, Meiyinq Dai, Qingq Dan-tuo, Zhangq Dayou, Liuq Deng, Aihuaq Deng, Chaoq Deng, Guangq Deng, Junpingq Deng, Lingjuanq Deng, Qingqiongq Deng-xu, Heq Ding, Yiq Ding, Yuan
q Distefano, Salvatoreq Dong, Mengxuanq Dong, Ningq Dong, Wanliq Dong, Yaoq Dong, Zefengq Dongdong, Liq Dongping, Huq Dou, Zengfaq Du, Jinlingq Duan, Fuqingq Duan, Xiaoyiq Duan, Yuhong
Papers by Author
E
q Enmin, Tan
F
q Fan, Leiq Fan, Mingq Fan, Xiangq Fan, Xiaoyaq Fang, Binq Fang, Dingyiq Fang, Yiqiuq Fangyi, Sheq FangZheng, Yang
q Fei, Gongq Fei, Xiangq Fei, Xuq Feng, Fengq Feng, Guoq Feng, Guoruiq Feng, J.Q.q Feng, Jianwenq Feng, Mingyongq Feng, Qiuxiangq Feng, Quanyouq Feng, Shuangq Feng, Xiaobo
Papers by Author
q Feng, Zhiyongq Fenghua, Liq Fengju, Kangq Fu, Weiq Fu, Yanjunq Fu, Yingchunq Fyfe, Colin
G
q Gan, Guolongq Ganglian, Renq Gao, Chaoq Gao, Chao-Qin
q Gao, Deyuanq Gao, Dongmeiq Gao, Jinzhuq Gao, Shengq Gao, Xinboq Gao, Xingbaoq Gao, Yulinq Gen-gui, Zhouq Ghoualmi, Naciraq Gong, Chunmeiq Gong, Kevinq Gong, Liuq Gong, Mingming
Papers by Author
q Gong, Shengwenq Gong, Xiaoqingq Goo, Bon Minq Gu, Kunq Guan, Chunq Gui-qing, Liuq Guo, Bingq Guo, Jiang Hongq Guo, Pingq Guo, Taoq Guo, Wei-fengq Guo, William W.q Guo, Xiao-Bin
q Guo, Xinq Guo, Yanchunq Guo, Zhou Zhiq Guohua, Liuq Guojun, Zhang
H
q Ha, Weitaoq Haifeng, Liq Haifeng, Zhangq Haisong, Chenq Han, Liq Han, Limin
Papers by Author
q Hanxu, Sunq Hao, Yongleq Hao, Zhifengq He, Chen-Guangq He, Chongnanq He, Junfengq He, Weiq He, WenZhangq He, Yunhuiq He, Zhenhuanq Hegedus, Jozsefq Hei, Xinhongq Hong, Bao
q Hong, Hanq Hongxia, Liuq Hou, Yuq Hsu, Yun-Hsiangq Hu, JiaJiaq Hu, Junq Hu, Junlinq Hu, Rongleiq Hua, Boq Huamin, Fengq Huan, Huq Huandong, Chenq Huang, Degen
Papers by Author
q Huang, Donghuaq Huang, Dupeiq Huang, Huaq Huang, Jiasenq Huang, Jihaiq Huang, Taiquanq Huang, Xiantongq Huawei, Wangq Hua-Zheng, Zhuq Hui, Quq Hui, Wangq Hui, Xuq Huifang, Li
q Hui-rong, Liq Huixian, Li
I
q Ilin, Alexanderq Isohara, Takamasa
J
q Ji, Shiruiq Ji, Xinshengq Jia, Huapingq Jia, Jihongq Jia, Lipingq Jia, Xiaoqiang
Papers by Author
q Jia, Yuhongq Jia, Yuxiangq Jian, Liq Jianfeng, Maq Jiang, Dingdeq Jiang, Hanq Jiang, Huaq Jiang, Juanq Jiang, Lijunq Jiang, Minq Jiang, Rongrongq Jiang, Xianq Jiang, Xiubao
q Jiangfeng, Yuq JianGuo, Juq Jianhua, Kangq Jianping, Liq Jianzhong, Caoq Jiao, Yong-Changq Jiaojiao, Zhangq Jiaxi, Chenq Jie, Liuq Jie, Xiongq Jieqing, Xingq Jin, Pengq Jing, Liu
Papers by Author
q Jing, Yuanq Jinghui, Zhangq Jingying, Liq Jingzhou, Songq Jinhua, Zhengq Jinling, Duq Jinman, Zhangq Jinmei, Zhanq Ji-Zhao, Liuq Juan, Liq Juan, Zhaoq Jun, Yanq Jun, Yang
q Junjun, Songq Juntao, Chenq Junwei, Ge
K
q Kang, Haoq Ke, Wangq Kim, Hunq Kuang, Haiboq Kubota, Ayumuq Kun, Liuq Kwok, Lam-for
Papers by Author
L
q Lai, Juanq Lai, Xinq Lan, Luanq Lang, Boq Lao, Fengdanq Lee, Kai-Ipq Lee, Tae Rimq Lei, Renq Lei, Zhangq Lendasse, Amauryq Li, Bin
q Li, Chunshengq Li, Dongq Li, FanZhangq Li, Feiq Li, Guangyeq Li, Guohuiq Li, Guoqiq Li, Haifengq Li, HeChengq Li, Hengq Li, Hongningq Li, Hongpingq Li, Hui
Papers by Author
q Li, Huiyunq Li, Jiafeiq Li, Jieq Li, JieYuanq Li, Jing-fengq Li, Jinhuaq Li, JiongChengq Li, Jiyunq Li, Kanq Li, Lanq Li, Leiboq Li, Liq Li, Ping
q Li, Qiq Li, Ruiq Li, Shanshanq Li, Weiq Li, Weichangq Li, Weishengq Li, Xiang Youq Li, XiangDongq Li, Xiangyuq Li, Xinghuaq Li, Xinsheq Li, Xiu Yingq Li, Xiuying
Papers by Author
q Li, Ya Huiq Li, Yanboq Li, Youq Li, Yuq Li, Yun-pengq Li, ZengYuanq Li, Zhanq Liang, Chenq Liang, Qiaoq Liang, Qixuanq Liang, Renq Liang, YiXiongq Liao, Jibiao
q Liao, Shizhongq Liaojun, Pangq Lidong, Wangq Lin, Pengq Lin, Weiminq Lin, Xibinq Lin, Yuanguaiq Lin, Yumingq Linao, Tangq Ling, Jieq Lingling, Huq Liping, Chenq Liping, Qian
Papers by Author
q Liu, Caixiaq Liu, Changqingq Liu, Chunleiq Liu, Congq Liu, Dalianq Liu, Gangq Liu, Guang-liangq Liu, Guohuaq Liu, Hailinq Liu, Hai-linq Liu, Huiq Liu, Jiaq Liu, Jie
q Liu, Juq Liu, Liuq Liu, LiXiongq Liu, PengYuanq Liu, Pingq Liu, Ruiq Liu, Shuxinq Liu, Weiq Liu, Xiq Liu, Xiaq Liu, Xiao Binq Liu, Yangq Liu, Yong
Papers by Author
q Liu, Yong-linq Liu, Yubaoq Liu, YunChengq Liu, Zaixueq Liu, Zhaoq Liu, Zhen Hanq Liu, ZhenDongq Liu, Zhenghongq Liu, Zhiqinq Li-Xiao, Maq Long, Liuq Long, Shujunq Longmei, Zhang
q Longqing, Shiq Looi, Markq Lu, Miaoq Lu, Qiuq Lu, Xueyuq Lu, Yaoq Lun, Xieq Luo, Jiang-fengq Luo, Li-guiq Luo, Minq Luo, Mingq Luo, Qiq Luo, Ruiyi
Papers by Author
q Luo, Wencaiq Luo, Yong-longq Luo, Ziqiangq Lv, Chaoq Lv, Yiq Lv, Zheng
M
q Ma, Jian Fengq Ma, Jianfengq Ma, Junq Ma, Shengquanq Ma, Sheng-quan
q Ma, Weigangq Ma, Zengq Mao, Xiaoqinq Maozhi, Xuq McCarthy, Dianaq Mei, Denghuaq Mei, Jie Longq Meng, Yanshuangq Meng, Yuxinq Meng, Zhiqingq Miao, Qiguangq Miao, Zhangq Miche, Yoan
Papers by Author
q Min, Liq Ming, Zhengfengq Mingchun, Wangq Mo, Jiajieq Motta, Gustavo Henrique
Matos Bezerra
N
q Na, Liq Nan, Liq Nian, Laiq Nie, Ziqingq Ning, Huang
q Ning, JianGuoq Ning, Jiantingq Ning, Xiq Niu, Benq Niu, Wen Shengq Niu, Yun
O
q Olsen, Jesperq OuYang, Jihong
P
q Pan, Shaoweiq Pan, Xiaoying
Papers by Author
q Pang, Baochuanq Pang, Liaojunq Pang, Sulinq Pei, Qingqiq Peifeng, Haoq Peng, Jianhuaq Peng, Kaiq Peng, Shuolingq Peng-jun, Zhaoq Ping, Yinq Puliafito, Antonioq Pulin, Zhang
Q
q Qi, Heq Qi, Wangq Qi, Yueq Qiao, Jianpingq Qiao, Kangq Qijian, Xuq Qi-jun, Liuq Qin, Chenq Qin, Langq Qin, Wendaq Qing, Huang Ming
Papers by Author
q Qingfeng, Zhaoq Qingqi, Peiq Qingxian, Wangq Qingxuan, Jiaq Qiu, Baozhiq Qiu, Jingq Qu, Xiaohuiq Qun, Fangq Qun, Zhang
R
q Ren, Lianq Ren, Yueou
q Rong, Li Chao
S
q Schwind, Camillaq Shan, Rongq Shan-Zheng, Chengq Shaojuan, Yuq Shen, Fangq Shen, Ruiq Shen, Yanq Shen, Yu Longq Sheng, Zhongq Shengjie, Sun
Papers by Author
q Shengjie, Wangq Shengrong, Gongq Shi, Caiyunq Shi, Liwenq Shi, Xiongq Shin, Sang Ukq Shu, Li Chengq ShuangCheng, Maq Shulei, Wuq Shu-qing, Chenq Si, Yain-Wharq Song, Boq Song, Huaguang
q Song, Pingq Song-sen, Yuq Studer, Thomasq Su, Shenghuiq Su, Yuq Su, Zhenq Su, Zouq Sun, Boq Sun, Chunshengq Sun, Huiq Sun, Jiandeq Sun, Liq Sun, Lingyan
Papers by Author
q Sun, Pengq Sun, Ruiq Sun, Tieliq Sun, Xiaopingq Sun, Xingchunq Sun, Xinxinq Sun, Zheng-Chunq Su-qin, Zhang
T
q Takemori, Keisukeq Tan, Jingq Tan, Lijing
q Tan, Yan-Yanq Tang, Guochunq Tang, Luo-haoq Tang, Xuriq Tao, Wangq Teng, Guanghuiq Thing, Vrizlynn L.L.q Tian, Fengq Tian, Xiaohuiq Tian, Yanq Tianxiang, Fengq Tian-yi, Caiq Tsai, Wen-Nung
Papers by Author
q Tseng, Judy C.R.
U
q U, Leong Hou
W
q Wang, Anhuaq Wang, Binq Wang, Caifenq Wang, Changjiq Wang, Chuanyunq Wang, Chunlingq Wang, ChunXiaoq Wang, Feng
q Wang, Guoyuq Wang, Haiquanq Wang, HaiYangq Wang, Haoq Wang, Hongq Wang, Huimeiq Wang, Ji Heq Wang, Jianxinq Wang, Jieq Wang, Jingq Wang, Jingyiq Wang, Liq Wang, Lian Hai
Papers by Author
q Wang, Liangminq Wang, Lihuaq Wang, Linq Wang, Litaoq Wang, Mingqiangq Wang, Ningq Wang, Pingq Wang, Qiangq Wang, Rongq Wang, Rongpeiq Wang, Ruizhongq Wang, Ruliangq Wang, ShouYang
q Wang, Shuangq Wang, Shuoq Wang, Taowenq Wang, Tzai Derq Wang, Weiq Wang, Weimingq Wang, Weiqiangq Wang, Xiaoliq Wang, Xingq Wang, Xin-Kuanq Wang, Xu Anq Wang, Yaq Wang, Yaobin
Papers by Author
q Wang, Yiq Wang, Yichuanq Wang, Yileiq Wang, Yingminq Wang, Yingyingq Wang, Yongq Wang, Yuanq Wang, Yupingq Wang, Zhiyingq Wang, Ziqingq Wang-da, Chenq Wei, Daliq Wei, Lu
q Wei, Wangq Wei-dong, Yangq Weihe, Chenq Weiqiang, Zhangq Weitao, Haq Wei-wei, Liuq Wen, Guihuaq Wen, Jiechangq Wen, Ruiq Wencai, Heq Wen-cai, Heq Wu, Daiwenq Wu, Haibo
Papers by Author
q Wu, Honghuaq Wu, Jianq Wu, Jiaweiq Wu, Ji-Weiq Wu, Kekeq Wu, Lihuaq Wu, Lijiq Wu, Tiejunq Wu, Xiaochuanq Wu, Xiu Qiangq Wu, Xuefeiq Wu, Yuan Shengq Wu, Yunfang
q Wu, Zhongkeq Wu, Zong-Sheng
X
q Xi, Houweiq Xi, Jianrongq Xia, Chunheq Xian, Mingq Xiang, Xuq Xiao, Chuang-Baiq Xiao, Fanyiq Xiao, Henghuiq Xiao-cong, Guo
Papers by Author
q Xiaofang, Guoq Xiaohua, Chenq Xiaoli, Sunq Xiao-li, Sunq Xiaoni, Chengq Xiao-ni, Chengq Xiao-ya, Liq Xie, Guoq Xie, Minq Xie, W.X.q Xie, Xiaolongq Xie, Yongmingq Xi-hong, Wu
q Xin, Gaoq Xin, SiYuanq Xin, Wanq Xingbao, Wangq Xinghua, Yangq Xing-lan, Zhangq Xining, Cuiq Xin-Ping, Liuq Xiong, Shumingq Xu, Bingxinq Xu, C.q Xu, Chaoq Xu, Chen
Papers by Author
q Xu, Guoqingq Xu, Jianfengq Xu, Jingq Xu, Junq Xu, Kaiyingq Xu, Kangq Xu, Luq Xu, Pengfeiq Xu, Qiuliangq Xu, Wuq Xu, Xinshengq Xu, Xirongq Xu, Xu
q Xu, Yipingq Xu, Zhengzhengq Xuan, Wangq Xue, Lifangq Xue, Ruq Xue, Zhouq Xueming, Tangq Xunxun, Shen
Y
q Yafen, Shenq Yahui, Liq Yameng, Cheng
Papers by Author
q Yan, Shenhaiq Yanchun, Guoq Yanfei, Yuq Yang, Aijunq Yang, Boq Yang, Chaoq Yang, Danq Yang, Feiq Yang, Jianhuiq Yang, Jun-jieq Yang, Shiyingq Yang, Tingq Yang, Xiaoping
q Yang, Xingq Yang, Yajuanq Yang, Yangq Yang, Yifangq Yang, Zhengq Yanhui, Zhaoq Yanli, Wangq Yanqiong, Zhuq Yan-xin, Shiq Yanyan, Hanq Yan-yan, Hanq Yao, Chengq Yao, Junping
Papers by Author
q Yi, Jiq Yi, XiusHuangq Yian, Zhuq Yifang, Yangq Yin, Qianq Yin, Xinchunq Yin, XuChengq Yinyan, Yuq Yiqiu, Fangq Yisheng, Xueq Yong, Xuq Yonglin, Minq Yong-mao, Cheng
q Yong-mei, Chengq Yongquan, Cuiq Yong-xian, Wangq YongZhao, Zhanq You, Xingeq Youju, Qiq Yu, Binq Yuan, Chen Xingq Yuan-lei, Liq Yuan-xin, Liangq Yue, Xiaoliq Yue-lin, Gaoq Yulong, Shen
Papers by Author
q Yun, Lingq Yun-yuan, Dongq Yu-xiang, Yang
Z
q Zan, Hongyingq Zeng, Qianq Zeng, Wenyiq Zeng, Wuq Zeng, Xiantieq Zeng, Xiaoqinq Zeng, Yongq Zhai, Wenhua
q Zhan, Gaoq Zhan, Taoq Zhan-fang, Zhaoq Zhang, Chenghuiq Zhang, Fengq Zhang, Hongq Zhang, Huaq Zhang, Jingq Zhang, Jinjieq Zhang, Jun Weiq Zhang, Lai-shunq Zhang, Liumeiq Zhang, Manrui
Papers by Author
q Zhang, Ningq Zhang, Pengq Zhang, Qing Xiangq Zhang, Quan-juq Zhang, Ruiq Zhang, Taoq Zhang, W.Q.q Zhang, Wei-mingq Zhang, Wenyaoq Zhang, Xiang Minq Zhang, Xiangminq Zhang, Xiuminq Zhang, Ya Di
q Zhang, Yan-pingq Zhang, Yongq Zhang, Yongfuq Zhang, Yuanq Zhang, Zhijunq Zhao, Gaochangq Zhao, Hengboq Zhao, Leiq Zhao, Lingzhongq Zhao, Naq Zhao, Peiq Zhao, Ruiminq Zhao, Shu
Papers by Author
q Zhao, Weiq Zhao, WeiDongq Zhao, Xiufengq Zhao, Yanboq Zhao, Yiq Zhao, Yinghaiq Zhao, Yongq Zhao, Zhi-qingq Zhaohui, Wangq Zheng, Wei-weiq Zheng, Xiq Zheng, Xinq Zheng-hua, Wang
q Zhenglian, Suq Zhenqiu, Liangq Zhi-Liang, Wangq Zhiming, Wangq Zhong, Hongq Zhong, Shengq Zhong, WeiDongq Zhou, Genguiq Zhou, Longq Zhou, Mingquanq Zhou, Wengangq Zhou, Xiulingq Zhu, Cheng
Papers by Author
q Zhu, Damingq Zhu, Haiq Zhu, Haipingq Zhu, Kaiq Zhu, Mingq Zhu, Ningq Zhu, Sencunq Zhu, ShiSongq Zhu, Tanchaoq Zhu, Xiaoyanq Zhu, Xinshanq Zong-ji, Liq Zou, Chun-hua
q Zuo, Yanfeiq Zuoshun, Wu
Papers by Author
Agudo, J. Enrique
q Reinforcement Learning for the N-Persons Iterated Prisoners’Dilemma
Ai, Zhenhai
q A New Method for Interval Multiple Attribute Decision MakingBased on Minimum Variance and Approach Degree
An, Hong
q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation
An, Jianfeng
q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor
Papers by Author
Bai, A-Ning
q Application of Cloud Storage in Traffic Video Detection
Bai, Shujun
q K-times Proxy Re-encryption
Baihai, Zhang
q Researching on the Growth Operator SWFZIRS of GrowthEvolution Algorithms
Balla-Arabé, Souleymane
q Level Set Region Based Image Segmentation Using LatticeBoltzmann Method
Papers by Author
Bao, Shu-Di
q An Enhanced Role-Based Access Control Mechanismfor Hospital Information Systems
Baoming, Qiao
q A Digital Watermarking Algorithm Based on Wavelet PacketTransform and BP Neural Network
Bastos, Lia Caetano
q Pattern Recognition with Spatial Data Mining in Web: AnInfrastructure to Engineering of the Urban Cadaster
Bensefia, Hassina
q A New Approach for Adaptive Intrusion Detection
Papers by Author
Bian, Ce
q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process
Biao, Liu
q A Spam Filtering Method Based on Multi-modal FeaturesFusion
Bin, Zhou
q Spares Consumption Prediction Based on BP Neural Network
Bing, Feng
q A Data Distribution Platform Based on Event-DrivenMechanism
Papers by Author
Bingchun, Lin
q The Classification of k-anonymity Data
Bi-ying, Zhou
q Research on Nonlinear Predictive Control Rolling OptimizationStrategy Based on SAPSO
Bo, Jiang Fei
q Design of the DS-UWB Communication System Basedon Chaotic Variable Spreading Factor
Bo, Wu Shao
q Identity-based SIP Authentication and Key Agreement
Papers by Author
Bu, Shupo
q An Identity-based Secure Routing Protocol in WSNs
Bu, Shu-po
q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model
q A Trust-based Dynamic Secure Service Discovery Modelfor Pervasive Computing
q An Automated Black-box Testing Approach for WSN SecurityProtocols
Cai, Jing
q A Combined Music Label Propagation Model
Papers by Author
Cai, Xiao-bo
q Weak-pseudo-R0 Algebras
Cai, Yong-quan
q A Rational Secret Sharing Scheme Based on Repeated Game
Can, Wang
q Discretization Based on Positive Domain and InformationEntropy
Cao, Cun-Zhang
q An Enhanced Role-Based Access Control Mechanismfor Hospital Information Systems
Papers by Author
Cao, Min
q The Implementation of Trust Model in the P2P PatchDistribution System
Cao, Peng
q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software Reliability
q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model Theory
q Qualitative Modeling for Parallel Software System ReliabilityEvaluation
Cao, Qiu-yan
q Application of the PSO-SVM Model for Credit Scoring
Papers by Author
Cao, Shuhong
q Knowledge Discovery Method from Abnormal Monitoring Data
Cao, Wenming
q The Multispectral Image Edge Detection Based on CliffordGradient
Cao, Xiaojun
q An Improved Signcryption with Proxy Re-encryption andits Application
Cao, Yanping
q The Problem about Grey Incidence Cluster Analysis
Papers by Author
Carroll, John
q Improved Word Similarity Computation for Chinese UsingSub-word Information
Cequn, Fu
q Algorithm of Distribution Estimation for Node Localizationin Wireless Sensor Network
Chang, Lining
q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPS
Chang, Ming
q The Application of Neural Network in the Intelligent FaultDiagnosis System
Papers by Author
Chao, Jiang
q A Spam Filtering Method Based on Multi-modal FeaturesFusion
Chao, Li
q Improved Differential Evolution Algorithm with AdaptiveMutation and Control Parameters
Chao, Wang
q An Access Control Mode Based on Information Flow Graph
Che, Jianhua
q A Markov Chain-based Availability Model of Virtual ClusterNodes
Papers by Author
Chen, Caikou
q Local Reconstruction Error of l2 Norm for Discriminant FeatureExtraction
Chen, Cai-xia
q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional Space
Chen, Chen
q Construction of a Bilingual Cognitive Property Knowledgebase
Chen, Feng
q Inertia Weight Particle Swarm Optimization with BoltzmannExploration
Papers by Author
q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring
q Fast Verification of Memory Consistency for ChipMulti-Processor
Chen, Fu-chuan
q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value Integral
Chen, Guoqiang
q SVM Combined with FCM and PSO for Fuzzy Clustering
Chen, Hao
q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring
Papers by Author
q Fast Verification of Memory Consistency for ChipMulti-Processor
q Using Organizational Evolutionary Particle Swarm Techniquesto Generate Test Cases for Combinatorial Testing
Chen, Hongwei
q The Application of Neural Network in the Intelligent FaultDiagnosis System
Chen, Jiatong
q The Guidance and Control of Small Net-recovery UAV
Chen, Jingbo
q Researches and Simulations of Information Hiding in AlamoutiTransmission System
Papers by Author
Chen, Jun
q Real-time LOD Algorithm Based on Triangle CollapseOptimization
q CFD Numerical Simulation of Exhaust Muffler
Chen, Junfeng
q A Cloud Model Based Computational Intelligence Algorithmfor Parameter Identification of Chaotic Systems
Chen, Li
q A Survey on Methods of Automatic Protocol ReverseEngineering
Chen, Liang
q Knowledge Discovery Method from Abnormal Monitoring Data
Papers by Author
Chen, Liping
q Adaptive Evaluation Model of Information Systemby Triangular Fuzzy Number
Chen, Liquan
q Researches and Simulations of Information Hiding in AlamoutiTransmission System
Chen, Shengbo
q Model Composition and Generating Tests for WebApplications
Chen, Shizhan
q A QoS-based Self-adaptive Framework for OpenAPI
Papers by Author
Chen, Tieming
q A Bilinear Pairing-Based Key Management Schemefor Wireless Sensor Networks
Chen, Wei
q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient Pruning
Chen, Weiqi
q The 0/1 Multi-objective Knapsack Problem Based on RegionalSearch
Chen, Wen-Sheng
q A Novel Subspace Discriminant Locality PreservingProjections for Face Recognition
Papers by Author
q Automatic Parameter Determination Based on a ModifiedDiscriminant Criterion for Face Recognition
Chen, Xiaohe
q Construction of a Bilingual Cognitive Property Knowledgebase
Chen, Xiaohui
q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks
Chen, Xiaojiang
q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring
Papers by Author
Chen, Xiao-yan
q A Maximal Clique Partition Method for Network Basedon Granularity
q Research on the Maximum Flow in Large-scale Networkq A New Scheme for Information Hiding Based on Digital
Images
Chen, XingYuan
q Construction of Overflow Attacks Based on Attack Elementand Attack Template
Chen, Xu
q A Secondary Image Denoising Model Based on the LocalEnergy Operator
Papers by Author
q The Iterative Regularization Method Based on ImageDecomposition Model
Chen, Yan
q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive Text
Chen, YinDong
q A Construction of Balanced Odd-variable Boolean Functionwith Optimum Algebraic Immunity
Cheng, Chao
q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional Space
Papers by Author
Cheng, Guojian
q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum Reservoir
q The Application of Binary Particle Swarm Algorithm in FaceRecognition
Cheng, Jian
q Face Recognition with Statistical Local Line Binary Patternq Pedestrian Detection Based on HOG-LBP Feature
Cheng, Tianzhen
q Multi-jammer Localization in Wireless Sensor Networks
Papers by Author
Cheng, Xiao-hui
q Research on Privacy-preserving in Distributed Mining Basedon the Attribute Similarity
Chengmin, Sun
q The Overview of Feature Selection Algorithms Based SwarmIntelligence and Rough Set
Chen-yu, Liu
q Spares Consumption Prediction Based on BP Neural Networkq Spares Consumption Quota Model Based on BP Neural
Network
Papers by Author
Cheong, Ming-Lee
q Design of a Digital Forensics Evidence Reconstruction Systemfor Complex and Obscure Fragmented File Carving
Cheong, Se-Hang
q Lifeline: Emergency Ad Hoc Network
Cheung, Yiu-ming
q Off-line Text-independent Writer Identification Using a Mixtureof Global and Local Features
Chou, Chun-Hsien
q Image Quality Assessment Based on Binary StructureInformation
Papers by Author
Chua, Tong-Wei
q Design of a Digital Forensics Evidence Reconstruction Systemfor Complex and Obscure Fragmented File Carving
Chuanri, Li
q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit Board
Chuanyi, Fu
q Spectral Clustering and its Research Progressq Design and Implement of SerialPort Class on Upper Machine
System
Papers by Author
Chufeng, Zeng
q Systematical Vulnerability Detection in Browser ValidationMechanism
Chunping, Liu
q A Saliency Detection Model Based on Multi-feature Fusionq Pedestrian Recognition Based on Saliency Detection
and Kalman Filter Algorithm in Aerial Video
Chunyan, Ma
q A Model Driven Approach for Self-Healing Computing System
Cong, Tao
q Architecture for Component Library Retrieval on the Cloud
Papers by Author
Cui, Baojing
q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process
Dachao, Li
q Phylogenetic Tree of DNA Sequences Constructed by a NewMethod-H Curve
Dai, Meiyin
q Dynamic Fuzzy Semisupervised Multitask Learning
Dai, Qing
q A New Cross-realm Group Password-based AuthenticatedKey Exchange Protocol
Papers by Author
Dan-tuo, Zhang
q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc Networks
Dayou, Liu
q The Overview of Feature Selection Algorithms Based SwarmIntelligence and Rough Set
de Moraes, André Fabiano
q Pattern Recognition with Spatial Data Mining in Web: AnInfrastructure to Engineering of the Urban Cadaster
de Oliveira, Adriana Esmeraldo
q A Security API for Multimodal Multi-biometric ContinuousAuthentication
Papers by Author
Deng, Aihua
q An Important Property about Vertex Distance of CrossedCubes CQn
Deng, Chao
q The BSC Alarm Management System Based on Rough SetTheory in Mobile Communication
Deng, Guang
q The Study of Improved Marker-Controlled Watershed CrownSegmentation Algorithm
Deng, Junping
q Off-line Text-independent Writer Identification Using a Mixtureof Global and Local Features
Papers by Author
Deng, Lingjuan
q Analysis of the Authentication Protocols Based on GameTheory
Deng, Qingqiong
q Face Reconstruction from Skull Based on Partial LeastSquares Regression
Deng-xu, He
q Glowworm Swarm Optimization Algorithm for SolvingMulti-constrained QoS Multicast Routing Problem
Ding, Yi
q Traitor Tracing and Revocation Mechanismswith Privacy-Preserving
Papers by Author
q Efficient Password-Based Authenticated Key Exchangefrom Lattices
q K-times Proxy Re-encryptionq Proxy Re-encryption with Keyword Search from Anonymous
Conditional Proxy Re-encryption
Ding, Yuan
q Orthogonal Test Algorithm on TD-SCDMA NetworkOptimization
Distefano, Salvatore
q Achieving Distributed System Information Security
Papers by Author
Dong, Mengxuan
q The Estimation Algorithm of Laplacian Eigenvalues forthe Tangent Bundle
Dong, Ning
q A Hybrid Multiobjective Differential Evolution Algorithm Basedon Improved ε-Dominance
Dong, Wanli
q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation
Dong, Yao
q VVCS: Verifiable Visual Cryptography Scheme
Papers by Author
Dong, Zefeng
q A Novel Group Signature Scheme Based on NTRU
Dongdong, Li
q Research on Access Control Mechanism for Digital ProductsTrading
Dongping, Hu
q Hierarchical ID-Based Blind Signature from Lattices
Dou, Zengfa
q A Novel Two-stage Analysis Method for Customer’sRequirement
Papers by Author
Du, Jinling
q Multi-objective Optimization of Bus Dispatching Basedon Improved Genetic Algorithm
Duan, Fuqing
q Contours-Matching in Building Reconstruction from a SingleImage
q Face Reconstruction from Skull Based on Partial LeastSquares Regression
Duan, Xiaoyi
q Research and Implementation of DPA-resistant SMS4 BlockCipher
Papers by Author
Duan, Yuhong
q A New Improved Particle Swarm Optimization Algorithm
Enmin, Tan
q A Data Distribution Platform Based on Event-DrivenMechanism
Fan, Lei
q Uniform Design Based Hybrid Genetic Algorithmfor Multiobjective Bilevel Convex Programming
q Traitor Tracing and Revocation Mechanismswith Privacy-Preserving
q Efficient Password-Based Authenticated Key Exchangefrom Lattices
Papers by Author
Fan, Ming
q Inducing Chinese Selectional Preference Based on HowNet
Fan, Xiang
q Modeling and Simulating the Propagation of UnstructuredPeer-to-Peer Worms
Fan, Xiaoya
q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor
Fang, Bin
q A Novel Subspace Discriminant Locality PreservingProjections for Face Recognition
Papers by Author
Fang, Dingyi
q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring
Fang, Yiqiu
q Improvement of the MapReduce Model Based on MessageMiddleware Oriented Data Intensive Computing
Fangyi, She
q Design of Instrument Control System Based on LabView
FangZheng, Yang
q Design of Instrument Control System Based on LabView
Papers by Author
Fei, Gong
q Research of Rapid Attention-Information Extractionin Human-Robot Interaction
Fei, Xiang
q An Image Encryption Algorithm Based on Scramblingand Substitution Using Hybrid Chaotic Systems
Fei, Xu
q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit Board
Feng, Feng
q Information Hiding Algorithm Based on Stentiford VisualAttention Model
Papers by Author
Feng, Guo
q Spares Consumption Prediction Based on BP Neural Networkq Spares Consumption Quota Model Based on BP Neural
Network
Feng, Guorui
q Differential Energy Watermarking Based on Macro-blockPrediction
Feng, J.Q.
q Monitoring the PSO Process Based on Fuzzy RandomVariables
Papers by Author
Feng, Jianwen
q Exponentially Synchronization of Stochastic ComplexNetworks with Time-varying Delays and Switching Topologyvia Pinning Control
q On Cluster Synchronization for Linearly Coupled ComplexNetworks
Feng, Mingyong
q A Heuristic Genetic Process Mining Algorithm
Feng, Qiuxiang
q DBS Application to Chinese Adjectives
Papers by Author
Feng, Quanyou
q Analytical Models for Data Dependence Violation Checkingin TLS
Feng, Shuang
q An Improvement of Comprehensive Evaluation Model
Feng, Xiaobo
q Attack on the Cryptosystem Based on DLP
Feng, Zhiyong
q A QoS-based Self-adaptive Framework for OpenAPI
Papers by Author
Fenghua, Li
q Research on Access Control Mechanism for Digital ProductsTrading
Fengju, Kang
q Design of Intelligent Decision-making System in Multi-UUVFormation Control Simulation
Fu, Wei
q An ID-based (k, t, n) Threshold Group Signature Scheme
Fu, Yanjun
q Fast and Effectively Identify Pornographic Images
Papers by Author
Fu, Yingchun
q Spatial Prediction of Dissolved Organic Carbon Using GISand ANN Modeling in River Networks
Fyfe, Colin
q Minimal Echo State Networks for Visualisationq Reinforcement Learning for the N-Persons Iterated Prisoners’
Dilemma
Gan, Guolong
q Pedestrian Detection Based on HOG-LBP Feature
Ganglian, Ren
q A Lower Bound for the Smarandache Function Value
Papers by Author
Gao, Chao
q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive Text
Gao, Chao-Qin
q A Security Model for Information Systems with Multi-levelSecurity
Gao, Deyuan
q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor
Gao, Dongmei
q Robust Adaptive Sliding Mode Control Design for a Classof Uncertain Neutral Systems with Distributed Delays
Papers by Author
Gao, Jinzhu
q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum Reservoir
Gao, Sheng
q Marshmallow: A Content-Based Publish-Subscribe Systemover Structured P2P Networks
Gao, Xinbo
q Level Set Region Based Image Segmentation Using LatticeBoltzmann Method
Gao, Xingbao
q A Neural Network for a Class of Horizontal LinearComplementary Problems
Papers by Author
Gao, Yulin
q A New Improved Particle Swarm Optimization Algorithm
Gen-gui, Zhou
q Closed-loop Supply Chain Network Horizontal IntegrationProblem
Ghoualmi, Nacira
q A New Approach for Adaptive Intrusion Detection
Gong, Chunmei
q The Problem about Grey Incidence Cluster Analysis
Papers by Author
Gong, Kevin
q The Application of Binary Particle Swarm Algorithm in FaceRecognition
Gong, Liu
q Pedestrian Recognition Based on Saliency Detectionand Kalman Filter Algorithm in Aerial Video
Gong, Mingming
q Clustering Based Image Denoising Using SURE-LET
Gong, Shengwen
q Model Composition and Generating Tests for WebApplications
Papers by Author
Gong, Xiaoqing
q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring
Goo, Bon Min
q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning Algorithms
Gu, Kun
q Design and Implementation of an Electromagnetic AnalysisSystem for Smart Cards
Guan, Chun
q A Model of Emotional Agent Based on Granular Computing
Papers by Author
q An Improved ID3 Based on Weighted Modified InformationGain
Gui-qing, Liu
q Glowworm Swarm Optimization Algorithm for SolvingMulti-constrained QoS Multicast Routing Problem
Guo, Bing
q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level
Guo, Jiang Hong
q Secure Data Aggregation Scheme for Clustered WirelessSensor Networks
Papers by Author
Guo, Ping
q Software Fault Prediction Framework Based onaiNet Algorithm
q Multi-Level Kernel Machine for Scene Image Classificationq Sparse Representation for Multi-Label Image Annotation
Guo, Tao
q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process
Guo, Wei-feng
q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm Setting
Papers by Author
Guo, William W.
q Modeling and Simulating the Propagation of UnstructuredPeer-to-Peer Worms
Guo, Xiao-Bin
q Approximate Solution of Fuzzy Sylvester Matrix Equations
Guo, Xin
q Structural Health Monitoring via Dynamic Visualization
Guo, Yanchun
q SVM Combined with FCM and PSO for Fuzzy Clustering
Papers by Author
Guo, Zhou Zhi
q Automatic Detection of Lumina in Mouse LiverImmunohistochemical Color Image Using Support VectorMachine and Cellular Neural Network
Guohua, Liu
q The Classification of k-anonymity Data
Guojun, Zhang
q The Design of Cooperative Intrusion Detection System
Ha, Weitao
q Achievement of Proxy Cache System for Streaming MediaBased on Patch Algorithm
Papers by Author
Haifeng, Li
q An Intelligent Vehicle Monitoring System Based on Internetof Things
Haifeng, Zhang
q A New Algorithm for Auto-Exposure Based on the AnalogyHistogram
Haisong, Chen
q Improving the Performance of Personalized Recommendationwith Ontological User Interest Model
Han, Li
q Using a Dynamic K-means Algorithm to Detect AnomalyActivities
Papers by Author
Han, Limin
q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor
Hanxu, Sun
q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System
Hao, Yongle
q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process
Hao, Zhifeng
q The 0/1 Multi-objective Knapsack Problem Based on RegionalSearch
Papers by Author
He, Chen-Guang
q An Enhanced Role-Based Access Control Mechanismfor Hospital Information Systems
He, Chongnan
q Finite Volume Methods for the Second Order SingularPerturbation Problems
He, Junfeng
q The Analysis of Influence Factors of the Confidence Levelon University Students’ Network Shopping
He, Wei
q A Novel Subspace Discriminant Locality PreservingProjections for Face Recognition
Papers by Author
q Measuring Semantic Relatedness between Words UsingLexical Context
He, WenZhang
q Parabolic Adjustment of Image Clearness Algorithm Basedon Retinex Theory
He, Yunhui
q Class-Incremental Kernel Discriminative Common Vectors
He, Zhenhuan
q Research on Improved Greedy Algorithm for TrainRescheduling
Papers by Author
Hegedus, Jozsef
q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors Classifiers
Hei, Xinhong
q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPS
Hong, Bao
q Cooperative Neural Network Background Modelfor Multi-Modal Video Surveillance
Papers by Author
Hong, Han
q Design of Intelligent Decision-making System in Multi-UUVFormation Control Simulation
Hongxia, Liu
q Computer Realization of Quadratic Spline Interpolation
Hou, Yu
q Local Reconstruction Error of l2 Norm for Discriminant FeatureExtraction
Hsu, Yun-Hsiang
q Image Quality Assessment Based on Binary StructureInformation
Papers by Author
Hu, JiaJia
q The Application of Graph Theory in Old Chinese PhonologyStudy
Hu, Jun
q A Model of Emotional Agent Based on Granular Computingq Energy-efficient MAC Protocol Designed for Wireless Sensor
Network for IoT
Hu, Junlin
q Multi-Level Kernel Machine for Scene Image Classification
Papers by Author
Hu, Ronglei
q Research and Implementation of DPA-resistant SMS4 BlockCipher
Hua, Bo
q A Maximal Clique Partition Method for Network Basedon Granularity
q Research on the Maximum Flow in Large-scale Networkq A New Scheme for Information Hiding Based on Digital
Images
Huamin, Feng
q A Spam Filtering Method Based on Multi-modal FeaturesFusion
Papers by Author
Huan, Hu
q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System
Huandong, Chen
q Phylogenetic Tree of DNA Sequences Constructed by a NewMethod-H Curve
q A Blakley Secret Sharing Scheme without Trusted ShareDistributed Center
q Spectral Clustering and its Research Progress
Huang, Degen
q DBS Application to Chinese Adjectives
Papers by Author
Huang, Donghua
q Face Reconstruction from Skull Based on Partial LeastSquares Regression
Huang, Dupei
q Measuring Semantic Relatedness between Words UsingLexical Context
Huang, Hua
q Orthogonal Test Algorithm on TD-SCDMA NetworkOptimization
Huang, Jiasen
q Attribute-based Signcryption with Ciphertext-policyand Claim-predicate Mechanism
Papers by Author
Huang, Jihai
q The Implementation of Trust Model in the P2P PatchDistribution System
Huang, Taiquan
q Automatic Parameter Determination Based on a ModifiedDiscriminant Criterion for Face Recognition
Huang, Xiantong
q Schistosoma Cercariae Image Recognition via SparseRepresentation
Huawei, Wang
q A New Algorithm for Auto-Exposure Based on the AnalogyHistogram
Papers by Author
Hua-Zheng, Zhu
q Glowworm Swarm Optimization Algorithm for SolvingMulti-constrained QoS Multicast Routing Problem
Hui, Qu
q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile Communications
Hui, Wang
q Automatic Detection of Lumina in Mouse LiverImmunohistochemical Color Image Using Support VectorMachine and Cellular Neural Network
Papers by Author
Hui, Xu
q Security Authentication Scheme Based on CertificatelessSignature and Fingerprint Recognition
Huifang, Li
q Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlow
Hui-rong, Li
q Improved Differential Evolution Algorithm with AdaptiveMutation and Control Parameters
Huixian, Li
q A Novel Hash-based RFID Mutual Authentication Protocol
Papers by Author
Ilin, Alexander
q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors Classifiers
Isohara, Takamasa
q Kernel-based Behavior Analysis for Android MalwareDetection
Ji, Shirui
q An Automated Black-box Testing Approach for WSN SecurityProtocols
Papers by Author
Ji, Xinsheng
q Analysis of Abnormal Events in IMS and Research onthe Strategy of Detection
Jia, Huaping
q Neural Network in the Application of EEG Signal ClassificationMethod
Jia, Jihong
q Sufficient Optimality Conditions and Duality for a MinmaxFractional Problem
Jia, Liping
q Uniform Design Based Hybrid Genetic Algorithmfor Multiobjective Bilevel Convex Programming
Papers by Author
q Stability Analysis of Neutral-type Fuzzy Neural Networkswith Distributed Delays
Jia, Xiaoqiang
q Feature Selection Algorithm Based on the CommunityDiscovery
Jia, Yuhong
q Study on Role-Based Access Control with Time Constraint
Jia, Yuxiang
q Inducing Chinese Selectional Preference Based on HowNet
Papers by Author
Jian, Li
q An Intelligent Vehicle Monitoring System Based on Internetof Things
Jianfeng, Ma
q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks
q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework
Jiang, Dingde
q A Wavelet-Based Detection Approach to Traffic Anomalies
Papers by Author
Jiang, Han
q A New Cross-realm Group Password-based AuthenticatedKey Exchange Protocol
q Attribute-Based Authenticated Key Exchange Protocolwith General Relations
Jiang, Hua
q Fast Network Traffic Anomaly Detection Based on Iteration
Jiang, Juan
q Research on the Maximum Flow in Large-scale Networkq A New Scheme for Information Hiding Based on Digital
Images
Papers by Author
Jiang, Lijun
q Relative Local Mean Classifier with Optimized Decision Rule
Jiang, Min
q Multiobjective Interaction Programming for Two-Persons
Jiang, Rongrong
q A Bilinear Pairing-Based Key Management Schemefor Wireless Sensor Networks
Jiang, Xian
q Improvement of the MapReduce Model Based on MessageMiddleware Oriented Data Intensive Computing
Papers by Author
Jiang, Xiubao
q Clustering Based Image Denoising Using SURE-LET
Jiangfeng, Yu
q The Construction and Application of Distance and OpenExperimental Platform
JianGuo, Ju
q Research of Access Control in Electronic Medical RecordBased on UCON
Jianhua, Kang
q Design of Instrument Control System Based on LabView
Papers by Author
Jianping, Li
q Fingerprint Composition-Feature Extraction Using DirectionalFilter Banks
Jianzhong, Cao
q A New Algorithm for Auto-Exposure Based on the AnalogyHistogram
Jiao, Yong-Chang
q MOEA/D with Uniform Design for the Multiobjective 0/1Knapsack Problem
Jiaojiao, Zhang
q Improving the Performance of Personalized Recommendationwith Ontological User Interest Model
Papers by Author
Jiaxi, Chen
q Reliability Analysis of System-in-the-Loop Network PlatformBased on Delays
Jie, Liu
q A New Filled Function Algorithm for Constrained GlobalOptimization Problems
Jie, Xiong
q Research and Implementation on the Digital Medical ImageEnhancement Methods Based on Gradient Smoothand Context Smooth
Jieqing, Xing
q Spectral Clustering and its Research Progress
Papers by Author
Jin, Peng
q Improved Word Similarity Computation for Chinese UsingSub-word Information
q A Method for New Word Extraction on Chinese Large-scaleQuery Logs
Jing, Liu
q Research and Implementation on the Digital Medical ImageEnhancement Methods Based on Gradient Smoothand Context Smooth
Jing, Yuan
q Reliability Analysis of System-in-the-Loop Network PlatformBased on Delays
Papers by Author
Jinghui, Zhang
q Research on Access Control Mechanism for Digital ProductsTrading
Jingying, Li
q A Fast Handoff Method Based on RSSI and LQI in WirelessSensor Network
Jingzhou, Song
q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System
Jinhua, Zheng
q Hybrid Genetic Algorithm for TSP
Papers by Author
Jinling, Du
q A Genetic Algorithm Based on a New Fitness Functionfor Constrained Optimization Problem
Jinman, Zhang
q Hierarchical Identity-based Broadcast Encryption Schemeon Lattices
Jinmei, Zhan
q Design and Implement of SerialPort Class on Upper MachineSystem
Ji-Zhao, Liu
q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc Networks
Papers by Author
Juan, Li
q TKNN: An Improved KNN Algorithm Based on Tree Structure
Juan, Zhao
q Discretization Based on Positive Domain and InformationEntropy
Jun, Yan
q Improving the Performance of Personalized Recommendationwith Ontological User Interest Model
Papers by Author
Jun, Yang
q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network
Junjun, Song
q Iterative Learning Control of Double Servo Valve ControlledElectro Hydraulic Servo System
Juntao, Chen
q Design and Implement of SerialPort Class on Upper MachineSystem
Papers by Author
Junwei, Ge
q Improvement of the MapReduce Model Based on MessageMiddleware Oriented Data Intensive Computing
q Architecture for Component Library Retrieval on the Cloud
Kang, Hao
q The Application of Neural Network in the Intelligent FaultDiagnosis System
Ke, Wang
q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc Networks
Papers by Author
Kim, Hun
q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning Algorithms
Kuang, Haibo
q Construction of a Bilingual Cognitive Property Knowledgebase
Kubota, Ayumu
q Kernel-based Behavior Analysis for Android MalwareDetection
Kun, Liu
q Discretization Based on Positive Domain and InformationEntropy
Papers by Author
Kwok, Lam-for
q A Generic Scheme for the Construction of ContextualSignatures with Hash Function in Intrusion Detection
Lai, Juan
q A Method for New Word Extraction on Chinese Large-scaleQuery Logs
Lai, Xin
q Analytical Models for Data Dependence Violation Checkingin TLS
Lan, Luan
q The AES Encryption and Decryption Realization Basedon FPGA
Papers by Author
Lang, Bo
q A Combined Music Label Propagation Model
Lao, Fengdan
q 3G-based Remote Video Surveillance and Control Systemfor Facility Agriculture
Lee, Kai-Ip
q Lifeline: Emergency Ad Hoc Network
Lee, Tae Rim
q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning Algorithms
Papers by Author
Lei, Ren
q The Simulation of Trajectory for Homing Depth ChargeAttacking the Submarine with Different Guide Orderliness
Lei, Zhang
q Research on Industrial Building’s Reliability AssessmentBased on Projection Pursuit Model
Lendasse, Amaury
q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors Classifiers
Li, Bin
q Construction of a Bilingual Cognitive Property Knowledgebase
Papers by Author
Li, Chunsheng
q A Practical Framework for Agent-Based Hybrid IntelligentSystems
Li, Dong
q Design of the DS-UWB Communication System Basedon Chaotic Variable Spreading Factor
Li, FanZhang
q Dynamic Fuzzy Semisupervised Multitask Learningq The Estimation Algorithm of Laplacian Eigenvalues for
the Tangent Bundle
Papers by Author
Li, Fei
q Search Engine Optimization Based on Algorithm of BP NeuralNetworks
q Recovering Coverage Holes by Using Mobile Sensorsin Wireless Sensor Networks
Li, Guangye
q Query-Aware Anonymization in Location-Based Service
Li, Guohui
q Marshmallow: A Content-Based Publish-Subscribe Systemover Structured P2P Networks
Papers by Author
Li, Guoqi
q FTA Based Runtime Evaluation of System Reliabilityfor Autonomous Unmanned Vehicle
Li, Haifeng
q A Simple But Effective Stream Maximal Frequent ItemsetMining Algorithm
Li, HeCheng
q A Genetic Algorithm Based on Duality for Linear BilevelProgramming Problems
Li, Heng
q A Combined Music Label Propagation Model
Papers by Author
Li, Hongning
q An Identity-based Secure Routing Protocol in WSNs
Li, Hongping
q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar Field
Li, Hui
q Security Analysis of Some Recent Authentication Protocolsfor RFID
Li, Huiyun
q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis Attacks
Papers by Author
Li, Jiafei
q A Heuristic Genetic Process Mining Algorithmq A Heuristic Genetic Process Mining Algorithm
Li, Jie
q Adaptive Neural Control for a Class of Perturbed Time-delayNonlinear Systems
Li, JieYuan
q On the Representation and Querying of Sets of PossibleWorlds in the K-anonymity Privacy Protecting Model
Papers by Author
Li, Jing-feng
q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm Setting
Li, Jinhua
q A Hybrid Method for Solving Global Optimization Problems
Li, JiongCheng
q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWB
Li, Jiyun
q Promotion Analysis Based on Fitting in Multi-Level Space
Papers by Author
Li, Kan
q A Practical Framework for Agent-Based Hybrid IntelligentSystems
Li, Lan
q Existence of Almost Periodic and Almost AutomorphicSolutions for Second Order Differential Equations
Li, Leibo
q Co-Z Addition Operation of Hessian Curve
Li, Li
q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimization
Papers by Author
Li, Ping
q Multi-jammer Localization in Wireless Sensor Networks
Li, Qi
q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level
Li, Rui
q Attribute-Based Authenticated Key Exchange Protocolwith General Relations
q Concurrent Non-malleable Statistically Hiding Commitment
Papers by Author
Li, Shanshan
q Image Scrambling Based on Chaos Theory and VigenèreCipher
Li, Wei
q Query-Aware Anonymization in Location-Based Serviceq An Empirical Study on Credit Scoring Model for Credit Card
by Using Data Mining Technology
Li, Weichang
q An Identity-based Secure Routing Protocol in WSNs
Papers by Author
Li, Weisheng
q A General Edge Detection Method Based on the ShearTransform
Li, Xiang You
q Optimality Conditions for Fractional Programming with B (p,r, a) Invex Functions
Li, XiangDong
q A Survey on Methods of Automatic Protocol ReverseEngineering
Li, Xiangyu
q Design and Implementation of an Electromagnetic AnalysisSystem for Smart Cards
Papers by Author
Li, Xinghua
q Analysis of the Authentication Protocols Based on GameTheory
Li, Xinshe
q A Novel Group Signature Scheme Based on NTRU
Li, Xiu Ying
q Research and Implementation of DPA-resistant SMS4 BlockCipher
Li, Xiuying
q DBS Application to Chinese Adjectives
Papers by Author
Li, Ya Hui
q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks
Li, Yanbo
q Robust Adaptive Sliding Mode Control Design for a Classof Uncertain Neutral Systems with Distributed Delays
Li, You
q A Comparative Study on Appending Priority Relations of Rulesin BDI-Based Agent Model
Li, Yu
q Property-Based Remote Attestation Oriented to CloudComputing
Papers by Author
q Fast Iris Boundary Location Based on Window MappingMethod
Li, Yun-peng
q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm Setting
Li, ZengYuan
q The Study of Improved Marker-Controlled Watershed CrownSegmentation Algorithm
Li, Zhan
q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability Matrix
Papers by Author
Liang, Chen
q Hierarchical ID-Based Blind Signature from Lattices
Liang, Qiao
q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit Board
Liang, Qixuan
q A QoS-based Self-adaptive Framework for OpenAPI
Liang, Ren
q VAR Model Analysis on Japan’s OFDI and Industrial StructuralUpgrading
Papers by Author
Liang, YiXiong
q Learning Local Binary Patterns with Enhanced Boostingfor Face Recognition
Liao, Jibiao
q An Empirical Study on Credit Scoring Model for Credit Cardby Using Data Mining Technology
Liao, Shizhong
q An Error Bound for Eigenvalues of Graph Laplacianwith Bounded Kernel Function
Liaojun, Pang
q A Novel Hash-based RFID Mutual Authentication Protocol
Papers by Author
Lidong, Wang
q A Study on IT-security Vocabulary for Domain DocumentClassification
Lin, Peng
q Research on Characteristics of Plates on Chinese StockMarket
q Dynamic Risk Measurement of Futures based on WaveletTheory
Lin, Weimin
q A Markov Chain-based Availability Model of Virtual ClusterNodes
Papers by Author
Lin, Xibin
q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWB
Lin, Yuanguai
q The Application of the Internet of Things in Hainan TourismScenic Spot
Lin, Yuming
q A Comparative Study on Appending Priority Relations of Rulesin BDI-Based Agent Model
Linao, Tang
q A New Algorithm for Auto-Exposure Based on the AnalogyHistogram
Papers by Author
Ling, Jie
q Information Hiding Algorithm Based on Stentiford VisualAttention Model
Lingling, Hu
q An Intelligent Vehicle Monitoring System Based on Internetof Things
Liping, Chen
q The Design of Cooperative Intrusion Detection System
Liping, Qian
q A Study on IT-security Vocabulary for Domain DocumentClassification
Papers by Author
Liu, Caixia
q Analysis of Wireless Mesh Network Security Based on NodeFunction
q Analysis of Abnormal Events in IMS and Research onthe Strategy of Detection
Liu, Changqing
q Probabilistic Trajectory Modeling of Flight Vehicles Basedon Parameter Deviations
q Methodology for Statistical Distribution Determinationof Various Data Sources
q Sequential Bayesian Method for Formulating Uncertaintyin Sparse Data
Papers by Author
Liu, Chunlei
q Query-Aware Anonymization in Location-Based Service
Liu, Cong
q Analytical Models for Data Dependence Violation Checkingin TLS
Liu, Dalian
q A Genetic Algorithm Based on a New Fitness Functionfor Constrained Optimization Problem
Liu, Gang
q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient Pruning
Papers by Author
Liu, Guang-liang
q An ID-based (k, t, n) Threshold Group Signature Scheme
Liu, Guohua
q Modeling the Uncertain Data in the K-anonymity PrivacyProtection Model
q On the Representation and Querying of Sets of PossibleWorlds in the K-anonymity Privacy Protecting Model
q Similarity Matching over Uncertain Time Series
Liu, Hailin
q The 0/1 Multi-objective Knapsack Problem Based on RegionalSearch
Papers by Author
Liu, Hai-lin
q A Weighted K-hyperline Clustering Algorithm for Mixing MatrixEstimation on Bernoulli-Gaussian Sources
Liu, Hui
q The Multispectral Image Edge Detection Based on CliffordGradient
Liu, Jia
q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm
Liu, Jie
q A Hybrid Method for Solving Global Optimization Problems
Papers by Author
q Research on Industrial Building’s Reliability AssessmentBased on Projection Pursuit Model
Liu, Ju
q Information Hiding Algorithm Based on Stentiford VisualAttention Model
Liu, Liu
q FBctlr - A Novel Approach for Storage PerformanceVirtualization
Liu, LiXiong
q Active Contours with Adaptively Normal Biased GradientVector Flow External Force
Papers by Author
Liu, PengYuan
q Another View of the Features in Supervised Chinese WordSense Disambiguation
Liu, Ping
q Saliency-based Adaptive Scaling for Image Retargeting
Liu, Rui
q Parabolic Adjustment of Image Clearness Algorithm Basedon Retinex Theory
Liu, Shuxin
q Analysis of Wireless Mesh Network Security Based on NodeFunction
Papers by Author
Liu, Wei
q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks
q Contours-Matching in Building Reconstruction from a SingleImage
Liu, Xi
q Simplified Business Process Model Mining Basedon Structuredness Metric
Liu, Xia
q Optimization of Vehicle Routing Problem Based on Max-MinAnt System with Parameter Adaptation
Papers by Author
q Optimization of Vehicle Routing Problem Based on Max-MinAnt System with Parameter Adaptation
Liu, Xiao Bin
q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level
Liu, Yang
q Schistosoma Cercariae Image Recognition via SparseRepresentation
Liu, Yong
q An Error Bound for Eigenvalues of Graph Laplacianwith Bounded Kernel Function
Papers by Author
Liu, Yong-lin
q Weak-pseudo-R0 Algebras
Liu, Yubao
q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability Matrix
Liu, YunCheng
q Security Problems and Countermeasures with CommercialBanking Computer Networks
Liu, Zaixue
q New Heuristic Algorithm of RNA Secondary StructurePrediction with Pseudoknots
Papers by Author
Liu, Zhao
q An Improved Software Reliability Model Considering FaultCorrection Rate
Liu, Zhen Han
q FBctlr - A Novel Approach for Storage PerformanceVirtualization
Liu, ZhenDong
q New Heuristic Algorithm of RNA Secondary StructurePrediction with Pseudoknots
Liu, Zhenghong
q Study on Role-Based Access Control with Time Constraint
Papers by Author
Liu, Zhiqin
q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation
Li-Xiao, Ma
q A Line-up Competition Differential Evolution Algorithm forthe Generalized Assignment Problem
Long, Liu
q Pedestrian Recognition Based on Saliency Detectionand Kalman Filter Algorithm in Aerial Video
Long, Shujun
q Stability Analysis of Neutral-type Fuzzy Neural Networkswith Distributed Delays
Papers by Author
Longmei, Zhang
q A Model Driven Approach for Self-Healing Computing System
Longqing, Shi
q Data Sources of Webometrics
Looi, Mark
q Modeling and Simulating the Propagation of UnstructuredPeer-to-Peer Worms
Lu, Miao
q Researches and Simulations of Information Hiding in AlamoutiTransmission System
Papers by Author
Lu, Qiu
q Research on Privacy-preserving in Distributed Mining Basedon the Attribute Similarity
Lu, Xueyu
q Spatial Prediction of Dissolved Organic Carbon Using GISand ANN Modeling in River Networks
Lu, Yao
q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient Pruning
Lun, Xie
q Research of Rapid Attention-Information Extractionin Human-Robot Interaction
Papers by Author
Luo, Jiang-feng
q Action-Seeking Team Coordination for Unmanned VehiclesTeam Planning
Luo, Li-gui
q Qualitative Analysis for a Kind of Predator-Prey Modelof Holling III-Function Response with Nonlinear DensityDependent
Luo, Min
q Design and Implementation of Bus Net Routing Algorithm
Luo, Ming
q Certificateless Broadcast Signcryption with Forward Secrecy
Papers by Author
Luo, Qi
q A New Community Structure Detection Method Basedon Structural Similarity
Luo, Ruiyi
q Software Fault Prediction Framework Based onaiNet Algorithm
Luo, Wencai
q Probabilistic Trajectory Modeling of Flight Vehicles Basedon Parameter Deviations
q Methodology for Statistical Distribution Determinationof Various Data Sources
Papers by Author
q Sequential Bayesian Method for Formulating Uncertaintyin Sparse Data
Luo, Yong-long
q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional Space
Luo, Ziqiang
q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software Reliability
q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model Theory
q Qualitative Modeling for Parallel Software System ReliabilityEvaluation
Papers by Author
Lv, Chao
q Security Analysis of Some Recent Authentication Protocolsfor RFID
Lv, Yi
q Fast Verification of Memory Consistency for ChipMulti-Processor
Lv, Zheng
q Fast Verification of Memory Consistency for ChipMulti-Processor
Ma, Jian Feng
q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks
Papers by Author
q Secure Data Aggregation Scheme for Clustered WirelessSensor Networks
Ma, Jianfeng
q PSO-BP Neural Network in Reservoir Parameter DynamicPrediction
q Analysis of the Authentication Protocols Based on GameTheory
Ma, Jun
q Multi-Side Multi-Instance Algorithm
Ma, Shengquan
q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software Reliability
Papers by Author
q Qualitative Modeling for Parallel Software System ReliabilityEvaluation
Ma, Sheng-quan
q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value Integral
Ma, Weigang
q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPS
Ma, Zeng
q Energy-efficient MAC Protocol Designed for Wireless SensorNetwork for IoT
Papers by Author
Mao, Xiaoqin
q Security Problems and Countermeasures with CommercialBanking Computer Networks
Maozhi, Xu
q Multi-Undeniable Signature Schemes
McCarthy, Diana
q Improved Word Similarity Computation for Chinese UsingSub-word Information
Mei, Denghua
q An Improved Software Reliability Model Considering FaultCorrection Rate
Papers by Author
Mei, Jie Long
q Automatic Detection of Lumina in Mouse LiverImmunohistochemical Color Image Using Support VectorMachine and Cellular Neural Network
Meng, Yanshuang
q Existence and Global Attractivity of Almost Periodic Solutionof Hopfield Neural Networks with Time Delays
Meng, Yuxin
q A Generic Scheme for the Construction of ContextualSignatures with Hash Function in Intrusion Detection
Meng, Zhiqing
q Multiobjective Interaction Programming for Two-Persons
Papers by Author
Miao, Qiguang
q A General Edge Detection Method Based on the ShearTransform
Miao, Zhang
q A Fast Handoff Method Based on RSSI and LQI in WirelessSensor Network
Miche, Yoan
q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors Classifiers
Papers by Author
Min, Li
q A Secondary Image Denoising Model Based on the LocalEnergy Operator
q The Iterative Regularization Method Based on ImageDecomposition Model
Ming, Zhengfeng
q The Finite Element Analysis of the Electromagnetic LevitationSystem Based on the Large Air Gap
Mingchun, Wang
q Discretization Based on Positive Domain and InformationEntropy
Papers by Author
Mo, Jiajie
q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability Matrix
Motta, Gustavo Henrique Matos Bezerra
q A Security API for Multimodal Multi-biometric ContinuousAuthentication
Na, Li
q An Access Control Mode Based on Information Flow Graph
Nan, Li
q Research of Rapid Attention-Information Extractionin Human-Robot Interaction
Papers by Author
Nian, Lai
q Hybrid Genetic Algorithm for TSP
Nie, Ziqing
q An Implementation Method for Converting the Erhu Musicfrom Wav to Mid
Ning, Huang
q Reliability Analysis of System-in-the-Loop Network PlatformBased on Delays
Ning, JianGuo
q Streamline-based Visualization of 3D Explosion Fields
Papers by Author
Ning, Jianting
q A Trivariate Polynomial-based Dynamic Key ManagementScheme for Wireless Sensor Networks
q Optimized Approach for Computing Multi-base Chains
Ning, Xi
q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks
Niu, Ben
q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimization
q Security Analysis of Some Recent Authentication Protocolsfor RFID
Papers by Author
Niu, Wen Sheng
q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks
Niu, Yun
q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor
Olsen, Jesper
q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient Pruning
OuYang, Jihong
q A Heuristic Genetic Process Mining Algorithmq A Heuristic Genetic Process Mining Algorithm
Papers by Author
Pan, Shaowei
q PSO-BP Neural Network in Reservoir Parameter DynamicPrediction
Pan, Xiaoying
q Using Organizational Evolutionary Particle Swarm Techniquesto Generate Test Cases for Combinatorial Testing
Pang, Baochuan
q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge Cue
Pang, Liaojun
q Fast Network Traffic Anomaly Detection Based on Iteration
Papers by Author
Pang, Sulin
q Geometric Recognitions Models of Fault Characteristicsin Mobile Core Network
q The BSC Alarm Management System Based on Rough SetTheory in Mobile Communication
Pei, Qingqi
q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model
q A Trust-based Dynamic Secure Service Discovery Modelfor Pervasive Computing
q An Automated Black-box Testing Approach for WSN SecurityProtocols
Papers by Author
Peifeng, Hao
q Study on Friction Coefficient Mechanism Model of TandemCold Mill in Unstable Condition
Peng, Jianhua
q Analysis of Wireless Mesh Network Security Based on NodeFunction
Peng, Kai
q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks
Peng, Shuoling
q Novel Quantization Watermarking Based on Random AngleModulation
Papers by Author
Peng-jun, Zhao
q Improved Differential Evolution Algorithm with AdaptiveMutation and Control Parameters
Ping, Yin
q A Novel Hash-based RFID Mutual Authentication Protocol
Puliafito, Antonio
q Achieving Distributed System Information Security
Pulin, Zhang
q A Digital Watermarking Algorithm Based on Wavelet PacketTransform and BP Neural Network
Papers by Author
Qi, He
q Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlow
Qi, Wang
q A Real Time Multi-Scale Correlation Analysis Method andits Application on the Data Mining in Thermodynamic Process
Qi, Yue
q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model
Qiao, Jianping
q Information Hiding Algorithm Based on Stentiford VisualAttention Model
Papers by Author
Qiao, Kang
q A Digital Watermarking Algorithm Based on Wavelet PacketTransform and BP Neural Network
Qijian, Xu
q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks
Qi-jun, Liu
q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network
Papers by Author
Qin, Chen
q Hierarchical Identity-based Broadcast Encryption Schemeon Lattices
Qin, Lang
q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring
Qin, Wenda
q A Wavelet-Based Detection Approach to Traffic Anomalies
Qing, Huang Ming
q Fingerprint Composition-Feature Extraction Using DirectionalFilter Banks
Papers by Author
Qingfeng, Zhao
q Data Sources of Webometrics
Qingqi, Pei
q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks
Qingxian, Wang
q Systematical Vulnerability Detection in Browser ValidationMechanism
Qingxuan, Jia
q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System
Papers by Author
Qiu, Baozhi
q A Boundary Detection Algorithm of Clusters based on DualThreshold Segmentation
Qiu, Jing
q An Image Encryption and Authentication Scheme
Qu, Xiaohui
q Learning Local Binary Patterns with Enhanced Boostingfor Face Recognition
Qun, Fang
q Stochastic Modeling File Population in P2P Network
Papers by Author
Qun, Zhang
q Obtaining the Resonant Frequency of the Bubble in the ShipWake by ANSYS
Ren, Lian
q Multi-Agents Model Analysis for the Evolution of IndustrialClusters
Ren, Yueou
q The Application of Neural Network in the Intelligent FaultDiagnosis System
Rong, Li Chao
q Fingerprint Composition-Feature Extraction Using DirectionalFilter Banks
Papers by Author
Schwind, Camilla
q Belief Base Change on Implicant Sets: How to Give UpElements of a Belief Based on Literal Level
Shan, Rong
q Constructing the Expandability Web Service Based Linux
Shan-Zheng, Cheng
q The Simulation of Trajectory for Homing Depth ChargeAttacking the Submarine with Different Guide Orderliness
Shaojuan, Yu
q Iterative Learning Control of Double Servo Valve ControlledElectro Hydraulic Servo System
Papers by Author
Shen, Fang
q A Trust-based Dynamic Secure Service Discovery Modelfor Pervasive Computing
Shen, Rui
q Multiobjective Interaction Programming for Two-Persons
Shen, Yan
q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level
Shen, Yu Long
q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks
Papers by Author
Sheng, Zhong
q Researching on the Growth Operator SWFZIRS of GrowthEvolution Algorithms
q Algorithm of Distribution Estimation for Node Localizationin Wireless Sensor Network
Shengjie, Sun
q Researching on the Growth Operator SWFZIRS of GrowthEvolution Algorithms
Shengjie, Wang
q Design of Intelligent Decision-making System in Multi-UUVFormation Control Simulation
Papers by Author
Shengrong, Gong
q A Saliency Detection Model Based on Multi-feature Fusionq Pedestrian Recognition Based on Saliency Detection
and Kalman Filter Algorithm in Aerial Video
Shi, Caiyun
q The Application of Binary Particle Swarm Algorithm in FaceRecognition
Shi, Liwen
q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor
Papers by Author
Shi, Xiong
q Real-time LOD Algorithm Based on Triangle CollapseOptimization
q CFD Numerical Simulation of Exhaust Muffler
Shin, Sang Uk
q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning Algorithms
Shu, Li Cheng
q Identity-based SIP Authentication and Key Agreement
Papers by Author
ShuangCheng, Ma
q Using the Callback Function Realization Touch ScreenGestures Recognition of Computer
Shulei, Wu
q Phylogenetic Tree of DNA Sequences Constructed by a NewMethod-H Curve
q Algorithm of Distribution Estimation for Node Localizationin Wireless Sensor Network
q A Blakley Secret Sharing Scheme without Trusted ShareDistributed Center
Papers by Author
Shu-qing, Chen
q A Line-up Competition Differential Evolution Algorithm forthe Generalized Assignment Problem
Si, Yain-Whar
q Lifeline: Emergency Ad Hoc Network
Song, Bo
q Model Composition and Generating Tests for WebApplications
Song, Huaguang
q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum Reservoir
Papers by Author
Song, Ping
q Data Mining Technique in the Internal Auditing of EnterpriseGroups
Song-sen, Yu
q An Optimal Architecture of Middle Agents in Multi-AgentSystems
Studer, Thomas
q An Application of Justification Logic to Protocol Verification
Su, Shenghui
q Analysis of the Success Rate of the LLL Lattice BasisReduction
Papers by Author
q An Improvement and a New Design of Algorithms for Seekingthe Inverse of an NTRU Polynomial
Su, Yu
q The Implementation of Trust Model in the P2P PatchDistribution System
Su, Zhen
q Evaluating the Effect of Loading Forensic Tools on the VolatileMemory for Digital Evidences
Su, Zou
q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit Board
Papers by Author
Sun, Bo
q Multiresolution Streamline Placement for 2D Flow Fields
Sun, Chunsheng
q Energy-efficient MAC Protocol Designed for Wireless SensorNetwork for IoT
Sun, Hui
q The Analysis of Influence Factors of the Confidence Levelon University Students’ Network Shopping
Sun, Jiande
q Information Hiding Algorithm Based on Stentiford VisualAttention Model
Papers by Author
Sun, Li
q Promotion Analysis Based on Fitting in Multi-Level Space
Sun, Lingyan
q A QoS-based Self-adaptive Framework for OpenAPI
Sun, Peng
q Structural Health Monitoring via Dynamic Visualization
Sun, Rui
q A Method for New Word Extraction on Chinese Large-scaleQuery Logs
Sun, Tieli
q Study on Role-Based Access Control with Time Constraint
Papers by Author
Sun, Xiaoping
q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm
Sun, Xingchun
q Security Problems and Countermeasures with CommercialBanking Computer Networks
Sun, Xinxin
q Inertia Weight Particle Swarm Optimization with BoltzmannExploration
Sun, Zheng-Chun
q Face Recognition with Statistical Local Line Binary Pattern
Papers by Author
Su-qin, Zhang
q Spares Consumption Prediction Based on BP Neural Networkq Spares Consumption Quota Model Based on BP Neural
Network
Takemori, Keisuke
q Kernel-based Behavior Analysis for Android MalwareDetection
Tan, Jing
q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar Field
Papers by Author
Tan, Lijing
q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimization
Tan, Yan-Yan
q MOEA/D with Uniform Design for the Multiobjective 0/1Knapsack Problem
Tang, Guochun
q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model Theory
Tang, Luo-hao
q Action-Seeking Team Coordination for Unmanned VehiclesTeam Planning
Papers by Author
Tang, Xuri
q Construction of a Bilingual Cognitive Property Knowledgebase
Tao, Wang
q Design of Instrument Control System Based on LabView
Teng, Guanghui
q 3G-based Remote Video Surveillance and Control Systemfor Facility Agriculture
Thing, Vrizlynn L.L.
q Design of a Digital Forensics Evidence Reconstruction Systemfor Complex and Obscure Fragmented File Carving
Papers by Author
Tian, Feng
q Experimental Study the Measurement of Acoustic Wave FlightTime under Strong Noise in the Boiler
q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm
Tian, Xiaohui
q Soft-Voting Classification using Locally Linear Reconstruction
Tian, Yan
q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar Field
Tianxiang, Feng
q Computer Realization of Quadratic Spline Interpolation
Papers by Author
Tian-yi, Cai
q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile Communications
Tsai, Wen-Nung
q An Efficient Linear Text Segmentation Algorithm UsingHierarchical Agglomerative Clustering
Tseng, Judy C.R.
q An Efficient Linear Text Segmentation Algorithm UsingHierarchical Agglomerative Clustering
U, Leong Hou
q Lifeline: Emergency Ad Hoc Network
Papers by Author
Wang, Anhua
q Simplified Business Process Model Mining Basedon Structuredness Metric
Wang, Bin
q Level Set Region Based Image Segmentation Using LatticeBoltzmann Method
Wang, Caifen
q An Improved Signcryption with Proxy Re-encryption andits Application
Wang, Changji
q Attribute-based Signcryption with Ciphertext-policyand Claim-predicate Mechanism
Papers by Author
Wang, Chuanyun
q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm
Wang, Chunling
q An Interactive Charge Scheme with Rewardand Non-repudiation for Wireless Mesh Network
Wang, ChunXiao
q Multi-objective Optimization of Bus Dispatching Basedon Improved Genetic Algorithm
Wang, Feng
q Information Hiding Algorithm Based on Stentiford VisualAttention Model
Papers by Author
Wang, Guoyu
q Testing Anti-denial of Service Attacks Based on Mobile Agent
Wang, Haiquan
q Design and Implementation of Bus Net Routing Algorithm
Wang, HaiYang
q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm
Wang, Hao
q Attribute-Based Authenticated Key Exchange Protocolwith General Relations
q Concurrent Non-malleable Statistically Hiding Commitment
Papers by Author
Wang, Hong
q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimization
Wang, Huimei
q Testing Anti-denial of Service Attacks Based on Mobile Agent
Wang, Ji He
q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level
Wang, Jianxin
q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process
Papers by Author
Wang, Jie
q A Rational Secret Sharing Scheme Based on Repeated Game
Wang, Jing
q A Neural Network for a Class of Horizontal LinearComplementary Problems
Wang, Jingyi
q Exponentially Synchronization of Stochastic ComplexNetworks with Time-varying Delays and Switching Topologyvia Pinning Control
q On Cluster Synchronization for Linearly Coupled ComplexNetworks
Papers by Author
Wang, Li
q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor
Wang, Lian Hai
q Evaluating the Effect of Loading Forensic Tools on the VolatileMemory for Digital Evidences
Wang, Liangmin
q Recovering Coverage Holes by Using Mobile Sensorsin Wireless Sensor Networks
Wang, Lihua
q Design and Implementation of Bus Net Routing Algorithm
Papers by Author
Wang, Lin
q Approximation Kernel 2DPCA by Mixture of Vector and MatrixRepresentation
Wang, Litao
q Analysis and Measurement on the ElectromagneticCompromising Emanations of Computer Keyboards
Wang, Mingqiang
q Attack on the Cryptosystem Based on DLP
Wang, Ning
q The Application of Graph Theory in Old Chinese PhonologyStudy
Papers by Author
Wang, Ping
q An Image Encryption and Authentication Scheme
Wang, Qiang
q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value Integral
Wang, Rong
q Soft-Voting Classification using Locally Linear Reconstructionq Normalizing Modularity Matrices for Data Clustering
Wang, Rongpei
q DBS Application to Chinese Adjectives
Papers by Author
Wang, Ruizhong
q Stock Selection Based on Data Clustering Method
Wang, Ruliang
q Adaptive Neural Control for a Class of Perturbed Time-delayNonlinear Systems
q Robust Adaptive Sliding Mode Control Design for a Classof Uncertain Neutral Systems with Distributed Delays
Wang, ShouYang
q Geometric Recognitions Models of Fault Characteristicsin Mobile Core Network
Papers by Author
Wang, Shuang
q A Boundary Detection Algorithm of Clusters based on DualThreshold Segmentation
Wang, Shuo
q Search Engine Optimization Based on Algorithm of BP NeuralNetworks
Wang, Taowen
q The Estimation of Mixing Matrix Based on Bernoulli-GaussianModel
Wang, Tzai Der
q Minimal Echo State Networks for Visualisation
Papers by Author
Wang, Wei
q Similarity Matching over Uncertain Time Series
Wang, Weiming
q Saliency-based Adaptive Scaling for Image Retargeting
Wang, Weiqiang
q Fast and Effectively Identify Pornographic Images
Wang, Xiaoli
q Energy-efficient Multi-task Scheduling Based on MapReducefor Cloud Computing
Papers by Author
Wang, Xing
q Analysis on Cloud Computing-based Logistics InformationNetwork Mode
Wang, Xin-Kuan
q MOEA/D with Uniform Design for the Multiobjective 0/1Knapsack Problem
Wang, Xu An
q K-times Proxy Re-encryptionq Proxy Re-encryption with Keyword Search from Anonymous
Conditional Proxy Re-encryption
Wang, Ya
q Design and Implementation of Bus Net Routing Algorithm
Papers by Author
Wang, Yaobin
q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation
Wang, Yi
q Streamline-based Visualization of 3D Explosion Fields
Wang, Yichuan
q PSO-BP Neural Network in Reservoir Parameter DynamicPrediction
Wang, Yilei
q 2-out-of-2 Rational Secret Sharing in Extensive Form
Papers by Author
Wang, Yingmin
q Obtaining the Resonant Frequency of the Bubble in the ShipWake by ANSYS
Wang, Yingying
q The Application of Neural Network in the Intelligent FaultDiagnosis System
Wang, Yong
q The Guidance and Control of Small Net-recovery UAV
Wang, Yuan
q A Fuzzy Portfolio Model Considering Transaction Costs
Papers by Author
Wang, Yuping
q A Hybrid Multiobjective Differential Evolution Algorithm Basedon Improved ε-Dominance
q Energy-efficient Multi-task Scheduling Based on MapReducefor Cloud Computing
q Uniform Design Based Hybrid Genetic Algorithmfor Multiobjective Bilevel Convex Programming
Wang, Zhiying
q Analytical Models for Data Dependence Violation Checkingin TLS
Wang, Ziqing
q K-times Proxy Re-encryption
Papers by Author
q Proxy Re-encryption with Keyword Search from AnonymousConditional Proxy Re-encryption
Wang-da, Chen
q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile Communications
Wei, Dali
q Inertia Weight Particle Swarm Optimization with BoltzmannExploration
Wei, Lu
q A Model Driven Approach for Self-Healing Computing System
Papers by Author
Wei, Wang
q A Data Distribution Platform Based on Event-DrivenMechanism
Wei-dong, Yang
q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc Networks
Weihe, Chen
q Research of Access Control in Electronic Medical RecordBased on UCON
Weiqiang, Zhang
q The Iterative Regularization Method Based on ImageDecomposition Model
Papers by Author
Weitao, Ha
q The Design of Cooperative Intrusion Detection System
Wei-wei, Liu
q Improving Privacy of Property-based Attestation withouta Trusted Third Party
Wen, Guihua
q Relative Local Mean Classifier with Optimized Decision Rule
Wen, Jiechang
q The Estimation of Mixing Matrix Based on Bernoulli-GaussianModel
Papers by Author
Wen, Rui
q The Finite Element Analysis of the Electromagnetic LevitationSystem Based on the Large Air Gap
Wencai, He
q VVCS: Verifiable Visual Cryptography Scheme
Wen-cai, He
q A Watermarking-based Visual Cryptography Schemewith Meaningful Shares
Wu, Daiwen
q The Application Study about Lucene in Document Retrievalfor Office
Papers by Author
Wu, Haibo
q Analysis of the Success Rate of the LLL Lattice BasisReduction
Wu, Honghua
q Similarity Matching over Uncertain Time Series
Wu, Jian
q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks
Wu, Jiawei
q Modeling the Uncertain Data in the K-anonymity PrivacyProtection Model
Papers by Author
Wu, Ji-Wei
q An Efficient Linear Text Segmentation Algorithm UsingHierarchical Agglomerative Clustering
Wu, Keke
q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis Attacks
Wu, Lihua
q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software Reliability
q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model Theory
Papers by Author
q Qualitative Modeling for Parallel Software System ReliabilityEvaluation
Wu, Liji
q Design and Implementation of an Electromagnetic AnalysisSystem for Smart Cards
q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor
Wu, Tiejun
q A Cloud Model Based Computational Intelligence Algorithmfor Parameter Identification of Chaotic Systems
Wu, Xiaochuan
q Minimal Echo State Networks for Visualisation
Papers by Author
Wu, Xiu Qiang
q Secure Data Aggregation Scheme for Clustered WirelessSensor Networks
Wu, Xuefei
q Global Synchronization of Hybrid Coupled Neural Networkswith Time-varying Delay
Wu, Yuan Sheng
q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level
Wu, Yunfang
q Improved Word Similarity Computation for Chinese UsingSub-word Information
Papers by Author
Wu, Zhongke
q Face Reconstruction from Skull Based on Partial LeastSquares Regression
Wu, Zong-Sheng
q Application of Cloud Storage in Traffic Video Detection
Xi, Houwei
q A Markov Chain-based Availability Model of Virtual ClusterNodes
Xi, Jianrong
q A Design and Implement of IPS Based on Snort
Papers by Author
Xia, Chunhe
q Design and Implementation of Bus Net Routing Algorithm
Xian, Ming
q Testing Anti-denial of Service Attacks Based on Mobile Agent
Xiang, Xu
q A Sybil-resilient Contribution Transaction Protocol
Xiao, Chuang-Bai
q A Security Model for Information Systems with Multi-levelSecurity
Papers by Author
Xiao, Fanyi
q Learning Local Binary Patterns with Enhanced Boostingfor Face Recognition
Xiao, Henghui
q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWB
Xiao-cong, Guo
q An Image Encryption Algorithm Based on Scramblingand Substitution Using Hybrid Chaotic Systems
Xiaofang, Guo
q A Hybrid Simplex Multi-objective Evolutionary Algorithm Basedon Preference Order Ranking
Papers by Author
Xiaohua, Chen
q A Genetic Algorithm Based on a New Fitness Functionfor Constrained Optimization Problem
Xiaoli, Sun
q The Iterative Regularization Method Based on ImageDecomposition Model
Xiao-li, Sun
q A Secondary Image Denoising Model Based on the LocalEnergy Operator
Xiaoni, Cheng
q VVCS: Verifiable Visual Cryptography Scheme
Papers by Author
Xiao-ni, Cheng
q A Watermarking-based Visual Cryptography Schemewith Meaningful Shares
Xiao-ya, Li
q An Optimal Architecture of Middle Agents in Multi-AgentSystems
Xie, Guo
q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPS
Xie, Min
q An Identity-based Secure Routing Protocol in WSNs
Papers by Author
Xie, W.X.
q Monitoring the PSO Process Based on Fuzzy RandomVariables
Xie, Xiaolong
q Analysis of Abnormal Events in IMS and Research onthe Strategy of Detection
Xie, Yongming
q Saliency-based Adaptive Scaling for Image Retargeting
Xi-hong, Wu
q Performance Analysis of the Single Pattern MatchingAlgorithm Based on Prefix Searching
Papers by Author
Xin, Gao
q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System
Xin, SiYuan
q Property-Based Remote Attestation Oriented to CloudComputing
Xin, Wan
q Hierarchical ID-Based Blind Signature from Lattices
Xingbao, Wang
q Pedestrian Recognition Based on Saliency Detectionand Kalman Filter Algorithm in Aerial Video
Papers by Author
Xinghua, Yang
q A Spam Filtering Method Based on Multi-modal FeaturesFusion
Xing-lan, Zhang
q Improving Privacy of Property-based Attestation withouta Trusted Third Party
Xining, Cui
q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework
Xin-Ping, Liu
q A Real Time Multi-Scale Correlation Analysis Method andits Application on the Data Mining in Thermodynamic Process
Papers by Author
Xiong, Shuming
q Recovering Coverage Holes by Using Mobile Sensorsin Wireless Sensor Networks
Xu, Bingxin
q Sparse Representation for Multi-Label Image Annotation
Xu, C.
q Monitoring the PSO Process Based on Fuzzy RandomVariables
q Time Series Forecasting Method Based on Huang Transformand BP Neural Network
Xu, Chao
q Multi-Side Multi-Instance Algorithm
Papers by Author
q A New Scheme for Information Hiding Based on DigitalImages
Xu, Chen
q Global Synchronization of Hybrid Coupled Neural Networkswith Time-varying Delay
q The Multispectral Image Edge Detection Based on CliffordGradient
Xu, Guoqing
q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis Attacks
Xu, Jianfeng
q Certificateless Broadcast Signcryption with Forward Secrecy
Papers by Author
Xu, Jing
q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks
Xu, Jun
q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor
Xu, Kaiying
q Search Engine Optimization Based on Algorithm of BP NeuralNetworks
Xu, Kang
q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation
Papers by Author
Xu, Lu
q FBctlr - A Novel Approach for Storage PerformanceVirtualization
Xu, Pengfei
q A General Edge Detection Method Based on the ShearTransform
Xu, Qiuliang
q 2-out-of-2 Rational Secret Sharing in Extensive Formq A New Cross-realm Group Password-based Authenticated
Key Exchange Protocolq Attribute-Based Authenticated Key Exchange Protocol
with General Relations
Papers by Author
q Concurrent Non-malleable Statistically Hiding Commitment
Xu, Wu
q Stochastic Modeling File Population in P2P Network
Xu, Xinsheng
q Multiobjective Interaction Programming for Two-Persons
Xu, Xirong
q An Important Property about Vertex Distance of CrossedCubes CQn
Xu, Xu
q An Intelligent Vehicle Monitoring System Based on Internetof Things
Papers by Author
Xu, Yiping
q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar Field
Xu, Zhengzheng
q A Wavelet-Based Detection Approach to Traffic Anomalies
Xuan, Wang
q A Novel Hash-based RFID Mutual Authentication Protocol
Xue, Lifang
q Speech Feature Analysis Using Temporal Linear Embedding
Xue, Ru
q Application of Cloud Storage in Traffic Video Detection
Papers by Author
Xue, Zhou
q Fast Iris Boundary Location Based on Window MappingMethod
Xueming, Tang
q Hierarchical ID-Based Blind Signature from Lattices
Xunxun, Shen
q Multi-Undeniable Signature Schemes
Yafen, Shen
q Reliability Analysis of System-in-the-Loop Network PlatformBased on Delays
Papers by Author
Yahui, Li
q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework
Yameng, Cheng
q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework
Yan, Shenhai
q Schistosoma Cercariae Image Recognition via SparseRepresentation
Yanchun, Guo
q A Lower Bound for the Smarandache Function Value
Papers by Author
Yanfei, Yu
q Simulation of Influence of Desired Velocity Distributionand Herd Effect on Pedestrian Evacuation
Yang, Aijun
q Data Mining Technique in the Internal Auditing of EnterpriseGroups
Yang, Bo
q Communities Detection with Applications to Real-WorldNetworks Analysis
Yang, Chao
q Optimization of Vehicle Routing Problem Based on Max-MinAnt System with Parameter Adaptation
Papers by Author
q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model
q An Automated Black-box Testing Approach for WSN SecurityProtocols
Yang, Dan
q Analysis of the Authentication Protocols Based on GameTheory
Yang, Fei
q An Interactive Charge Scheme with Rewardand Non-repudiation for Wireless Mesh Network
Yang, Jianhui
q A Fuzzy Portfolio Model Considering Transaction Costs
Papers by Author
q Research on Characteristics of Plates on Chinese StockMarket
q Dynamic Risk Measurement of Futures based on WaveletTheory
Yang, Jun-jie
q A Weighted K-hyperline Clustering Algorithm for Mixing MatrixEstimation on Bernoulli-Gaussian Sources
Yang, Shiying
q An Implementation Method for Converting the Erhu Musicfrom Wav to Mid
Papers by Author
Yang, Ting
q A Trivariate Polynomial-based Dynamic Key ManagementScheme for Wireless Sensor Networks
q Optimized Approach for Computing Multi-base Chains
Yang, Xiaoping
q Measuring Semantic Relatedness between Words UsingLexical Context
Yang, Xing
q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability Matrix
Papers by Author
Yang, Yajuan
q Multi-Agents Model Analysis for the Evolution of IndustrialClusters
Yang, Yang
q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive Text
Yang, Yifang
q SVM Combined with FCM and PSO for Fuzzy Clustering
Yang, Zheng
q A Saliency Detection Model Based on Multi-feature Fusion
Papers by Author
Yanhui, Zhao
q Multi-Undeniable Signature Schemes
Yanli, Wang
q Multi-user Detection Method for MIMO-OFDM UplinkTransmission
Yanqiong, Zhu
q Security Authentication Scheme Based on CertificatelessSignature and Fingerprint Recognition
Yan-xin, Shi
q Adaptive Filter for Color Impulsive Removal Based on the HSIColor Space
Papers by Author
Yanyan, Han
q VVCS: Verifiable Visual Cryptography Scheme
Yan-yan, Han
q A Watermarking-based Visual Cryptography Schemewith Meaningful Shares
Yao, Cheng
q A Wavelet-Based Detection Approach to Traffic Anomalies
Yao, Junping
q A Novel Group Signature Scheme Based on NTRU
Yi, Ji
q A Saliency Detection Model Based on Multi-feature Fusion
Papers by Author
Yi, XiusHuang
q Speech Feature Analysis Using Temporal Linear Embedding
Yian, Zhu
q A Model Driven Approach for Self-Healing Computing System
Yifang, Yang
q A Lower Bound for the Smarandache Function Value
Yin, Qian
q Software Fault Prediction Framework Based onaiNet Algorithm
Papers by Author
Yin, Xinchun
q A Trivariate Polynomial-based Dynamic Key ManagementScheme for Wireless Sensor Networks
q Optimized Approach for Computing Multi-base Chains
Yin, XuCheng
q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis Attacks
Yinyan, Yu
q Research on Access Control Mechanism for Digital ProductsTrading
Yiqiu, Fang
q Architecture for Component Library Retrieval on the Cloud
Papers by Author
Yisheng, Xue
q A Blakley Secret Sharing Scheme without Trusted ShareDistributed Center
Yong, Xu
q Stochastic Modeling File Population in P2P Network
Yonglin, Min
q Simulation of Influence of Desired Velocity Distributionand Herd Effect on Pedestrian Evacuation
Yong-mao, Cheng
q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile Communications
Papers by Author
Yong-mei, Cheng
q Adaptive Filter for Color Impulsive Removal Based on the HSIColor Space
Yongquan, Cui
q Hierarchical ID-Based Blind Signature from Lattices
Yong-xian, Wang
q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network
YongZhao, Zhan
q Research of Access Control in Electronic Medical RecordBased on UCON
Papers by Author
You, Xinge
q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge Cue
q Clustering Based Image Denoising Using SURE-LET
Youju, Qi
q The Construction and Application of Distance and OpenExperimental Platform
Yu, Bin
q Analysis and Measurement on the ElectromagneticCompromising Emanations of Computer Keyboards
Yuan, Chen Xing
q An Access Control Mode Based on Information Flow Graph
Papers by Author
Yuan-lei, Li
q Spares Consumption Quota Model Based on BP NeuralNetwork
Yuan-xin, Liang
q Robust Stability for Uncertain Neutral Systemswith Time-varying and Distributed Delays
Yue, Xiaoli
q Similarity Matching over Uncertain Time Series
Yue-lin, Gao
q Improved Differential Evolution Algorithm with AdaptiveMutation and Control Parameters
Papers by Author
Yulong, Shen
q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks
q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework
Yun, Ling
q Application of the PSO-SVM Model for Credit Scoring
Yun-yuan, Dong
q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network
Papers by Author
Yu-xiang, Yang
q Closed-loop Supply Chain Network Horizontal IntegrationProblem
Zan, Hongying
q Inducing Chinese Selectional Preference Based on HowNet
Zeng, Qian
q Differential Energy Watermarking Based on Macro-blockPrediction
Zeng, Wenyi
q An Improvement of Comprehensive Evaluation Model
Papers by Author
Zeng, Wu
q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge Cue
q Clustering Based Image Denoising Using SURE-LET
Zeng, Xiantie
q Spatial Prediction of Dissolved Organic Carbon Using GISand ANN Modeling in River Networks
Zeng, Xiaoqin
q An Improved ID3 Based on Weighted Modified InformationGain
Papers by Author
Zeng, Yong
q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model
q An Automated Black-box Testing Approach for WSN SecurityProtocols
Zhai, Wenhua
q An Important Property about Vertex Distance of CrossedCubes CQn
Zhan, Gao
q Security Authentication Scheme Based on CertificatelessSignature and Fingerprint Recognition
Papers by Author
Zhan, Tao
q Co-Z Addition Operation of Hessian Curve
Zhan-fang, Zhao
q A Line-up Competition Differential Evolution Algorithm forthe Generalized Assignment Problem
Zhang, Chenghui
q Experimental Study the Measurement of Acoustic Wave FlightTime under Strong Noise in the Boiler
Zhang, Feng
q Multi-objective Optimization of Bus Dispatching Basedon Improved Genetic Algorithm
Papers by Author
Zhang, Hong
q Co-op Advertising Analysis within a Supply Chain Basedon the Product Life Cycle
Zhang, Hua
q Application of the PSO-SVM Model for Credit Scoring
Zhang, Jing
q Relative Stability of Solution for Hua’s Macroeconomic Model
Zhang, Jinjie
q Relative Stability of Solution for Hua’s Macroeconomic Model
Papers by Author
Zhang, Jun Wei
q FBctlr - A Novel Approach for Storage PerformanceVirtualization
Zhang, Lai-shun
q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm Setting
Zhang, Liumei
q PSO-BP Neural Network in Reservoir Parameter DynamicPrediction
Zhang, Manrui
q Multiresolution Streamline Placement for 2D Flow Fields
Papers by Author
Zhang, Ning
q A Simple But Effective Stream Maximal Frequent ItemsetMining Algorithm
Zhang, Peng
q A Wavelet-Based Detection Approach to Traffic Anomalies
Zhang, Qing Xiang
q Optimality Conditions for Fractional Programming with B (p,r, a) Invex Functions
Zhang, Quan-ju
q Artificial Neural System Method for Solving NonlinearProgramming with Linear Equality Constraints
Papers by Author
Zhang, Rui
q An Improved Software Reliability Model Considering FaultCorrection Rate
Zhang, Tao
q A Markov Chain-based Availability Model of Virtual ClusterNodes
Zhang, W.Q.
q Time Series Forecasting Method Based on Huang Transformand BP Neural Network
Zhang, Wei-ming
q Action-Seeking Team Coordination for Unmanned VehiclesTeam Planning
Papers by Author
Zhang, Wenyao
q Multiresolution Streamline Placement for 2D Flow Fieldsq Streamline-based Visualization of 3D Explosion Fields
Zhang, Xiang Min
q Design and Implementation of an Electromagnetic AnalysisSystem for Smart Cards
Zhang, Xiangmin
q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor
Papers by Author
Zhang, Xiumin
q Contours-Matching in Building Reconstruction from a SingleImage
Zhang, Ya Di
q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks
Zhang, Yan-ping
q A Maximal Clique Partition Method for Network Basedon Granularity
q Multi-Side Multi-Instance Algorithmq Research on the Maximum Flow in Large-scale Network
Papers by Author
q A New Scheme for Information Hiding Based on DigitalImages
Zhang, Yong
q Search Engine Optimization Based on Algorithm of BP NeuralNetworks
Zhang, Yongfu
q Construction of Overflow Attacks Based on Attack Elementand Attack Template
Zhang, Yuan
q A Maximal Clique Partition Method for Network Basedon Granularity
q Research on the Maximum Flow in Large-scale Network
Papers by Author
q Analysis of the Authentication Protocols Based on GameTheory
Zhang, Zhijun
q New Heuristic Algorithm of RNA Secondary StructurePrediction with Pseudoknots
Zhao, Gaochang
q Predictions for Coal Spontaneous Combustion Stage Basedon an Artificial Neural Network
Zhao, Hengbo
q Active Contours with Adaptively Normal Biased GradientVector Flow External Force
Papers by Author
Zhao, Lei
q Qualitative Analysis for a Kind of Predator-Prey Modelof Holling III-Function Response with Nonlinear DensityDependent
Zhao, Lingzhong
q A Comparative Study on Appending Priority Relations of Rulesin BDI-Based Agent Model
Zhao, Na
q An Improvement and a New Design of Algorithms for Seekingthe Inverse of an NTRU Polynomial
Papers by Author
Zhao, Pei
q Marshmallow: A Content-Based Publish-Subscribe Systemover Structured P2P Networks
Zhao, Ruimin
q Parabolic Adjustment of Image Clearness Algorithm Basedon Retinex Theory
Zhao, Shu
q Multi-Side Multi-Instance Algorithm
Zhao, Wei
q Analysis of the Impact of Polarization Mode Dispersionon Optical Fiber Communication
Papers by Author
Zhao, WeiDong
q Simplified Business Process Model Mining Basedon Structuredness Metric
Zhao, Xiufeng
q A New Cross-realm Group Password-based AuthenticatedKey Exchange Protocol
Zhao, Yanbo
q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWB
Papers by Author
Zhao, Yi
q Exponentially Synchronization of Stochastic ComplexNetworks with Time-varying Delays and Switching Topologyvia Pinning Control
q On Cluster Synchronization for Linearly Coupled ComplexNetworks
Zhao, Yinghai
q Image Scrambling Based on Chaos Theory and VigenèreCipher
Zhao, Yong
q Property-Based Remote Attestation Oriented to CloudComputing
Papers by Author
Zhao, Zhi-qing
q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value Integral
Zhaohui, Wang
q A Saliency Detection Model Based on Multi-feature Fusion
Zheng, Wei-wei
q Qualitative Analysis for a Kind of Predator-Prey Modelof Holling III-Function Response with Nonlinear DensityDependent
Zheng, Xi
q An Improved Software Reliability Model Considering FaultCorrection Rate
Papers by Author
Zheng, Xin
q Contours-Matching in Building Reconstruction from a SingleImage
Zheng-hua, Wang
q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network
Zhenglian, Su
q Improving the Performance of Personalized Recommendationwith Ontological User Interest Model
Papers by Author
Zhenqiu, Liang
q Research of Blocking Factor Combined with Improved AntColony Algorithm in VRP
Zhi-Liang, Wang
q Research of Rapid Attention-Information Extractionin Human-Robot Interaction
Zhiming, Wang
q Cooperative Neural Network Background Modelfor Multi-Modal Video Surveillance
Zhong, Hong
q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional Space
Papers by Author
Zhong, Sheng
q Co-op Advertising Analysis within a Supply Chain Basedon the Product Life Cycle
Zhong, WeiDong
q Proxy Re-encryption with Keyword Search from AnonymousConditional Proxy Re-encryption
Zhou, Gengui
q Multiobjective Interaction Programming for Two-Persons
Zhou, Long
q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge Cue
q Clustering Based Image Denoising Using SURE-LET
Papers by Author
Zhou, Mingquan
q Face Reconstruction from Skull Based on Partial LeastSquares Regression
Zhou, Wengang
q A Novel Two-stage Analysis Method for Customer’sRequirement
Zhou, Xiuling
q Approximation Kernel 2DPCA by Mixture of Vector and MatrixRepresentation
Zhu, Cheng
q Action-Seeking Team Coordination for Unmanned VehiclesTeam Planning
Papers by Author
Zhu, Daming
q New Heuristic Algorithm of RNA Secondary StructurePrediction with Pseudoknots
Zhu, Hai
q A General Edge Detection Method Based on the ShearTransform
q A Novel Two-stage Analysis Method for Customer’sRequirement
Zhu, Haiping
q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive Text
Papers by Author
Zhu, Kai
q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum Reservoir
q The Application of Binary Particle Swarm Algorithm in FaceRecognition
Zhu, Ming
q Promotion Analysis Based on Fitting in Multi-Level Space
Zhu, Ning
q Construction of Overflow Attacks Based on Attack Elementand Attack Template
Zhu, Sencun
q Multi-jammer Localization in Wireless Sensor Networks
Papers by Author
Zhu, ShiSong
q Knowledge Discovery Method from Abnormal Monitoring Data
Zhu, Tanchao
q Saliency-based Adaptive Scaling for Image Retargeting
Zhu, Xiaoyan
q Security Analysis of Some Recent Authentication Protocolsfor RFID
Zhu, Xinshan
q Novel Quantization Watermarking Based on Random AngleModulation
Papers by Author
Zong-ji, Li
q The Simulation of Trajectory for Homing Depth ChargeAttacking the Submarine with Different Guide Orderliness
Zou, Chun-hua
q Certificateless Broadcast Signcryption with Forward Secrecy
Zuo, Yanfei
q Similarity Matching over Uncertain Time Series
Zuoshun, Wu
q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks