2011 Seventh International Conference on Computational Intelligence … · The Seventh...

344
Sanya, Hainan, China 3-4 December 2011 Sponsors: CIS 2011 The Seventh International Conference on Computational Intelligence and Security Conference Information Papers by Session Papers by Author Getting Started Search Trademarks

Transcript of 2011 Seventh International Conference on Computational Intelligence … · The Seventh...

Sanya, Hainan, China3-4 December 2011

Sponsors:

CIS 2011The Seventh International Conference on

Computational Intelligence and Security

Conference InformationPapers by SessionPapers by AuthorGetting StartedSearchTrademarks

Conference Information

2011 Seventh International Conference on Computational Intelligence and Security

q Prefaceq Conference Organizationq Program Committeeq Reviewersq Title Page (Book version)q Copyright Page (Book version)q Table of Contents (Book version)q Author Index (Book version)q Publisher’s Information (Book version)

Sessions

q Intelligent Computationq Intelligent Systems and Complex Systemsq Neural Networks and Neural Systemsq Learning Algorithmsq Information Security, Computer Security and Intergrityq Security Methodologies and Managementq Network & Wireless Securityq Authentication and Authorizationq Cryptography and Cryptanalysisq Access Control and Protectionq Pattern Recognithion and Knowledge Discoveryq Data Mining

Sessions (cont.)

q System Analysis and Modeling

Papers by Session

Intelligent Computation

q A Cloud Model Based Computational Intelligence Algorithmfor Parameter Identification of Chaotic SystemsJunfeng Chen and Tiejun Wu

q A Genetic Algorithm Based on a New Fitness Functionfor Constrained Optimization ProblemDalian Liu, Du Jinling, and Chen Xiaohua

q A Genetic Algorithm Based on Duality for Linear BilevelProgramming ProblemsHeCheng Li

q A Heuristic Genetic Process Mining AlgorithmJiafei Li, Jihong OuYang, Jiafei Li, Jihong OuYang, and Mingyong Feng

q A Hybrid Method for Solving Global Optimization ProblemsJinhua Li and Jie Liu

Papers by Session

q A Hybrid Multiobjective Differential Evolution Algorithm Basedon Improved ε-DominanceNing Dong and Yuping Wang

q A Hybrid Simplex Multi-objective Evolutionary Algorithm Basedon Preference Order RankingGuo Xiaofang

q A Line-up Competition Differential Evolution Algorithm forthe Generalized Assignment ProblemMa Li-Xiao, Zhao Zhan-fang, and Chen Shu-qing

q A New Filled Function Algorithm for Constrained GlobalOptimization ProblemsLiu Jie

q A New Improved Particle Swarm Optimization AlgorithmYuhong Duan and Yulin Gao

q Application of the PSO-SVM Model for Credit ScoringLing Yun, Qiu-yan Cao, and Hua Zhang

Papers by Session

q Approximate Solution of Fuzzy Sylvester Matrix EquationsXiao-Bin Guo

q Energy-efficient Multi-task Scheduling Based on MapReducefor Cloud ComputingXiaoli Wang and Yuping Wang

q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction NetworkDong Yun-yuan, Yang Jun, Liu Qi-jun, Wang Yong-xian, and Wang Zheng-hua

q Glowworm Swarm Optimization Algorithm for SolvingMulti-constrained QoS Multicast Routing ProblemHe Deng-xu, Zhu Hua-Zheng, and Liu Gui-qing

q Hybrid Genetic Algorithm for TSPLai Nian and Zheng Jinhua

Papers by Session

q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimizationBen Niu, Hong Wang, Lijing Tan, and Li Li

q Improved Differential Evolution Algorithm with AdaptiveMutation and Control ParametersLi Hui-rong, Gao Yue-lin, Li Chao, and Zhao Peng-jun

q Improvement of the MapReduce Model Based on MessageMiddleware Oriented Data Intensive ComputingGe Junwei, Xian Jiang, and Yiqiu Fang

q Inertia Weight Particle Swarm Optimization with BoltzmannExplorationFeng Chen, Xinxin Sun, and Dali Wei

q MOEA/D with Uniform Design for the Multiobjective 0/1Knapsack ProblemYan-Yan Tan, Yong-Chang Jiao, and Xin-Kuan Wang

Papers by Session

q Monitoring the PSO Process Based on Fuzzy RandomVariablesJ.Q. Feng, C. Xu, and W.X. Xie

q Multi-objective Optimization of Bus Dispatching Basedon Improved Genetic AlgorithmJinling Du, ChunXiao Wang, and Feng Zhang

q New Heuristic Algorithm of RNA Secondary StructurePrediction with PseudoknotsZhenDong Liu, Zhijun Zhang, Zaixue Liu, and Daming Zhu

q Optimality Conditions for Fractional Programming with B (p,r, a) Invex FunctionsXiang You Li and Qing Xiang Zhang

q Phylogenetic Tree of DNA Sequences Constructed by a NewMethod-H CurveWu Shulei, Chen Huandong, and Li Dachao

Papers by Session

q PSO-BP Neural Network in Reservoir Parameter DynamicPredictionLiumei Zhang, Jianfeng Ma, Yichuan Wang, and Shaowei Pan

q Research of Blocking Factor Combined with Improved AntColony Algorithm in VRPLiang Zhenqiu

q Research on Nonlinear Predictive Control Rolling OptimizationStrategy Based on SAPSOZhou Bi-ying

q Researching on the Growth Operator SWFZIRS of GrowthEvolution AlgorithmsSun Shengjie, Zhong Sheng, and Zhang Baihai

q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless NetworksKai Peng, Jing Xu, Wei Liu, Xiaohui Chen, and Jian Wu

Papers by Session

q Sufficient Optimality Conditions and Duality for a MinmaxFractional ProblemJihong Jia

q The 0/1 Multi-objective Knapsack Problem Based on RegionalSearchWeiqi Chen, Zhifeng Hao, and Hailin Liu

q The Overview of Feature Selection Algorithms Based SwarmIntelligence and Rough SetSun Chengmin and Liu Dayou

q Uniform Design Based Hybrid Genetic Algorithmfor Multiobjective Bilevel Convex ProgrammingLiping Jia, Yuping Wang, and Lei Fan

Papers by Session

Intelligent Systems and Complex Systems

q 3G-based Remote Video Surveillance and Control Systemfor Facility AgricultureFengdan Lao and Guanghui Teng

q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software ReliabilityZiqiang Luo, Peng Cao, Shengquan Ma, and Lihua Wu

q A Comparative Study on Appending Priority Relations of Rulesin BDI-Based Agent ModelYou Li, Yuming Lin, and Lingzhong Zhao

q A Fuzzy Portfolio Model Considering Transaction CostsJianhui Yang and Yuan Wang

q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality SystemGao Xin, Jia Qingxuan, Hu Huan, Sun Hanxu, and Song Jingzhou

Papers by Session

q A Model Driven Approach for Self-Healing Computing SystemLu Wei, Zhu Yian, Ma Chunyan, and Zhang Longmei

q A Model of Emotional Agent Based on Granular ComputingJun Hu and Chun Guan

q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model TheoryZiqiang Luo, Peng Cao, Guochun Tang, and Lihua Wu

q A Practical Framework for Agent-Based Hybrid IntelligentSystemsChunsheng Li and Kan Li

q A QoS-based Self-adaptive Framework for OpenAPILingyan Sun, Shizhan Chen, Qixuan Liang, and Zhiyong Feng

q Action-Seeking Team Coordination for Unmanned VehiclesTeam PlanningJiang-feng Luo, Luo-hao Tang, Cheng Zhu, and Wei-ming Zhang

Papers by Session

q Adaptive Evaluation Model of Information Systemby Triangular Fuzzy NumberLiping Chen

q Algorithm of Distribution Estimation for Node Localizationin Wireless Sensor NetworkFu Cequn, Wu Shulei, and Zhong Sheng

q An Important Property about Vertex Distance of CrossedCubes CQnXirong Xu, Aihua Deng, and Wenhua Zhai

q An Improvement of Comprehensive Evaluation ModelWenyi Zeng and Shuang Feng

q An Intelligent Vehicle Monitoring System Based on Internetof ThingsHu Lingling, Li Haifeng, Xu Xu, and Li Jian

Papers by Session

q An Optimal Architecture of Middle Agents in Multi-AgentSystemsLi Xiao-ya and Yu Song-sen

q Belief Base Change on Implicant Sets: How to Give UpElements of a Belief Based on Literal LevelCamilla Schwind

q Communities Detection with Applications to Real-WorldNetworks AnalysisBo Yang

q Cooperative Neural Network Background Modelfor Multi-Modal Video SurveillanceWang Zhiming and Bao Hong

q Design of Intelligent Decision-making System in Multi-UUVFormation Control SimulationHan Hong, Kang Fengju, and Wang Shengjie

Papers by Session

q Discretization Based on Positive Domain and InformationEntropyZhao Juan, Wang Mingchun, Liu Kun, and Wang Can

q Exponentially Synchronization of Stochastic ComplexNetworks with Time-varying Delays and Switching Topologyvia Pinning ControlJingyi Wang, Jianwen Feng, and Yi Zhao

q FBctlr - A Novel Approach for Storage PerformanceVirtualizationLiu Liu, Zhen Han Liu, Lu Xu, and Jun Wei Zhang

q Global Prefetcher Aggressiveness Controlfor Chip-MultiprocessorLimin Han, Deyuan Gao, Xiaoya Fan, Liwen Shi, and Jianfeng An

q Iterative Learning Control of Double Servo Valve ControlledElectro Hydraulic Servo SystemYu Shaojuan and Song Junjun

Papers by Session

q Lifeline: Emergency Ad Hoc NetworkSe-Hang Cheong, Kai-Ip Lee, Yain-Whar Si, and Leong Hou U

q Marshmallow: A Content-Based Publish-Subscribe Systemover Structured P2P NetworksSheng Gao, Guohui Li, and Pei Zhao

q Multi-Agents Model Analysis for the Evolution of IndustrialClustersYajuan Yang and Lian Ren

q On Cluster Synchronization for Linearly Coupled ComplexNetworksYi Zhao, Jianwen Feng, and Jingyi Wang

q Optimization of Vehicle Routing Problem Based on Max-MinAnt System with Parameter AdaptationXia Liu, Chao Yang, and Xia Liu

Papers by Session

q Qualitative Modeling for Parallel Software System ReliabilityEvaluationZiqiang Luo, Peng Cao, Shengquan Ma, and Lihua Wu

q Real-time LOD Algorithm Based on Triangle CollapseOptimizationJun Chen and Xiong Shi

q Research of Rapid Attention-Information Extractionin Human-Robot InteractionGong Fei, Xie Lun, Li Nan, and Wang Zhi-Liang

q Robust Stability for Uncertain Neutral Systemswith Time-varying and Distributed DelaysLiang Yuan-xin

q Simulation of Influence of Desired Velocity Distributionand Herd Effect on Pedestrian EvacuationYu Yanfei and Min Yonglin

Papers by Session

q Software Fault Prediction Framework Based onaiNet AlgorithmQian Yin, Ruiyi Luo, and Ping Guo

q Study on Friction Coefficient Mechanism Model of TandemCold Mill in Unstable ConditionHao Peifeng

q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value IntegralSheng-quan Ma, Fu-chuan Chen, Qiang Wang, and Zhi-qing Zhao

q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient PruningYao Lu, Gang Liu, Wei Chen, and Jesper Olsen

q Weak-pseudo-R0 AlgebrasYong-lin Liu and Xiao-bo Cai

Papers by Session

Neural Networks and Neural Systems

q A Neural Network for a Class of Horizontal LinearComplementary ProblemsXingbao Gao and Jing Wang

q Adaptive Neural Control for a Class of Perturbed Time-delayNonlinear SystemsRuliang Wang and Jie Li

q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum ReservoirKai Zhu, Huaguang Song, Jinzhu Gao, and Guojian Cheng

q Artificial Neural System Method for Solving NonlinearProgramming with Linear Equality ConstraintsQuan-ju Zhang

Papers by Session

q Existence and Global Attractivity of Almost Periodic Solutionof Hopfield Neural Networks with Time DelaysYanshuang Meng

q Global Synchronization of Hybrid Coupled Neural Networkswith Time-varying DelayXuefei Wu and Chen Xu

q Minimal Echo State Networks for VisualisationTzai Der Wang, Xiaochuan Wu, and Colin Fyfe

q Predictions for Coal Spontaneous Combustion Stage Basedon an Artificial Neural NetworkGaochang Zhao

q Search Engine Optimization Based on Algorithm of BP NeuralNetworksShuo Wang, Kaiying Xu, Yong Zhang, and Fei Li

q Spares Consumption Prediction Based on BP Neural NetworkGuo Feng, Liu Chen-yu, Zhang Su-qin, and Zhou Bin

Papers by Session

q Spares Consumption Quota Model Based on BP NeuralNetworkLiu Chen-yu, Guo Feng, Li Yuan-lei, and Zhang Su-qin

q Spatial Prediction of Dissolved Organic Carbon Using GISand ANN Modeling in River NetworksYingchun Fu, Xiantie Zeng, and Xueyu Lu

q Stability Analysis of Neutral-type Fuzzy Neural Networkswith Distributed DelaysShujun Long and Liping Jia

q The Application of Neural Network in the Intelligent FaultDiagnosis SystemMing Chang, Hongwei Chen, Yingying Wang, Yueou Ren, and Hao Kang

Papers by Session

Learning Algorithms

q A Maximal Clique Partition Method for Network Basedon GranularityYan-ping Zhang, Xiao-yan Chen, Bo Hua, and Yuan Zhang

q A Spam Filtering Method Based on Multi-modal FeaturesFusionFeng Huamin, Yang Xinghua, Liu Biao, and Jiang Chao

q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive TextHaiping Zhu, Yan Chen, Yang Yang, and Chao Gao

q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural LevelBing Guo, Yan Shen, Xiao Bin Liu, Qi Li, Ji He Wang, and Yuan Sheng Wu

Papers by Session

q An Error Bound for Eigenvalues of Graph Laplacianwith Bounded Kernel FunctionYong Liu and Shizhong Liao

q An Improved Software Reliability Model Considering FaultCorrection RateZhao Liu, Rui Zhang, Denghua Mei, and Xi Zheng

q Class-Incremental Kernel Discriminative Common VectorsYunhui He

q Dynamic Fuzzy Semisupervised Multitask LearningMeiyin Dai and FanZhang Li

q Feature Selection Algorithm Based on the CommunityDiscoveryXiaoqiang Jia

q Improved Word Similarity Computation for Chinese UsingSub-word InformationPeng Jin, John Carroll, Yunfang Wu, and Diana McCarthy

Papers by Session

q Multi-Side Multi-Instance AlgorithmShu Zhao, Chao Xu, Yan-ping Zhang, and Jun Ma

q Probabilistic Trajectory Modeling of Flight Vehicles Basedon Parameter DeviationsChangqing Liu and Wencai Luo

q Reinforcement Learning for the N-Persons Iterated Prisoners’DilemmaJ. Enrique Agudo and Colin Fyfe

q Relative Local Mean Classifier with Optimized Decision RuleGuihua Wen and Lijun Jiang

q Research on the Maximum Flow in Large-scale NetworkYan-ping Zhang, Bo Hua, Juan Jiang, Yuan Zhang, and Xiao-yan Chen

q The Application of Graph Theory in Old Chinese PhonologyStudyJiaJia Hu and Ning Wang

Papers by Session

q The Estimation Algorithm of Laplacian Eigenvalues forthe Tangent BundleMengxuan Dong and FanZhang Li

q Time Series Forecasting Method Based on Huang Transformand BP Neural NetworkW.Q. Zhang and C. Xu

Papers by Session

Information Security, Computer Security and Intergrity

q A Digital Watermarking Algorithm Based on Wavelet PacketTransform and BP Neural NetworkQiao Baoming, Zhang Pulin, and Kang Qiao

q A Markov Chain-based Availability Model of Virtual ClusterNodesJianhua Che, Tao Zhang, Weimin Lin, and Houwei Xi

q A New Scheme for Information Hiding Based on DigitalImagesYan-ping Zhang, Juan Jiang, Chao Xu, Bo Hua, and Xiao-yan Chen

q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack ModelYue Qi, Qingqi Pei, Yong Zeng, Chao Yang, and Shu-po Bu

Papers by Session

q A Study on IT-security Vocabulary for Domain DocumentClassificationQian Liping and Wang Lidong

q Achieving Distributed System Information SecuritySalvatore Distefano and Antonio Puliafito

q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc NetworksWang Ke, Yang Wei-dong, Liu Ji-Zhao, and Zhang Dan-tuo

q Architecture for Component Library Retrieval on the CloudGe Junwei, Tao Cong, and Fang Yiqiu

q Construction of Overflow Attacks Based on Attack Elementand Attack TemplateNing Zhu, XingYuan Chen, and Yongfu Zhang

q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor NetworksShen Yulong, Xi Ning, Pei Qingqi, Ma Jianfeng, Xu Qijian, and Wu Zuoshun

Papers by Session

q Fingerprint Composition-Feature Extraction Using DirectionalFilter BanksLi Chao Rong, Huang Ming Qing, and Li Jianping

q Image Scrambling Based on Chaos Theory and VigenèreCipherShanshan Li and Yinghai Zhao

q Improving Privacy of Property-based Attestation withouta Trusted Third PartyZhang Xing-lan and Liu Wei-wei

q Information Hiding Algorithm Based on Stentiford VisualAttention ModelJie Ling, Ju Liu, Jiande Sun, Jianping Qiao, Feng Wang, and Feng Feng

q Model Composition and Generating Tests for WebApplicationsBo Song, Shengwen Gong, and Shengbo Chen

Papers by Session

q Modeling and Simulating the Propagation of UnstructuredPeer-to-Peer WormsXiang Fan, William W. Guo, and Mark Looi

q Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlowHe Qi and Li Huifang

q Orthogonal Test Algorithm on TD-SCDMA NetworkOptimizationHua Huang and Yuan Ding

q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability MatrixXing Yang, Yubao Liu, Zhan Li, and Jiajie Mo

q Researches and Simulations of Information Hiding in AlamoutiTransmission SystemLiquan Chen, Miao Lu, and Jingbo Chen

q Testing Anti-denial of Service Attacks Based on Mobile AgentHuimei Wang, Ming Xian, and Guoyu Wang

Papers by Session

q The AES Encryption and Decryption Realization Basedon FPGALuan Lan

q The Implementation of Trust Model in the P2P PatchDistribution SystemJihai Huang, Yu Su, and Min Cao

Papers by Session

Security Methodologies and Management

q A Blakley Secret Sharing Scheme without Trusted ShareDistributed CenterXue Yisheng, Wu Shulei, and Chen Huandong

q A Rational Secret Sharing Scheme Based on Repeated GameJie Wang and Yong-quan Cai

q A Security Model for Information Systems with Multi-levelSecurityChao-Qin Gao and Chuang-Bai Xiao

q A Trivariate Polynomial-based Dynamic Key ManagementScheme for Wireless Sensor NetworksJianting Ning, Xinchun Yin, and Ting Yang

q A Trust-based Dynamic Secure Service Discovery Modelfor Pervasive ComputingFang Shen, Qingqi Pei, and Shu-po Bu

Papers by Session

q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC FrameworkCheng Yameng, Shen Yulong, Ma Jianfeng, Cui Xining, and Li Yahui

q Analysis and Measurement on the ElectromagneticCompromising Emanations of Computer KeyboardsLitao Wang and Bin Yu

q Analysis of the Success Rate of the LLL Lattice BasisReductionHaibo Wu and Shenghui Su

q Analysis of Wireless Mesh Network Security Based on NodeFunctionShuxin Liu, Jianhua Peng, and Caixia Liu

q Design and Implementation of an Electromagnetic AnalysisSystem for Smart CardsKun Gu, Liji Wu, Xiangyu Li, and Xiang Min Zhang

Papers by Session

q Modeling the Uncertain Data in the K-anonymity PrivacyProtection ModelJiawei Wu and Guohua Liu

q On the Representation and Querying of Sets of PossibleWorlds in the K-anonymity Privacy Protecting ModelJieYuan Li and Guohua Liu

q Security Analysis of Some Recent Authentication Protocolsfor RFIDBen Niu, Hui Li, Xiaoyan Zhu, and Chao Lv

Papers by Session

Network & Wireless Security

q A Bilinear Pairing-Based Key Management Schemefor Wireless Sensor NetworksRongrong Jiang and Tieming Chen

q A Configurable IPSec Processor for High Performance In-LineSecurity Network ProcessorYun Niu, Liji Wu, Li Wang, Xiangmin Zhang, and Jun Xu

q A Fast Handoff Method Based on RSSI and LQI in WirelessSensor NetworkZhang Miao and Li Jingying

q A Survey on Methods of Automatic Protocol ReverseEngineeringXiangDong Li and Li Chen

q A Sybil-resilient Contribution Transaction ProtocolXu Xiang

Papers by Session

q An Automated Black-box Testing Approach for WSN SecurityProtocolsShirui Ji, Qingqi Pei, Yong Zeng, Chao Yang, and Shu-po Bu

q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWBJiongCheng Li, Henghui Xiao, Xibin Lin, and Yanbo Zhao

q An Identity-based Secure Routing Protocol in WSNsWeichang Li, Hongning Li, Min Xie, and Shupo Bu

q An Interactive Charge Scheme with Rewardand Non-repudiation for Wireless Mesh NetworkChunling Wang and Fei Yang

q Analysis of Abnormal Events in IMS and Research onthe Strategy of DetectionXiaolong Xie, Xinsheng Ji, and Caixia Liu

Papers by Session

q Design of the DS-UWB Communication System Basedon Chaotic Variable Spreading FactorDong Li and Jiang Fei Bo

q Energy-efficient MAC Protocol Designed for Wireless SensorNetwork for IoTJun Hu, Zeng Ma, and Chunsheng Sun

q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile CommunicationsCheng Yong-mao, Chen Wang-da, Qu Hui, and Cai Tian-yi

q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless NetworksYa Hui Li, Wen Sheng Niu, Ya Di Zhang, Jian Feng Ma, and Yu Long Shen

q Multi-jammer Localization in Wireless Sensor NetworksTianzhen Cheng, Ping Li, and Sencun Zhu

q Query-Aware Anonymization in Location-Based ServiceWei Li, Guangye Li, and Chunlei Liu

Papers by Session

q Recovering Coverage Holes by Using Mobile Sensorsin Wireless Sensor NetworksFei Li, Shuming Xiong, and Liangmin Wang

q Reliability Analysis of System-in-the-Loop Network PlatformBased on DelaysShen Yafen, Chen Jiaxi, Yuan Jing, and Huang Ning

q Secure Data Aggregation Scheme for Clustered WirelessSensor NetworksJiang Hong Guo, Jian Feng Ma, and Xiu Qiang Wu

q Stochastic Modeling File Population in P2P NetworkFang Qun, Wu Xu, and Xu Yong

q The Design of Cooperative Intrusion Detection SystemZhang Guojun, Chen Liping, and Ha Weitao

q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health MonitoringHao Chen, Dingyi Fang, Xiaojiang Chen, Feng Chen, Xiaoqing Gong, and Lang Qin

Papers by Session

Authentication and Authorization

q A Design and Implement of IPS Based on SnortJianrong Xi

q A Novel Hash-based RFID Mutual Authentication ProtocolLi Huixian, Yin Ping, Wang Xuan, and Pang Liaojun

q An Application of Justification Logic to Protocol VerificationThomas Studer

q An Image Encryption and Authentication SchemeJing Qiu and Ping Wang

q Analysis of the Authentication Protocols Based on GameTheoryXinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, and Jianfeng Ma

q Design of a Digital Forensics Evidence Reconstruction Systemfor Complex and Obscure Fragmented File CarvingVrizlynn L.L. Thing, Tong-Wei Chua, and Ming-Lee Cheong

Papers by Session

q Evaluating the Effect of Loading Forensic Tools on the VolatileMemory for Digital EvidencesZhen Su and Lian Hai Wang

q Hierarchical ID-Based Blind Signature from LatticesChen Liang, Cui Yongquan, Tang Xueming, Hu Dongping, and Wan Xin

q Identity-based SIP Authentication and Key AgreementWu Shao Bo and Li Cheng Shu

q Obtaining the Resonant Frequency of the Bubble in the ShipWake by ANSYSZhang Qun and Yingmin Wang

q Security Authentication Scheme Based on CertificatelessSignature and Fingerprint RecognitionZhu Yanqiong, Xu Hui, and Gao Zhan

q Security Problems and Countermeasures with CommercialBanking Computer NetworksYunCheng Liu, Xingchun Sun, and Xiaoqin Mao

Papers by Session

q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy ProcessBaojing Cui, Ce Bian, Tao Guo, Yongle Hao, and Jianxin Wang

q Systematical Vulnerability Detection in Browser ValidationMechanismZeng Chufeng and Wang Qingxian

q The Analysis of Influence Factors of the Confidence Levelon University Students’ Network ShoppingJunfeng He and Hui Sun

q Traitor Tracing and Revocation Mechanismswith Privacy-PreservingYi Ding and Lei Fan

Papers by Session

Cryptography and Cryptanalysis

q 2-out-of-2 Rational Secret Sharing in Extensive FormYilei Wang and Qiuliang Xu

q A Construction of Balanced Odd-variable Boolean Functionwith Optimum Algebraic ImmunityYinDong Chen

q A New Cross-realm Group Password-based AuthenticatedKey Exchange ProtocolQing Dai, Xiufeng Zhao, Qiuliang Xu, and Han Jiang

q A Novel Group Signature Scheme Based on NTRUJunping Yao, Zefeng Dong, and Xinshe Li

q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional SpaceYong-long Luo, Chao Cheng, Cai-xia Chen, and Hong Zhong

Papers by Session

q A Watermarking-based Visual Cryptography Schemewith Meaningful SharesHan Yan-yan, Cheng Xiao-ni, and He Wen-cai

q Accelerating Block Cryptography Algorithms in ProcedureLevel SpeculationYaobin Wang, Hong An, Zhiqin Liu, Kang Xu, and Wanli Dong

q An ID-based (k, t, n) Threshold Group Signature SchemeWei Fu and Guang-liang Liu

q An Image Encryption Algorithm Based on Scramblingand Substitution Using Hybrid Chaotic SystemsXiang Fei and Guo Xiao-cong

q An Improved Signcryption with Proxy Re-encryption andits ApplicationCaifen Wang and Xiaojun Cao

Papers by Session

q An Improvement and a New Design of Algorithms for Seekingthe Inverse of an NTRU PolynomialNa Zhao and Shenghui Su

q Attack on the Cryptosystem Based on DLPXiaobo Feng and Mingqiang Wang

q Attribute-Based Authenticated Key Exchange Protocolwith General RelationsHao Wang, Qiuliang Xu, Han Jiang, and Rui Li

q Attribute-based Signcryption with Ciphertext-policyand Claim-predicate MechanismChangji Wang and Jiasen Huang

q Certificateless Broadcast Signcryption with Forward SecrecyMing Luo, Chun-hua Zou, and Jianfeng Xu

q Co-Z Addition Operation of Hessian CurveLeibo Li and Tao Zhan

Papers by Session

q Concurrent Non-malleable Statistically Hiding CommitmentRui Li, Qiuliang Xu, and Hao Wang

q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm SettingJing-feng Li, Wei-feng Guo, Lai-shun Zhang, and Yun-peng Li

q Differential Energy Watermarking Based on Macro-blockPredictionQian Zeng and Guorui Feng

q Efficient Password-Based Authenticated Key Exchangefrom LatticesYi Ding and Lei Fan

q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis AttacksKeke Wu, Huiyun Li, XuCheng Yin, and Guoqing Xu

Papers by Session

q Hierarchical Identity-based Broadcast Encryption Schemeon LatticesZhang Jinman and Chen Qin

q K-times Proxy Re-encryptionXu An Wang, Ziqing Wang, Yi Ding, and Shujun Bai

q Multi-Undeniable Signature SchemesShen Xunxun, Xu Maozhi, and Zhao Yanhui

q Novel Quantization Watermarking Based on Random AngleModulationXinshan Zhu and Shuoling Peng

q Optimized Approach for Computing Multi-base ChainsXinchun Yin, Ting Yang, and Jianting Ning

q Proxy Re-encryption with Keyword Search from AnonymousConditional Proxy Re-encryptionWeiDong Zhong, Xu An Wang, Ziqing Wang, and Yi Ding

Papers by Session

q VVCS: Verifiable Visual Cryptography SchemeHan Yanyan, Cheng Xiaoni, Yao Dong, and He Wencai

Papers by Session

Access Control and Protection

q A Generic Scheme for the Construction of ContextualSignatures with Hash Function in Intrusion DetectionYuxin Meng and Lam-for Kwok

q A New Approach for Adaptive Intrusion DetectionHassina Bensefia and Nacira Ghoualmi

q A Security API for Multimodal Multi-biometric ContinuousAuthenticationAdriana Esmeraldo de Oliveira and Gustavo Henrique Matos Bezerra Motta

q A Wavelet-Based Detection Approach to Traffic AnomaliesDingde Jiang, Peng Zhang, Zhengzheng Xu, Cheng Yao, and Wenda Qin

q An Access Control Mode Based on Information Flow GraphWang Chao, Chen Xing Yuan, and Li Na

Papers by Session

q An Enhanced Role-Based Access Control Mechanismfor Hospital Information SystemsChen-Guang He, Cun-Zhang Cao, and Shu-Di Bao

q Fast Network Traffic Anomaly Detection Based on IterationHua Jiang and Liaojun Pang

q Kernel-based Behavior Analysis for Android MalwareDetectionTakamasa Isohara, Keisuke Takemori, and Ayumu Kubota

q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors ClassifiersJozsef Hegedus, Yoan Miche, Alexander Ilin, and Amaury Lendasse

q Performance Analysis of the Single Pattern MatchingAlgorithm Based on Prefix SearchingWu Xi-hong

Papers by Session

q Property-Based Remote Attestation Oriented to CloudComputingSiYuan Xin, Yong Zhao, and Yu Li

q Research and Implementation of DPA-resistant SMS4 BlockCipherXiaoyi Duan, Ronglei Hu, and Xiu Ying Li

q Research of Access Control in Electronic Medical RecordBased on UCONJu JianGuo, Chen Weihe, and Zhan YongZhao

q Research on Access Control Mechanism for Digital ProductsTradingLi Fenghua, Yu Yinyan, Li Dongdong, and Zhang Jinghui

q Study on Role-Based Access Control with Time ConstraintZhenghong Liu, Yuhong Jia, and Tieli Sun

Papers by Session

q Using a Dynamic K-means Algorithm to Detect AnomalyActivitiesLi Han

Papers by Session

Pattern Recognithion and Knowledge Discovery

q A New Algorithm for Auto-Exposure Based on the AnalogyHistogramZhang Haifeng, Cao Jianzhong, Tang Linao, and Wang Huawei

q A Novel Subspace Discriminant Locality PreservingProjections for Face RecognitionWei He, Wen-Sheng Chen, and Bin Fang

q A Saliency Detection Model Based on Multi-feature FusionZheng Yang, Liu Chunping, Wang Zhaohui, Ji Yi, and Gong Shengrong

q A Secondary Image Denoising Model Based on the LocalEnergy OperatorXu Chen, Sun Xiao-li, and Li Min

q Active Contours with Adaptively Normal Biased GradientVector Flow External ForceHengbo Zhao and LiXiong Liu

Papers by Session

q Adaptive Filter for Color Impulsive Removal Based on the HSIColor SpaceShi Yan-xin and Cheng Yong-mei

q An Efficient Linear Text Segmentation Algorithm UsingHierarchical Agglomerative ClusteringJi-Wei Wu, Judy C.R. Tseng, and Wen-Nung Tsai

q Automatic Detection of Lumina in Mouse LiverImmunohistochemical Color Image Using Support VectorMachine and Cellular Neural NetworkWang Hui, Zhou Zhi Guo, and Jie Long Mei

q Automatic Parameter Determination Based on a ModifiedDiscriminant Criterion for Face RecognitionTaiquan Huang and Wen-Sheng Chen

q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge CueBaochuan Pang, Long Zhou, Wu Zeng, and Xinge You

Papers by Session

q Construction of a Bilingual Cognitive Property KnowledgebaseBin Li, Haibo Kuang, Xiaohe Chen, Xuri Tang, and Chen Chen

q Contours-Matching in Building Reconstruction from a SingleImageXin Zheng, Xiumin Zhang, Fuqing Duan, and Wei Liu

q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning AlgorithmsTae Rim Lee, Bon Min Goo, Hun Kim, and Sang Uk Shin

q Face Recognition with Statistical Local Line Binary PatternZheng-Chun Sun and Jian Cheng

q Face Reconstruction from Skull Based on Partial LeastSquares RegressionDonghua Huang, Fuqing Duan, Qingqiong Deng, Zhongke Wu, and Mingquan Zhou

q Fast and Effectively Identify Pornographic ImagesYanjun Fu and Weiqiang Wang

Papers by Session

q Fast Iris Boundary Location Based on Window MappingMethodYu Li and Zhou Xue

q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar FieldYiping Xu, Jing Tan, Hongping Li, and Yan Tian

q Image Quality Assessment Based on Binary StructureInformationChun-Hsien Chou and Yun-Hsiang Hsu

q Improving the Performance of Personalized Recommendationwith Ontological User Interest ModelSu Zhenglian, Yan Jun, Chen Haisong, and Zhang Jiaojiao

q Inducing Chinese Selectional Preference Based on HowNetYuxiang Jia, Hongying Zan, and Ming Fan

q Knowledge Discovery Method from Abnormal Monitoring DataShiSong Zhu, Liang Chen, and Shuhong Cao

Papers by Session

q Learning Local Binary Patterns with Enhanced Boostingfor Face RecognitionFanyi Xiao, YiXiong Liang, and Xiaohui Qu

q Level Set Region Based Image Segmentation Using LatticeBoltzmann MethodSouleymane Balla-Arabé, Bin Wang, and Xinbo Gao

q Local Reconstruction Error of l2 Norm for Discriminant FeatureExtractionYu Hou and Caikou Chen

q Multi-Level Kernel Machine for Scene Image ClassificationJunlin Hu and Ping Guo

q Multiresolution Streamline Placement for 2D Flow FieldsWenyao Zhang, Manrui Zhang, and Bo Sun

q Parabolic Adjustment of Image Clearness Algorithm Basedon Retinex TheoryWenZhang He, Rui Liu, and Ruimin Zhao

Papers by Session

q Pedestrian Detection Based on HOG-LBP FeatureGuolong Gan and Jian Cheng

q Pedestrian Recognition Based on Saliency Detectionand Kalman Filter Algorithm in Aerial VideoWang Xingbao, Liu Chunping, Liu Gong, Liu Long, and Gong Shengrong

q Research and Implementation on the Digital Medical ImageEnhancement Methods Based on Gradient Smoothand Context SmoothLiu Jing and Xiong Jie

q Research on Improved Greedy Algorithm for TrainReschedulingZhenhuan He

q Saliency-based Adaptive Scaling for Image RetargetingTanchao Zhu, Weiming Wang, Ping Liu, and Yongming Xie

Papers by Session

q Schistosoma Cercariae Image Recognition via SparseRepresentationShenhai Yan, Yang Liu, and Xiantong Huang

q Soft-Voting Classification using Locally Linear ReconstructionXiaohui Tian and Rong Wang

q Sparse Representation for Multi-Label Image AnnotationBingxin Xu and Ping Guo

q Speech Feature Analysis Using Temporal Linear EmbeddingLifang Xue and XiusHuang Yi

q Streamline-based Visualization of 3D Explosion FieldsYi Wang, Wenyao Zhang, and JianGuo Ning

q The Application of Binary Particle Swarm Algorithm in FaceRecognitionGuojian Cheng, Caiyun Shi, Kai Zhu, and Kevin Gong

Papers by Session

q The Iterative Regularization Method Based on ImageDecomposition ModelLi Min, Xu Chen, Sun Xiaoli, and Zhang Weiqiang

q The Multispectral Image Edge Detection Based on CliffordGradientHui Liu, Chen Xu, and Wenming Cao

q Using the Callback Function Realization Touch ScreenGestures Recognition of ComputerMa ShuangCheng

Papers by Session

Data Mining

q A Boundary Detection Algorithm of Clusters based on DualThreshold SegmentationBaozhi Qiu and Shuang Wang

q A Combined Music Label Propagation ModelJing Cai, Heng Li, and Bo Lang

q A Method for New Word Extraction on Chinese Large-scaleQuery LogsRui Sun, Peng Jin, and Juan Lai

q A New Community Structure Detection Method Basedon Structural SimilarityQi Luo

q A Real Time Multi-Scale Correlation Analysis Method andits Application on the Data Mining in Thermodynamic ProcessWang Qi and Liu Xin-Ping

Papers by Session

q A Simple But Effective Stream Maximal Frequent ItemsetMining AlgorithmHaifeng Li and Ning Zhang

q A Weighted K-hyperline Clustering Algorithm for Mixing MatrixEstimation on Bernoulli-Gaussian SourcesJun-jie Yang and Hai-lin Liu

q An Empirical Study on Credit Scoring Model for Credit Cardby Using Data Mining TechnologyWei Li and Jibiao Liao

q An Improved ID3 Based on Weighted Modified InformationGainChun Guan and Xiaoqin Zeng

q Analysis on Cloud Computing-based Logistics InformationNetwork ModeXing Wang

Papers by Session

q Another View of the Features in Supervised Chinese WordSense DisambiguationPengYuan Liu

q Application of Cloud Storage in Traffic Video DetectionRu Xue, Zong-Sheng Wu, and A-Ning Bai

q Approximation Kernel 2DPCA by Mixture of Vector and MatrixRepresentationLin Wang and Xiuling Zhou

q Clustering Based Image Denoising Using SURE-LETWu Zeng, Long Zhou, Xiubao Jiang, Xinge You, and Mingming Gong

q Data Mining Technique in the Internal Auditing of EnterpriseGroupsAijun Yang and Ping Song

q Data Sources of WebometricsShi Longqing and Zhao Qingfeng

Papers by Session

q Measuring Semantic Relatedness between Words UsingLexical ContextWei He, Xiaoping Yang, and Dupei Huang

q Methodology for Statistical Distribution Determinationof Various Data SourcesChangqing Liu and Wencai Luo

q Neural Network in the Application of EEG Signal ClassificationMethodHuaping Jia

q Normalizing Modularity Matrices for Data ClusteringRong Wang

q Pattern Recognition with Spatial Data Mining in Web: AnInfrastructure to Engineering of the Urban CadasterAndré Fabiano de Moraes and Lia Caetano Bastos

q Promotion Analysis Based on Fitting in Multi-Level SpaceLi Sun, Ming Zhu, and Jiyun Li

Papers by Session

q Research on Characteristics of Plates on Chinese StockMarketPeng Lin and Jianhui Yang

q Research on Industrial Building’s Reliability AssessmentBased on Projection Pursuit ModelZhang Lei and Jie Liu

q Research on Privacy-preserving in Distributed Mining Basedon the Attribute SimilarityQiu Lu and Xiao-hui Cheng

q Sequential Bayesian Method for Formulating Uncertaintyin Sparse DataChangqing Liu and Wencai Luo

q Similarity Matching over Uncertain Time SeriesYanfei Zuo, Guohua Liu, Xiaoli Yue, Wei Wang, and Honghua Wu

Papers by Session

q Simplified Business Process Model Mining Basedon Structuredness MetricWeiDong Zhao, Xi Liu, and Anhua Wang

q Spectral Clustering and its Research ProgressFu Chuanyi, Chen Huandong, and Xing Jieqing

q SVM Combined with FCM and PSO for Fuzzy ClusteringYifang Yang, Guoqiang Chen, and Yanchun Guo

q The Classification of k-anonymity DataLin Bingchun and Liu Guohua

q The Estimation of Mixing Matrix Based on Bernoulli-GaussianModelJiechang Wen and Taowen Wang

q The Finite Element Analysis of the Electromagnetic LevitationSystem Based on the Large Air GapZhengfeng Ming and Rui Wen

Papers by Session

q The Problem about Grey Incidence Cluster AnalysisYanping Cao and Chunmei Gong

q TKNN: An Improved KNN Algorithm Based on Tree StructureLi Juan

Papers by Session

System Analysis and Modeling

q A Data Distribution Platform Based on Event-DrivenMechanismWang Wei, Tan Enmin, and Feng Bing

q A General Edge Detection Method Based on the ShearTransformQiguang Miao, Pengfei Xu, Weisheng Li, and Hai Zhu

q A Lower Bound for the Smarandache Function ValueGuo Yanchun, Ren Ganglian, and Yang Yifang

q A New Method for Interval Multiple Attribute Decision MakingBased on Minimum Variance and Approach DegreeZhenhai Ai

q A Novel Two-stage Analysis Method for Customer’sRequirementHai Zhu, Zengfa Dou, and Wengang Zhou

Papers by Session

q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPSXinhong Hei, Lining Chang, Weigang Ma, and Guo Xie

q Achievement of Proxy Cache System for Streaming MediaBased on Patch AlgorithmWeitao Ha

q An Implementation Method for Converting the Erhu Musicfrom Wav to MidZiqing Nie and Shiying Yang

q Analysis of the Impact of Polarization Mode Dispersionon Optical Fiber CommunicationWei Zhao

q Analytical Models for Data Dependence Violation Checkingin TLSXin Lai, Cong Liu, Zhiying Wang, and Quanyou Feng

Papers by Session

q CFD Numerical Simulation of Exhaust MufflerJun Chen and Xiong Shi

q Closed-loop Supply Chain Network Horizontal IntegrationProblemYang Yu-xiang and Zhou Gen-gui

q Computer Realization of Quadratic Spline InterpolationFeng Tianxiang and Liu Hongxia

q Constructing the Expandability Web Service Based LinuxRong Shan

q Co-op Advertising Analysis within a Supply Chain Basedon the Product Life CycleHong Zhang and Sheng Zhong

q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit BoardZou Su, Li Chuanri, Xu Fei, and Qiao Liang

Papers by Session

q DBS Application to Chinese AdjectivesQiuxiang Feng, Degen Huang, Xiuying Li, and Rongpei Wang

q Design and Implement of SerialPort Class on Upper MachineSystemFu Chuanyi, Zhan Jinmei, and Chen Juntao

q Design and Implementation of Bus Net Routing AlgorithmMin Luo, Haiquan Wang, Chunhe Xia, Lihua Wang, and Ya Wang

q Design of Instrument Control System Based on LabViewKang Jianhua, She Fangyi, Yang FangZheng, and Wang Tao

q Dynamic Risk Measurement of Futures based on WaveletTheoryJianhui Yang and Peng Lin

q Existence of Almost Periodic and Almost AutomorphicSolutions for Second Order Differential EquationsLan Li

Papers by Session

q Experimental Study the Measurement of Acoustic Wave FlightTime under Strong Noise in the BoilerFeng Tian and Chenghui Zhang

q Fast Verification of Memory Consistency for ChipMulti-ProcessorZheng Lv, Hao Chen, Feng Chen, and Yi Lv

q Finite Volume Methods for the Second Order SingularPerturbation ProblemsChongnan He

q FTA Based Runtime Evaluation of System Reliabilityfor Autonomous Unmanned VehicleGuoqi Li

q Geometric Recognitions Models of Fault Characteristicsin Mobile Core NetworkSulin Pang and ShouYang Wang

Papers by Session

q Multiobjective Interaction Programming for Two-PersonsMin Jiang, Zhiqing Meng, Xinsheng Xu, Rui Shen, and Gengui Zhou

q Multi-user Detection Method for MIMO-OFDM UplinkTransmissionWang Yanli

q Off-line Text-independent Writer Identification Using a Mixtureof Global and Local FeaturesYiu-ming Cheung and Junping Deng

q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid AlgorithmFeng Tian, HaiYang Wang, Xiaoping Sun, Jia Liu, and Chuanyun Wang

q Qualitative Analysis for a Kind of Predator-Prey Modelof Holling III-Function Response with Nonlinear DensityDependentWei-wei Zheng, Li-gui Luo, and Lei Zhao

Papers by Session

q Relative Stability of Solution for Hua’s Macroeconomic ModelJing Zhang and Jinjie Zhang

q Robust Adaptive Sliding Mode Control Design for a Classof Uncertain Neutral Systems with Distributed DelaysRuliang Wang, Dongmei Gao, and Yanbo Li

q Stock Selection Based on Data Clustering MethodRuizhong Wang

q Structural Health Monitoring via Dynamic VisualizationPeng Sun and Xin Guo

q The Application of the Internet of Things in Hainan TourismScenic SpotYuanguai Lin

q The Application Study about Lucene in Document Retrievalfor OfficeDaiwen Wu

Papers by Session

q The BSC Alarm Management System Based on Rough SetTheory in Mobile CommunicationChao Deng and Sulin Pang

q The Construction and Application of Distance and OpenExperimental PlatformYu Jiangfeng and Qi Youju

q The Guidance and Control of Small Net-recovery UAVJiatong Chen and Yong Wang

q The Simulation of Trajectory for Homing Depth ChargeAttacking the Submarine with Different Guide OrderlinessLi Zong-ji, Cheng Shan-Zheng, and Ren Lei

q The Study of Improved Marker-Controlled Watershed CrownSegmentation AlgorithmGuang Deng and ZengYuan Li

Papers by Session

q Using Organizational Evolutionary Particle Swarm Techniquesto Generate Test Cases for Combinatorial TestingXiaoying Pan and Hao Chen

q VAR Model Analysis on Japan’s OFDI and Industrial StructuralUpgradingRen Liang

Papers by Author

A

q Agudo, J. Enriqueq Ai, Zhenhaiq An, Hongq An, Jianfeng

B

q Bai, A-Ningq Bai, Shujunq Baihai, Zhangq Balla-Arabé, Souleymaneq Bao, Shu-Diq Baoming, Qiao

q Bastos, Lia Caetanoq Bensefia, Hassinaq Bian, Ceq Biao, Liuq Bin, Zhouq Bing, Fengq Bingchun, Linq Bi-ying, Zhouq Bo, Jiang Feiq Bo, Wu Shaoq Bu, Shupoq Bu, Shu-po

Papers by Author

C

q Cai, Jingq Cai, Xiao-boq Cai, Yong-quanq Can, Wangq Cao, Cun-Zhangq Cao, Minq Cao, Pengq Cao, Qiu-yanq Cao, Shuhongq Cao, Wenmingq Cao, Xiaojun

q Cao, Yanpingq Carroll, Johnq Cequn, Fuq Chang, Liningq Chang, Mingq Chao, Jiangq Chao, Liq Chao, Wangq Che, Jianhuaq Chen, Caikouq Chen, Cai-xiaq Chen, Chenq Chen, Feng

Papers by Author

q Chen, Fu-chuanq Chen, Guoqiangq Chen, Haoq Chen, Hongweiq Chen, Jiatongq Chen, Jingboq Chen, Junq Chen, Junfengq Chen, Liq Chen, Liangq Chen, Lipingq Chen, Liquanq Chen, Shengbo

q Chen, Shizhanq Chen, Tiemingq Chen, Weiq Chen, Weiqiq Chen, Wen-Shengq Chen, Xiaoheq Chen, Xiaohuiq Chen, Xiaojiangq Chen, Xiao-yanq Chen, XingYuanq Chen, Xuq Chen, Yanq Chen, YinDong

Papers by Author

q Cheng, Chaoq Cheng, Guojianq Cheng, Jianq Cheng, Tianzhenq Cheng, Xiao-huiq Chengmin, Sunq Chen-yu, Liuq Cheong, Ming-Leeq Cheong, Se-Hangq Cheung, Yiu-mingq Chou, Chun-Hsienq Chua, Tong-Weiq Chuanri, Li

q Chuanyi, Fuq Chufeng, Zengq Chunping, Liuq Chunyan, Maq Cong, Taoq Cui, Baojing

d

q de Moraes, André Fabianoq de Oliveira, Adriana

Esmeraldo

D

q Dachao, Li

Papers by Author

q Dai, Meiyinq Dai, Qingq Dan-tuo, Zhangq Dayou, Liuq Deng, Aihuaq Deng, Chaoq Deng, Guangq Deng, Junpingq Deng, Lingjuanq Deng, Qingqiongq Deng-xu, Heq Ding, Yiq Ding, Yuan

q Distefano, Salvatoreq Dong, Mengxuanq Dong, Ningq Dong, Wanliq Dong, Yaoq Dong, Zefengq Dongdong, Liq Dongping, Huq Dou, Zengfaq Du, Jinlingq Duan, Fuqingq Duan, Xiaoyiq Duan, Yuhong

Papers by Author

E

q Enmin, Tan

F

q Fan, Leiq Fan, Mingq Fan, Xiangq Fan, Xiaoyaq Fang, Binq Fang, Dingyiq Fang, Yiqiuq Fangyi, Sheq FangZheng, Yang

q Fei, Gongq Fei, Xiangq Fei, Xuq Feng, Fengq Feng, Guoq Feng, Guoruiq Feng, J.Q.q Feng, Jianwenq Feng, Mingyongq Feng, Qiuxiangq Feng, Quanyouq Feng, Shuangq Feng, Xiaobo

Papers by Author

q Feng, Zhiyongq Fenghua, Liq Fengju, Kangq Fu, Weiq Fu, Yanjunq Fu, Yingchunq Fyfe, Colin

G

q Gan, Guolongq Ganglian, Renq Gao, Chaoq Gao, Chao-Qin

q Gao, Deyuanq Gao, Dongmeiq Gao, Jinzhuq Gao, Shengq Gao, Xinboq Gao, Xingbaoq Gao, Yulinq Gen-gui, Zhouq Ghoualmi, Naciraq Gong, Chunmeiq Gong, Kevinq Gong, Liuq Gong, Mingming

Papers by Author

q Gong, Shengwenq Gong, Xiaoqingq Goo, Bon Minq Gu, Kunq Guan, Chunq Gui-qing, Liuq Guo, Bingq Guo, Jiang Hongq Guo, Pingq Guo, Taoq Guo, Wei-fengq Guo, William W.q Guo, Xiao-Bin

q Guo, Xinq Guo, Yanchunq Guo, Zhou Zhiq Guohua, Liuq Guojun, Zhang

H

q Ha, Weitaoq Haifeng, Liq Haifeng, Zhangq Haisong, Chenq Han, Liq Han, Limin

Papers by Author

q Hanxu, Sunq Hao, Yongleq Hao, Zhifengq He, Chen-Guangq He, Chongnanq He, Junfengq He, Weiq He, WenZhangq He, Yunhuiq He, Zhenhuanq Hegedus, Jozsefq Hei, Xinhongq Hong, Bao

q Hong, Hanq Hongxia, Liuq Hou, Yuq Hsu, Yun-Hsiangq Hu, JiaJiaq Hu, Junq Hu, Junlinq Hu, Rongleiq Hua, Boq Huamin, Fengq Huan, Huq Huandong, Chenq Huang, Degen

Papers by Author

q Huang, Donghuaq Huang, Dupeiq Huang, Huaq Huang, Jiasenq Huang, Jihaiq Huang, Taiquanq Huang, Xiantongq Huawei, Wangq Hua-Zheng, Zhuq Hui, Quq Hui, Wangq Hui, Xuq Huifang, Li

q Hui-rong, Liq Huixian, Li

I

q Ilin, Alexanderq Isohara, Takamasa

J

q Ji, Shiruiq Ji, Xinshengq Jia, Huapingq Jia, Jihongq Jia, Lipingq Jia, Xiaoqiang

Papers by Author

q Jia, Yuhongq Jia, Yuxiangq Jian, Liq Jianfeng, Maq Jiang, Dingdeq Jiang, Hanq Jiang, Huaq Jiang, Juanq Jiang, Lijunq Jiang, Minq Jiang, Rongrongq Jiang, Xianq Jiang, Xiubao

q Jiangfeng, Yuq JianGuo, Juq Jianhua, Kangq Jianping, Liq Jianzhong, Caoq Jiao, Yong-Changq Jiaojiao, Zhangq Jiaxi, Chenq Jie, Liuq Jie, Xiongq Jieqing, Xingq Jin, Pengq Jing, Liu

Papers by Author

q Jing, Yuanq Jinghui, Zhangq Jingying, Liq Jingzhou, Songq Jinhua, Zhengq Jinling, Duq Jinman, Zhangq Jinmei, Zhanq Ji-Zhao, Liuq Juan, Liq Juan, Zhaoq Jun, Yanq Jun, Yang

q Junjun, Songq Juntao, Chenq Junwei, Ge

K

q Kang, Haoq Ke, Wangq Kim, Hunq Kuang, Haiboq Kubota, Ayumuq Kun, Liuq Kwok, Lam-for

Papers by Author

L

q Lai, Juanq Lai, Xinq Lan, Luanq Lang, Boq Lao, Fengdanq Lee, Kai-Ipq Lee, Tae Rimq Lei, Renq Lei, Zhangq Lendasse, Amauryq Li, Bin

q Li, Chunshengq Li, Dongq Li, FanZhangq Li, Feiq Li, Guangyeq Li, Guohuiq Li, Guoqiq Li, Haifengq Li, HeChengq Li, Hengq Li, Hongningq Li, Hongpingq Li, Hui

Papers by Author

q Li, Huiyunq Li, Jiafeiq Li, Jieq Li, JieYuanq Li, Jing-fengq Li, Jinhuaq Li, JiongChengq Li, Jiyunq Li, Kanq Li, Lanq Li, Leiboq Li, Liq Li, Ping

q Li, Qiq Li, Ruiq Li, Shanshanq Li, Weiq Li, Weichangq Li, Weishengq Li, Xiang Youq Li, XiangDongq Li, Xiangyuq Li, Xinghuaq Li, Xinsheq Li, Xiu Yingq Li, Xiuying

Papers by Author

q Li, Ya Huiq Li, Yanboq Li, Youq Li, Yuq Li, Yun-pengq Li, ZengYuanq Li, Zhanq Liang, Chenq Liang, Qiaoq Liang, Qixuanq Liang, Renq Liang, YiXiongq Liao, Jibiao

q Liao, Shizhongq Liaojun, Pangq Lidong, Wangq Lin, Pengq Lin, Weiminq Lin, Xibinq Lin, Yuanguaiq Lin, Yumingq Linao, Tangq Ling, Jieq Lingling, Huq Liping, Chenq Liping, Qian

Papers by Author

q Liu, Caixiaq Liu, Changqingq Liu, Chunleiq Liu, Congq Liu, Dalianq Liu, Gangq Liu, Guang-liangq Liu, Guohuaq Liu, Hailinq Liu, Hai-linq Liu, Huiq Liu, Jiaq Liu, Jie

q Liu, Juq Liu, Liuq Liu, LiXiongq Liu, PengYuanq Liu, Pingq Liu, Ruiq Liu, Shuxinq Liu, Weiq Liu, Xiq Liu, Xiaq Liu, Xiao Binq Liu, Yangq Liu, Yong

Papers by Author

q Liu, Yong-linq Liu, Yubaoq Liu, YunChengq Liu, Zaixueq Liu, Zhaoq Liu, Zhen Hanq Liu, ZhenDongq Liu, Zhenghongq Liu, Zhiqinq Li-Xiao, Maq Long, Liuq Long, Shujunq Longmei, Zhang

q Longqing, Shiq Looi, Markq Lu, Miaoq Lu, Qiuq Lu, Xueyuq Lu, Yaoq Lun, Xieq Luo, Jiang-fengq Luo, Li-guiq Luo, Minq Luo, Mingq Luo, Qiq Luo, Ruiyi

Papers by Author

q Luo, Wencaiq Luo, Yong-longq Luo, Ziqiangq Lv, Chaoq Lv, Yiq Lv, Zheng

M

q Ma, Jian Fengq Ma, Jianfengq Ma, Junq Ma, Shengquanq Ma, Sheng-quan

q Ma, Weigangq Ma, Zengq Mao, Xiaoqinq Maozhi, Xuq McCarthy, Dianaq Mei, Denghuaq Mei, Jie Longq Meng, Yanshuangq Meng, Yuxinq Meng, Zhiqingq Miao, Qiguangq Miao, Zhangq Miche, Yoan

Papers by Author

q Min, Liq Ming, Zhengfengq Mingchun, Wangq Mo, Jiajieq Motta, Gustavo Henrique

Matos Bezerra

N

q Na, Liq Nan, Liq Nian, Laiq Nie, Ziqingq Ning, Huang

q Ning, JianGuoq Ning, Jiantingq Ning, Xiq Niu, Benq Niu, Wen Shengq Niu, Yun

O

q Olsen, Jesperq OuYang, Jihong

P

q Pan, Shaoweiq Pan, Xiaoying

Papers by Author

q Pang, Baochuanq Pang, Liaojunq Pang, Sulinq Pei, Qingqiq Peifeng, Haoq Peng, Jianhuaq Peng, Kaiq Peng, Shuolingq Peng-jun, Zhaoq Ping, Yinq Puliafito, Antonioq Pulin, Zhang

Q

q Qi, Heq Qi, Wangq Qi, Yueq Qiao, Jianpingq Qiao, Kangq Qijian, Xuq Qi-jun, Liuq Qin, Chenq Qin, Langq Qin, Wendaq Qing, Huang Ming

Papers by Author

q Qingfeng, Zhaoq Qingqi, Peiq Qingxian, Wangq Qingxuan, Jiaq Qiu, Baozhiq Qiu, Jingq Qu, Xiaohuiq Qun, Fangq Qun, Zhang

R

q Ren, Lianq Ren, Yueou

q Rong, Li Chao

S

q Schwind, Camillaq Shan, Rongq Shan-Zheng, Chengq Shaojuan, Yuq Shen, Fangq Shen, Ruiq Shen, Yanq Shen, Yu Longq Sheng, Zhongq Shengjie, Sun

Papers by Author

q Shengjie, Wangq Shengrong, Gongq Shi, Caiyunq Shi, Liwenq Shi, Xiongq Shin, Sang Ukq Shu, Li Chengq ShuangCheng, Maq Shulei, Wuq Shu-qing, Chenq Si, Yain-Wharq Song, Boq Song, Huaguang

q Song, Pingq Song-sen, Yuq Studer, Thomasq Su, Shenghuiq Su, Yuq Su, Zhenq Su, Zouq Sun, Boq Sun, Chunshengq Sun, Huiq Sun, Jiandeq Sun, Liq Sun, Lingyan

Papers by Author

q Sun, Pengq Sun, Ruiq Sun, Tieliq Sun, Xiaopingq Sun, Xingchunq Sun, Xinxinq Sun, Zheng-Chunq Su-qin, Zhang

T

q Takemori, Keisukeq Tan, Jingq Tan, Lijing

q Tan, Yan-Yanq Tang, Guochunq Tang, Luo-haoq Tang, Xuriq Tao, Wangq Teng, Guanghuiq Thing, Vrizlynn L.L.q Tian, Fengq Tian, Xiaohuiq Tian, Yanq Tianxiang, Fengq Tian-yi, Caiq Tsai, Wen-Nung

Papers by Author

q Tseng, Judy C.R.

U

q U, Leong Hou

W

q Wang, Anhuaq Wang, Binq Wang, Caifenq Wang, Changjiq Wang, Chuanyunq Wang, Chunlingq Wang, ChunXiaoq Wang, Feng

q Wang, Guoyuq Wang, Haiquanq Wang, HaiYangq Wang, Haoq Wang, Hongq Wang, Huimeiq Wang, Ji Heq Wang, Jianxinq Wang, Jieq Wang, Jingq Wang, Jingyiq Wang, Liq Wang, Lian Hai

Papers by Author

q Wang, Liangminq Wang, Lihuaq Wang, Linq Wang, Litaoq Wang, Mingqiangq Wang, Ningq Wang, Pingq Wang, Qiangq Wang, Rongq Wang, Rongpeiq Wang, Ruizhongq Wang, Ruliangq Wang, ShouYang

q Wang, Shuangq Wang, Shuoq Wang, Taowenq Wang, Tzai Derq Wang, Weiq Wang, Weimingq Wang, Weiqiangq Wang, Xiaoliq Wang, Xingq Wang, Xin-Kuanq Wang, Xu Anq Wang, Yaq Wang, Yaobin

Papers by Author

q Wang, Yiq Wang, Yichuanq Wang, Yileiq Wang, Yingminq Wang, Yingyingq Wang, Yongq Wang, Yuanq Wang, Yupingq Wang, Zhiyingq Wang, Ziqingq Wang-da, Chenq Wei, Daliq Wei, Lu

q Wei, Wangq Wei-dong, Yangq Weihe, Chenq Weiqiang, Zhangq Weitao, Haq Wei-wei, Liuq Wen, Guihuaq Wen, Jiechangq Wen, Ruiq Wencai, Heq Wen-cai, Heq Wu, Daiwenq Wu, Haibo

Papers by Author

q Wu, Honghuaq Wu, Jianq Wu, Jiaweiq Wu, Ji-Weiq Wu, Kekeq Wu, Lihuaq Wu, Lijiq Wu, Tiejunq Wu, Xiaochuanq Wu, Xiu Qiangq Wu, Xuefeiq Wu, Yuan Shengq Wu, Yunfang

q Wu, Zhongkeq Wu, Zong-Sheng

X

q Xi, Houweiq Xi, Jianrongq Xia, Chunheq Xian, Mingq Xiang, Xuq Xiao, Chuang-Baiq Xiao, Fanyiq Xiao, Henghuiq Xiao-cong, Guo

Papers by Author

q Xiaofang, Guoq Xiaohua, Chenq Xiaoli, Sunq Xiao-li, Sunq Xiaoni, Chengq Xiao-ni, Chengq Xiao-ya, Liq Xie, Guoq Xie, Minq Xie, W.X.q Xie, Xiaolongq Xie, Yongmingq Xi-hong, Wu

q Xin, Gaoq Xin, SiYuanq Xin, Wanq Xingbao, Wangq Xinghua, Yangq Xing-lan, Zhangq Xining, Cuiq Xin-Ping, Liuq Xiong, Shumingq Xu, Bingxinq Xu, C.q Xu, Chaoq Xu, Chen

Papers by Author

q Xu, Guoqingq Xu, Jianfengq Xu, Jingq Xu, Junq Xu, Kaiyingq Xu, Kangq Xu, Luq Xu, Pengfeiq Xu, Qiuliangq Xu, Wuq Xu, Xinshengq Xu, Xirongq Xu, Xu

q Xu, Yipingq Xu, Zhengzhengq Xuan, Wangq Xue, Lifangq Xue, Ruq Xue, Zhouq Xueming, Tangq Xunxun, Shen

Y

q Yafen, Shenq Yahui, Liq Yameng, Cheng

Papers by Author

q Yan, Shenhaiq Yanchun, Guoq Yanfei, Yuq Yang, Aijunq Yang, Boq Yang, Chaoq Yang, Danq Yang, Feiq Yang, Jianhuiq Yang, Jun-jieq Yang, Shiyingq Yang, Tingq Yang, Xiaoping

q Yang, Xingq Yang, Yajuanq Yang, Yangq Yang, Yifangq Yang, Zhengq Yanhui, Zhaoq Yanli, Wangq Yanqiong, Zhuq Yan-xin, Shiq Yanyan, Hanq Yan-yan, Hanq Yao, Chengq Yao, Junping

Papers by Author

q Yi, Jiq Yi, XiusHuangq Yian, Zhuq Yifang, Yangq Yin, Qianq Yin, Xinchunq Yin, XuChengq Yinyan, Yuq Yiqiu, Fangq Yisheng, Xueq Yong, Xuq Yonglin, Minq Yong-mao, Cheng

q Yong-mei, Chengq Yongquan, Cuiq Yong-xian, Wangq YongZhao, Zhanq You, Xingeq Youju, Qiq Yu, Binq Yuan, Chen Xingq Yuan-lei, Liq Yuan-xin, Liangq Yue, Xiaoliq Yue-lin, Gaoq Yulong, Shen

Papers by Author

q Yun, Lingq Yun-yuan, Dongq Yu-xiang, Yang

Z

q Zan, Hongyingq Zeng, Qianq Zeng, Wenyiq Zeng, Wuq Zeng, Xiantieq Zeng, Xiaoqinq Zeng, Yongq Zhai, Wenhua

q Zhan, Gaoq Zhan, Taoq Zhan-fang, Zhaoq Zhang, Chenghuiq Zhang, Fengq Zhang, Hongq Zhang, Huaq Zhang, Jingq Zhang, Jinjieq Zhang, Jun Weiq Zhang, Lai-shunq Zhang, Liumeiq Zhang, Manrui

Papers by Author

q Zhang, Ningq Zhang, Pengq Zhang, Qing Xiangq Zhang, Quan-juq Zhang, Ruiq Zhang, Taoq Zhang, W.Q.q Zhang, Wei-mingq Zhang, Wenyaoq Zhang, Xiang Minq Zhang, Xiangminq Zhang, Xiuminq Zhang, Ya Di

q Zhang, Yan-pingq Zhang, Yongq Zhang, Yongfuq Zhang, Yuanq Zhang, Zhijunq Zhao, Gaochangq Zhao, Hengboq Zhao, Leiq Zhao, Lingzhongq Zhao, Naq Zhao, Peiq Zhao, Ruiminq Zhao, Shu

Papers by Author

q Zhao, Weiq Zhao, WeiDongq Zhao, Xiufengq Zhao, Yanboq Zhao, Yiq Zhao, Yinghaiq Zhao, Yongq Zhao, Zhi-qingq Zhaohui, Wangq Zheng, Wei-weiq Zheng, Xiq Zheng, Xinq Zheng-hua, Wang

q Zhenglian, Suq Zhenqiu, Liangq Zhi-Liang, Wangq Zhiming, Wangq Zhong, Hongq Zhong, Shengq Zhong, WeiDongq Zhou, Genguiq Zhou, Longq Zhou, Mingquanq Zhou, Wengangq Zhou, Xiulingq Zhu, Cheng

Papers by Author

q Zhu, Damingq Zhu, Haiq Zhu, Haipingq Zhu, Kaiq Zhu, Mingq Zhu, Ningq Zhu, Sencunq Zhu, ShiSongq Zhu, Tanchaoq Zhu, Xiaoyanq Zhu, Xinshanq Zong-ji, Liq Zou, Chun-hua

q Zuo, Yanfeiq Zuoshun, Wu

Papers by Author

Agudo, J. Enrique

q Reinforcement Learning for the N-Persons Iterated Prisoners’Dilemma

Ai, Zhenhai

q A New Method for Interval Multiple Attribute Decision MakingBased on Minimum Variance and Approach Degree

An, Hong

q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation

An, Jianfeng

q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor

Papers by Author

Bai, A-Ning

q Application of Cloud Storage in Traffic Video Detection

Bai, Shujun

q K-times Proxy Re-encryption

Baihai, Zhang

q Researching on the Growth Operator SWFZIRS of GrowthEvolution Algorithms

Balla-Arabé, Souleymane

q Level Set Region Based Image Segmentation Using LatticeBoltzmann Method

Papers by Author

Bao, Shu-Di

q An Enhanced Role-Based Access Control Mechanismfor Hospital Information Systems

Baoming, Qiao

q A Digital Watermarking Algorithm Based on Wavelet PacketTransform and BP Neural Network

Bastos, Lia Caetano

q Pattern Recognition with Spatial Data Mining in Web: AnInfrastructure to Engineering of the Urban Cadaster

Bensefia, Hassina

q A New Approach for Adaptive Intrusion Detection

Papers by Author

Bian, Ce

q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process

Biao, Liu

q A Spam Filtering Method Based on Multi-modal FeaturesFusion

Bin, Zhou

q Spares Consumption Prediction Based on BP Neural Network

Bing, Feng

q A Data Distribution Platform Based on Event-DrivenMechanism

Papers by Author

Bingchun, Lin

q The Classification of k-anonymity Data

Bi-ying, Zhou

q Research on Nonlinear Predictive Control Rolling OptimizationStrategy Based on SAPSO

Bo, Jiang Fei

q Design of the DS-UWB Communication System Basedon Chaotic Variable Spreading Factor

Bo, Wu Shao

q Identity-based SIP Authentication and Key Agreement

Papers by Author

Bu, Shupo

q An Identity-based Secure Routing Protocol in WSNs

Bu, Shu-po

q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model

q A Trust-based Dynamic Secure Service Discovery Modelfor Pervasive Computing

q An Automated Black-box Testing Approach for WSN SecurityProtocols

Cai, Jing

q A Combined Music Label Propagation Model

Papers by Author

Cai, Xiao-bo

q Weak-pseudo-R0 Algebras

Cai, Yong-quan

q A Rational Secret Sharing Scheme Based on Repeated Game

Can, Wang

q Discretization Based on Positive Domain and InformationEntropy

Cao, Cun-Zhang

q An Enhanced Role-Based Access Control Mechanismfor Hospital Information Systems

Papers by Author

Cao, Min

q The Implementation of Trust Model in the P2P PatchDistribution System

Cao, Peng

q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software Reliability

q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model Theory

q Qualitative Modeling for Parallel Software System ReliabilityEvaluation

Cao, Qiu-yan

q Application of the PSO-SVM Model for Credit Scoring

Papers by Author

Cao, Shuhong

q Knowledge Discovery Method from Abnormal Monitoring Data

Cao, Wenming

q The Multispectral Image Edge Detection Based on CliffordGradient

Cao, Xiaojun

q An Improved Signcryption with Proxy Re-encryption andits Application

Cao, Yanping

q The Problem about Grey Incidence Cluster Analysis

Papers by Author

Carroll, John

q Improved Word Similarity Computation for Chinese UsingSub-word Information

Cequn, Fu

q Algorithm of Distribution Estimation for Node Localizationin Wireless Sensor Network

Chang, Lining

q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPS

Chang, Ming

q The Application of Neural Network in the Intelligent FaultDiagnosis System

Papers by Author

Chao, Jiang

q A Spam Filtering Method Based on Multi-modal FeaturesFusion

Chao, Li

q Improved Differential Evolution Algorithm with AdaptiveMutation and Control Parameters

Chao, Wang

q An Access Control Mode Based on Information Flow Graph

Che, Jianhua

q A Markov Chain-based Availability Model of Virtual ClusterNodes

Papers by Author

Chen, Caikou

q Local Reconstruction Error of l2 Norm for Discriminant FeatureExtraction

Chen, Cai-xia

q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional Space

Chen, Chen

q Construction of a Bilingual Cognitive Property Knowledgebase

Chen, Feng

q Inertia Weight Particle Swarm Optimization with BoltzmannExploration

Papers by Author

q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring

q Fast Verification of Memory Consistency for ChipMulti-Processor

Chen, Fu-chuan

q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value Integral

Chen, Guoqiang

q SVM Combined with FCM and PSO for Fuzzy Clustering

Chen, Hao

q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring

Papers by Author

q Fast Verification of Memory Consistency for ChipMulti-Processor

q Using Organizational Evolutionary Particle Swarm Techniquesto Generate Test Cases for Combinatorial Testing

Chen, Hongwei

q The Application of Neural Network in the Intelligent FaultDiagnosis System

Chen, Jiatong

q The Guidance and Control of Small Net-recovery UAV

Chen, Jingbo

q Researches and Simulations of Information Hiding in AlamoutiTransmission System

Papers by Author

Chen, Jun

q Real-time LOD Algorithm Based on Triangle CollapseOptimization

q CFD Numerical Simulation of Exhaust Muffler

Chen, Junfeng

q A Cloud Model Based Computational Intelligence Algorithmfor Parameter Identification of Chaotic Systems

Chen, Li

q A Survey on Methods of Automatic Protocol ReverseEngineering

Chen, Liang

q Knowledge Discovery Method from Abnormal Monitoring Data

Papers by Author

Chen, Liping

q Adaptive Evaluation Model of Information Systemby Triangular Fuzzy Number

Chen, Liquan

q Researches and Simulations of Information Hiding in AlamoutiTransmission System

Chen, Shengbo

q Model Composition and Generating Tests for WebApplications

Chen, Shizhan

q A QoS-based Self-adaptive Framework for OpenAPI

Papers by Author

Chen, Tieming

q A Bilinear Pairing-Based Key Management Schemefor Wireless Sensor Networks

Chen, Wei

q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient Pruning

Chen, Weiqi

q The 0/1 Multi-objective Knapsack Problem Based on RegionalSearch

Chen, Wen-Sheng

q A Novel Subspace Discriminant Locality PreservingProjections for Face Recognition

Papers by Author

q Automatic Parameter Determination Based on a ModifiedDiscriminant Criterion for Face Recognition

Chen, Xiaohe

q Construction of a Bilingual Cognitive Property Knowledgebase

Chen, Xiaohui

q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks

Chen, Xiaojiang

q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring

Papers by Author

Chen, Xiao-yan

q A Maximal Clique Partition Method for Network Basedon Granularity

q Research on the Maximum Flow in Large-scale Networkq A New Scheme for Information Hiding Based on Digital

Images

Chen, XingYuan

q Construction of Overflow Attacks Based on Attack Elementand Attack Template

Chen, Xu

q A Secondary Image Denoising Model Based on the LocalEnergy Operator

Papers by Author

q The Iterative Regularization Method Based on ImageDecomposition Model

Chen, Yan

q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive Text

Chen, YinDong

q A Construction of Balanced Odd-variable Boolean Functionwith Optimum Algebraic Immunity

Cheng, Chao

q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional Space

Papers by Author

Cheng, Guojian

q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum Reservoir

q The Application of Binary Particle Swarm Algorithm in FaceRecognition

Cheng, Jian

q Face Recognition with Statistical Local Line Binary Patternq Pedestrian Detection Based on HOG-LBP Feature

Cheng, Tianzhen

q Multi-jammer Localization in Wireless Sensor Networks

Papers by Author

Cheng, Xiao-hui

q Research on Privacy-preserving in Distributed Mining Basedon the Attribute Similarity

Chengmin, Sun

q The Overview of Feature Selection Algorithms Based SwarmIntelligence and Rough Set

Chen-yu, Liu

q Spares Consumption Prediction Based on BP Neural Networkq Spares Consumption Quota Model Based on BP Neural

Network

Papers by Author

Cheong, Ming-Lee

q Design of a Digital Forensics Evidence Reconstruction Systemfor Complex and Obscure Fragmented File Carving

Cheong, Se-Hang

q Lifeline: Emergency Ad Hoc Network

Cheung, Yiu-ming

q Off-line Text-independent Writer Identification Using a Mixtureof Global and Local Features

Chou, Chun-Hsien

q Image Quality Assessment Based on Binary StructureInformation

Papers by Author

Chua, Tong-Wei

q Design of a Digital Forensics Evidence Reconstruction Systemfor Complex and Obscure Fragmented File Carving

Chuanri, Li

q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit Board

Chuanyi, Fu

q Spectral Clustering and its Research Progressq Design and Implement of SerialPort Class on Upper Machine

System

Papers by Author

Chufeng, Zeng

q Systematical Vulnerability Detection in Browser ValidationMechanism

Chunping, Liu

q A Saliency Detection Model Based on Multi-feature Fusionq Pedestrian Recognition Based on Saliency Detection

and Kalman Filter Algorithm in Aerial Video

Chunyan, Ma

q A Model Driven Approach for Self-Healing Computing System

Cong, Tao

q Architecture for Component Library Retrieval on the Cloud

Papers by Author

Cui, Baojing

q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process

Dachao, Li

q Phylogenetic Tree of DNA Sequences Constructed by a NewMethod-H Curve

Dai, Meiyin

q Dynamic Fuzzy Semisupervised Multitask Learning

Dai, Qing

q A New Cross-realm Group Password-based AuthenticatedKey Exchange Protocol

Papers by Author

Dan-tuo, Zhang

q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc Networks

Dayou, Liu

q The Overview of Feature Selection Algorithms Based SwarmIntelligence and Rough Set

de Moraes, André Fabiano

q Pattern Recognition with Spatial Data Mining in Web: AnInfrastructure to Engineering of the Urban Cadaster

de Oliveira, Adriana Esmeraldo

q A Security API for Multimodal Multi-biometric ContinuousAuthentication

Papers by Author

Deng, Aihua

q An Important Property about Vertex Distance of CrossedCubes CQn

Deng, Chao

q The BSC Alarm Management System Based on Rough SetTheory in Mobile Communication

Deng, Guang

q The Study of Improved Marker-Controlled Watershed CrownSegmentation Algorithm

Deng, Junping

q Off-line Text-independent Writer Identification Using a Mixtureof Global and Local Features

Papers by Author

Deng, Lingjuan

q Analysis of the Authentication Protocols Based on GameTheory

Deng, Qingqiong

q Face Reconstruction from Skull Based on Partial LeastSquares Regression

Deng-xu, He

q Glowworm Swarm Optimization Algorithm for SolvingMulti-constrained QoS Multicast Routing Problem

Ding, Yi

q Traitor Tracing and Revocation Mechanismswith Privacy-Preserving

Papers by Author

q Efficient Password-Based Authenticated Key Exchangefrom Lattices

q K-times Proxy Re-encryptionq Proxy Re-encryption with Keyword Search from Anonymous

Conditional Proxy Re-encryption

Ding, Yuan

q Orthogonal Test Algorithm on TD-SCDMA NetworkOptimization

Distefano, Salvatore

q Achieving Distributed System Information Security

Papers by Author

Dong, Mengxuan

q The Estimation Algorithm of Laplacian Eigenvalues forthe Tangent Bundle

Dong, Ning

q A Hybrid Multiobjective Differential Evolution Algorithm Basedon Improved ε-Dominance

Dong, Wanli

q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation

Dong, Yao

q VVCS: Verifiable Visual Cryptography Scheme

Papers by Author

Dong, Zefeng

q A Novel Group Signature Scheme Based on NTRU

Dongdong, Li

q Research on Access Control Mechanism for Digital ProductsTrading

Dongping, Hu

q Hierarchical ID-Based Blind Signature from Lattices

Dou, Zengfa

q A Novel Two-stage Analysis Method for Customer’sRequirement

Papers by Author

Du, Jinling

q Multi-objective Optimization of Bus Dispatching Basedon Improved Genetic Algorithm

Duan, Fuqing

q Contours-Matching in Building Reconstruction from a SingleImage

q Face Reconstruction from Skull Based on Partial LeastSquares Regression

Duan, Xiaoyi

q Research and Implementation of DPA-resistant SMS4 BlockCipher

Papers by Author

Duan, Yuhong

q A New Improved Particle Swarm Optimization Algorithm

Enmin, Tan

q A Data Distribution Platform Based on Event-DrivenMechanism

Fan, Lei

q Uniform Design Based Hybrid Genetic Algorithmfor Multiobjective Bilevel Convex Programming

q Traitor Tracing and Revocation Mechanismswith Privacy-Preserving

q Efficient Password-Based Authenticated Key Exchangefrom Lattices

Papers by Author

Fan, Ming

q Inducing Chinese Selectional Preference Based on HowNet

Fan, Xiang

q Modeling and Simulating the Propagation of UnstructuredPeer-to-Peer Worms

Fan, Xiaoya

q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor

Fang, Bin

q A Novel Subspace Discriminant Locality PreservingProjections for Face Recognition

Papers by Author

Fang, Dingyi

q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring

Fang, Yiqiu

q Improvement of the MapReduce Model Based on MessageMiddleware Oriented Data Intensive Computing

Fangyi, She

q Design of Instrument Control System Based on LabView

FangZheng, Yang

q Design of Instrument Control System Based on LabView

Papers by Author

Fei, Gong

q Research of Rapid Attention-Information Extractionin Human-Robot Interaction

Fei, Xiang

q An Image Encryption Algorithm Based on Scramblingand Substitution Using Hybrid Chaotic Systems

Fei, Xu

q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit Board

Feng, Feng

q Information Hiding Algorithm Based on Stentiford VisualAttention Model

Papers by Author

Feng, Guo

q Spares Consumption Prediction Based on BP Neural Networkq Spares Consumption Quota Model Based on BP Neural

Network

Feng, Guorui

q Differential Energy Watermarking Based on Macro-blockPrediction

Feng, J.Q.

q Monitoring the PSO Process Based on Fuzzy RandomVariables

Papers by Author

Feng, Jianwen

q Exponentially Synchronization of Stochastic ComplexNetworks with Time-varying Delays and Switching Topologyvia Pinning Control

q On Cluster Synchronization for Linearly Coupled ComplexNetworks

Feng, Mingyong

q A Heuristic Genetic Process Mining Algorithm

Feng, Qiuxiang

q DBS Application to Chinese Adjectives

Papers by Author

Feng, Quanyou

q Analytical Models for Data Dependence Violation Checkingin TLS

Feng, Shuang

q An Improvement of Comprehensive Evaluation Model

Feng, Xiaobo

q Attack on the Cryptosystem Based on DLP

Feng, Zhiyong

q A QoS-based Self-adaptive Framework for OpenAPI

Papers by Author

Fenghua, Li

q Research on Access Control Mechanism for Digital ProductsTrading

Fengju, Kang

q Design of Intelligent Decision-making System in Multi-UUVFormation Control Simulation

Fu, Wei

q An ID-based (k, t, n) Threshold Group Signature Scheme

Fu, Yanjun

q Fast and Effectively Identify Pornographic Images

Papers by Author

Fu, Yingchun

q Spatial Prediction of Dissolved Organic Carbon Using GISand ANN Modeling in River Networks

Fyfe, Colin

q Minimal Echo State Networks for Visualisationq Reinforcement Learning for the N-Persons Iterated Prisoners’

Dilemma

Gan, Guolong

q Pedestrian Detection Based on HOG-LBP Feature

Ganglian, Ren

q A Lower Bound for the Smarandache Function Value

Papers by Author

Gao, Chao

q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive Text

Gao, Chao-Qin

q A Security Model for Information Systems with Multi-levelSecurity

Gao, Deyuan

q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor

Gao, Dongmei

q Robust Adaptive Sliding Mode Control Design for a Classof Uncertain Neutral Systems with Distributed Delays

Papers by Author

Gao, Jinzhu

q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum Reservoir

Gao, Sheng

q Marshmallow: A Content-Based Publish-Subscribe Systemover Structured P2P Networks

Gao, Xinbo

q Level Set Region Based Image Segmentation Using LatticeBoltzmann Method

Gao, Xingbao

q A Neural Network for a Class of Horizontal LinearComplementary Problems

Papers by Author

Gao, Yulin

q A New Improved Particle Swarm Optimization Algorithm

Gen-gui, Zhou

q Closed-loop Supply Chain Network Horizontal IntegrationProblem

Ghoualmi, Nacira

q A New Approach for Adaptive Intrusion Detection

Gong, Chunmei

q The Problem about Grey Incidence Cluster Analysis

Papers by Author

Gong, Kevin

q The Application of Binary Particle Swarm Algorithm in FaceRecognition

Gong, Liu

q Pedestrian Recognition Based on Saliency Detectionand Kalman Filter Algorithm in Aerial Video

Gong, Mingming

q Clustering Based Image Denoising Using SURE-LET

Gong, Shengwen

q Model Composition and Generating Tests for WebApplications

Papers by Author

Gong, Xiaoqing

q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring

Goo, Bon Min

q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning Algorithms

Gu, Kun

q Design and Implementation of an Electromagnetic AnalysisSystem for Smart Cards

Guan, Chun

q A Model of Emotional Agent Based on Granular Computing

Papers by Author

q An Improved ID3 Based on Weighted Modified InformationGain

Gui-qing, Liu

q Glowworm Swarm Optimization Algorithm for SolvingMulti-constrained QoS Multicast Routing Problem

Guo, Bing

q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level

Guo, Jiang Hong

q Secure Data Aggregation Scheme for Clustered WirelessSensor Networks

Papers by Author

Guo, Ping

q Software Fault Prediction Framework Based onaiNet Algorithm

q Multi-Level Kernel Machine for Scene Image Classificationq Sparse Representation for Multi-Label Image Annotation

Guo, Tao

q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process

Guo, Wei-feng

q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm Setting

Papers by Author

Guo, William W.

q Modeling and Simulating the Propagation of UnstructuredPeer-to-Peer Worms

Guo, Xiao-Bin

q Approximate Solution of Fuzzy Sylvester Matrix Equations

Guo, Xin

q Structural Health Monitoring via Dynamic Visualization

Guo, Yanchun

q SVM Combined with FCM and PSO for Fuzzy Clustering

Papers by Author

Guo, Zhou Zhi

q Automatic Detection of Lumina in Mouse LiverImmunohistochemical Color Image Using Support VectorMachine and Cellular Neural Network

Guohua, Liu

q The Classification of k-anonymity Data

Guojun, Zhang

q The Design of Cooperative Intrusion Detection System

Ha, Weitao

q Achievement of Proxy Cache System for Streaming MediaBased on Patch Algorithm

Papers by Author

Haifeng, Li

q An Intelligent Vehicle Monitoring System Based on Internetof Things

Haifeng, Zhang

q A New Algorithm for Auto-Exposure Based on the AnalogyHistogram

Haisong, Chen

q Improving the Performance of Personalized Recommendationwith Ontological User Interest Model

Han, Li

q Using a Dynamic K-means Algorithm to Detect AnomalyActivities

Papers by Author

Han, Limin

q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor

Hanxu, Sun

q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System

Hao, Yongle

q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process

Hao, Zhifeng

q The 0/1 Multi-objective Knapsack Problem Based on RegionalSearch

Papers by Author

He, Chen-Guang

q An Enhanced Role-Based Access Control Mechanismfor Hospital Information Systems

He, Chongnan

q Finite Volume Methods for the Second Order SingularPerturbation Problems

He, Junfeng

q The Analysis of Influence Factors of the Confidence Levelon University Students’ Network Shopping

He, Wei

q A Novel Subspace Discriminant Locality PreservingProjections for Face Recognition

Papers by Author

q Measuring Semantic Relatedness between Words UsingLexical Context

He, WenZhang

q Parabolic Adjustment of Image Clearness Algorithm Basedon Retinex Theory

He, Yunhui

q Class-Incremental Kernel Discriminative Common Vectors

He, Zhenhuan

q Research on Improved Greedy Algorithm for TrainRescheduling

Papers by Author

Hegedus, Jozsef

q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors Classifiers

Hei, Xinhong

q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPS

Hong, Bao

q Cooperative Neural Network Background Modelfor Multi-Modal Video Surveillance

Papers by Author

Hong, Han

q Design of Intelligent Decision-making System in Multi-UUVFormation Control Simulation

Hongxia, Liu

q Computer Realization of Quadratic Spline Interpolation

Hou, Yu

q Local Reconstruction Error of l2 Norm for Discriminant FeatureExtraction

Hsu, Yun-Hsiang

q Image Quality Assessment Based on Binary StructureInformation

Papers by Author

Hu, JiaJia

q The Application of Graph Theory in Old Chinese PhonologyStudy

Hu, Jun

q A Model of Emotional Agent Based on Granular Computingq Energy-efficient MAC Protocol Designed for Wireless Sensor

Network for IoT

Hu, Junlin

q Multi-Level Kernel Machine for Scene Image Classification

Papers by Author

Hu, Ronglei

q Research and Implementation of DPA-resistant SMS4 BlockCipher

Hua, Bo

q A Maximal Clique Partition Method for Network Basedon Granularity

q Research on the Maximum Flow in Large-scale Networkq A New Scheme for Information Hiding Based on Digital

Images

Huamin, Feng

q A Spam Filtering Method Based on Multi-modal FeaturesFusion

Papers by Author

Huan, Hu

q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System

Huandong, Chen

q Phylogenetic Tree of DNA Sequences Constructed by a NewMethod-H Curve

q A Blakley Secret Sharing Scheme without Trusted ShareDistributed Center

q Spectral Clustering and its Research Progress

Huang, Degen

q DBS Application to Chinese Adjectives

Papers by Author

Huang, Donghua

q Face Reconstruction from Skull Based on Partial LeastSquares Regression

Huang, Dupei

q Measuring Semantic Relatedness between Words UsingLexical Context

Huang, Hua

q Orthogonal Test Algorithm on TD-SCDMA NetworkOptimization

Huang, Jiasen

q Attribute-based Signcryption with Ciphertext-policyand Claim-predicate Mechanism

Papers by Author

Huang, Jihai

q The Implementation of Trust Model in the P2P PatchDistribution System

Huang, Taiquan

q Automatic Parameter Determination Based on a ModifiedDiscriminant Criterion for Face Recognition

Huang, Xiantong

q Schistosoma Cercariae Image Recognition via SparseRepresentation

Huawei, Wang

q A New Algorithm for Auto-Exposure Based on the AnalogyHistogram

Papers by Author

Hua-Zheng, Zhu

q Glowworm Swarm Optimization Algorithm for SolvingMulti-constrained QoS Multicast Routing Problem

Hui, Qu

q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile Communications

Hui, Wang

q Automatic Detection of Lumina in Mouse LiverImmunohistochemical Color Image Using Support VectorMachine and Cellular Neural Network

Papers by Author

Hui, Xu

q Security Authentication Scheme Based on CertificatelessSignature and Fingerprint Recognition

Huifang, Li

q Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlow

Hui-rong, Li

q Improved Differential Evolution Algorithm with AdaptiveMutation and Control Parameters

Huixian, Li

q A Novel Hash-based RFID Mutual Authentication Protocol

Papers by Author

Ilin, Alexander

q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors Classifiers

Isohara, Takamasa

q Kernel-based Behavior Analysis for Android MalwareDetection

Ji, Shirui

q An Automated Black-box Testing Approach for WSN SecurityProtocols

Papers by Author

Ji, Xinsheng

q Analysis of Abnormal Events in IMS and Research onthe Strategy of Detection

Jia, Huaping

q Neural Network in the Application of EEG Signal ClassificationMethod

Jia, Jihong

q Sufficient Optimality Conditions and Duality for a MinmaxFractional Problem

Jia, Liping

q Uniform Design Based Hybrid Genetic Algorithmfor Multiobjective Bilevel Convex Programming

Papers by Author

q Stability Analysis of Neutral-type Fuzzy Neural Networkswith Distributed Delays

Jia, Xiaoqiang

q Feature Selection Algorithm Based on the CommunityDiscovery

Jia, Yuhong

q Study on Role-Based Access Control with Time Constraint

Jia, Yuxiang

q Inducing Chinese Selectional Preference Based on HowNet

Papers by Author

Jian, Li

q An Intelligent Vehicle Monitoring System Based on Internetof Things

Jianfeng, Ma

q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks

q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework

Jiang, Dingde

q A Wavelet-Based Detection Approach to Traffic Anomalies

Papers by Author

Jiang, Han

q A New Cross-realm Group Password-based AuthenticatedKey Exchange Protocol

q Attribute-Based Authenticated Key Exchange Protocolwith General Relations

Jiang, Hua

q Fast Network Traffic Anomaly Detection Based on Iteration

Jiang, Juan

q Research on the Maximum Flow in Large-scale Networkq A New Scheme for Information Hiding Based on Digital

Images

Papers by Author

Jiang, Lijun

q Relative Local Mean Classifier with Optimized Decision Rule

Jiang, Min

q Multiobjective Interaction Programming for Two-Persons

Jiang, Rongrong

q A Bilinear Pairing-Based Key Management Schemefor Wireless Sensor Networks

Jiang, Xian

q Improvement of the MapReduce Model Based on MessageMiddleware Oriented Data Intensive Computing

Papers by Author

Jiang, Xiubao

q Clustering Based Image Denoising Using SURE-LET

Jiangfeng, Yu

q The Construction and Application of Distance and OpenExperimental Platform

JianGuo, Ju

q Research of Access Control in Electronic Medical RecordBased on UCON

Jianhua, Kang

q Design of Instrument Control System Based on LabView

Papers by Author

Jianping, Li

q Fingerprint Composition-Feature Extraction Using DirectionalFilter Banks

Jianzhong, Cao

q A New Algorithm for Auto-Exposure Based on the AnalogyHistogram

Jiao, Yong-Chang

q MOEA/D with Uniform Design for the Multiobjective 0/1Knapsack Problem

Jiaojiao, Zhang

q Improving the Performance of Personalized Recommendationwith Ontological User Interest Model

Papers by Author

Jiaxi, Chen

q Reliability Analysis of System-in-the-Loop Network PlatformBased on Delays

Jie, Liu

q A New Filled Function Algorithm for Constrained GlobalOptimization Problems

Jie, Xiong

q Research and Implementation on the Digital Medical ImageEnhancement Methods Based on Gradient Smoothand Context Smooth

Jieqing, Xing

q Spectral Clustering and its Research Progress

Papers by Author

Jin, Peng

q Improved Word Similarity Computation for Chinese UsingSub-word Information

q A Method for New Word Extraction on Chinese Large-scaleQuery Logs

Jing, Liu

q Research and Implementation on the Digital Medical ImageEnhancement Methods Based on Gradient Smoothand Context Smooth

Jing, Yuan

q Reliability Analysis of System-in-the-Loop Network PlatformBased on Delays

Papers by Author

Jinghui, Zhang

q Research on Access Control Mechanism for Digital ProductsTrading

Jingying, Li

q A Fast Handoff Method Based on RSSI and LQI in WirelessSensor Network

Jingzhou, Song

q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System

Jinhua, Zheng

q Hybrid Genetic Algorithm for TSP

Papers by Author

Jinling, Du

q A Genetic Algorithm Based on a New Fitness Functionfor Constrained Optimization Problem

Jinman, Zhang

q Hierarchical Identity-based Broadcast Encryption Schemeon Lattices

Jinmei, Zhan

q Design and Implement of SerialPort Class on Upper MachineSystem

Ji-Zhao, Liu

q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc Networks

Papers by Author

Juan, Li

q TKNN: An Improved KNN Algorithm Based on Tree Structure

Juan, Zhao

q Discretization Based on Positive Domain and InformationEntropy

Jun, Yan

q Improving the Performance of Personalized Recommendationwith Ontological User Interest Model

Papers by Author

Jun, Yang

q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network

Junjun, Song

q Iterative Learning Control of Double Servo Valve ControlledElectro Hydraulic Servo System

Juntao, Chen

q Design and Implement of SerialPort Class on Upper MachineSystem

Papers by Author

Junwei, Ge

q Improvement of the MapReduce Model Based on MessageMiddleware Oriented Data Intensive Computing

q Architecture for Component Library Retrieval on the Cloud

Kang, Hao

q The Application of Neural Network in the Intelligent FaultDiagnosis System

Ke, Wang

q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc Networks

Papers by Author

Kim, Hun

q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning Algorithms

Kuang, Haibo

q Construction of a Bilingual Cognitive Property Knowledgebase

Kubota, Ayumu

q Kernel-based Behavior Analysis for Android MalwareDetection

Kun, Liu

q Discretization Based on Positive Domain and InformationEntropy

Papers by Author

Kwok, Lam-for

q A Generic Scheme for the Construction of ContextualSignatures with Hash Function in Intrusion Detection

Lai, Juan

q A Method for New Word Extraction on Chinese Large-scaleQuery Logs

Lai, Xin

q Analytical Models for Data Dependence Violation Checkingin TLS

Lan, Luan

q The AES Encryption and Decryption Realization Basedon FPGA

Papers by Author

Lang, Bo

q A Combined Music Label Propagation Model

Lao, Fengdan

q 3G-based Remote Video Surveillance and Control Systemfor Facility Agriculture

Lee, Kai-Ip

q Lifeline: Emergency Ad Hoc Network

Lee, Tae Rim

q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning Algorithms

Papers by Author

Lei, Ren

q The Simulation of Trajectory for Homing Depth ChargeAttacking the Submarine with Different Guide Orderliness

Lei, Zhang

q Research on Industrial Building’s Reliability AssessmentBased on Projection Pursuit Model

Lendasse, Amaury

q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors Classifiers

Li, Bin

q Construction of a Bilingual Cognitive Property Knowledgebase

Papers by Author

Li, Chunsheng

q A Practical Framework for Agent-Based Hybrid IntelligentSystems

Li, Dong

q Design of the DS-UWB Communication System Basedon Chaotic Variable Spreading Factor

Li, FanZhang

q Dynamic Fuzzy Semisupervised Multitask Learningq The Estimation Algorithm of Laplacian Eigenvalues for

the Tangent Bundle

Papers by Author

Li, Fei

q Search Engine Optimization Based on Algorithm of BP NeuralNetworks

q Recovering Coverage Holes by Using Mobile Sensorsin Wireless Sensor Networks

Li, Guangye

q Query-Aware Anonymization in Location-Based Service

Li, Guohui

q Marshmallow: A Content-Based Publish-Subscribe Systemover Structured P2P Networks

Papers by Author

Li, Guoqi

q FTA Based Runtime Evaluation of System Reliabilityfor Autonomous Unmanned Vehicle

Li, Haifeng

q A Simple But Effective Stream Maximal Frequent ItemsetMining Algorithm

Li, HeCheng

q A Genetic Algorithm Based on Duality for Linear BilevelProgramming Problems

Li, Heng

q A Combined Music Label Propagation Model

Papers by Author

Li, Hongning

q An Identity-based Secure Routing Protocol in WSNs

Li, Hongping

q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar Field

Li, Hui

q Security Analysis of Some Recent Authentication Protocolsfor RFID

Li, Huiyun

q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis Attacks

Papers by Author

Li, Jiafei

q A Heuristic Genetic Process Mining Algorithmq A Heuristic Genetic Process Mining Algorithm

Li, Jie

q Adaptive Neural Control for a Class of Perturbed Time-delayNonlinear Systems

Li, JieYuan

q On the Representation and Querying of Sets of PossibleWorlds in the K-anonymity Privacy Protecting Model

Papers by Author

Li, Jing-feng

q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm Setting

Li, Jinhua

q A Hybrid Method for Solving Global Optimization Problems

Li, JiongCheng

q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWB

Li, Jiyun

q Promotion Analysis Based on Fitting in Multi-Level Space

Papers by Author

Li, Kan

q A Practical Framework for Agent-Based Hybrid IntelligentSystems

Li, Lan

q Existence of Almost Periodic and Almost AutomorphicSolutions for Second Order Differential Equations

Li, Leibo

q Co-Z Addition Operation of Hessian Curve

Li, Li

q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimization

Papers by Author

Li, Ping

q Multi-jammer Localization in Wireless Sensor Networks

Li, Qi

q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level

Li, Rui

q Attribute-Based Authenticated Key Exchange Protocolwith General Relations

q Concurrent Non-malleable Statistically Hiding Commitment

Papers by Author

Li, Shanshan

q Image Scrambling Based on Chaos Theory and VigenèreCipher

Li, Wei

q Query-Aware Anonymization in Location-Based Serviceq An Empirical Study on Credit Scoring Model for Credit Card

by Using Data Mining Technology

Li, Weichang

q An Identity-based Secure Routing Protocol in WSNs

Papers by Author

Li, Weisheng

q A General Edge Detection Method Based on the ShearTransform

Li, Xiang You

q Optimality Conditions for Fractional Programming with B (p,r, a) Invex Functions

Li, XiangDong

q A Survey on Methods of Automatic Protocol ReverseEngineering

Li, Xiangyu

q Design and Implementation of an Electromagnetic AnalysisSystem for Smart Cards

Papers by Author

Li, Xinghua

q Analysis of the Authentication Protocols Based on GameTheory

Li, Xinshe

q A Novel Group Signature Scheme Based on NTRU

Li, Xiu Ying

q Research and Implementation of DPA-resistant SMS4 BlockCipher

Li, Xiuying

q DBS Application to Chinese Adjectives

Papers by Author

Li, Ya Hui

q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks

Li, Yanbo

q Robust Adaptive Sliding Mode Control Design for a Classof Uncertain Neutral Systems with Distributed Delays

Li, You

q A Comparative Study on Appending Priority Relations of Rulesin BDI-Based Agent Model

Li, Yu

q Property-Based Remote Attestation Oriented to CloudComputing

Papers by Author

q Fast Iris Boundary Location Based on Window MappingMethod

Li, Yun-peng

q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm Setting

Li, ZengYuan

q The Study of Improved Marker-Controlled Watershed CrownSegmentation Algorithm

Li, Zhan

q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability Matrix

Papers by Author

Liang, Chen

q Hierarchical ID-Based Blind Signature from Lattices

Liang, Qiao

q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit Board

Liang, Qixuan

q A QoS-based Self-adaptive Framework for OpenAPI

Liang, Ren

q VAR Model Analysis on Japan’s OFDI and Industrial StructuralUpgrading

Papers by Author

Liang, YiXiong

q Learning Local Binary Patterns with Enhanced Boostingfor Face Recognition

Liao, Jibiao

q An Empirical Study on Credit Scoring Model for Credit Cardby Using Data Mining Technology

Liao, Shizhong

q An Error Bound for Eigenvalues of Graph Laplacianwith Bounded Kernel Function

Liaojun, Pang

q A Novel Hash-based RFID Mutual Authentication Protocol

Papers by Author

Lidong, Wang

q A Study on IT-security Vocabulary for Domain DocumentClassification

Lin, Peng

q Research on Characteristics of Plates on Chinese StockMarket

q Dynamic Risk Measurement of Futures based on WaveletTheory

Lin, Weimin

q A Markov Chain-based Availability Model of Virtual ClusterNodes

Papers by Author

Lin, Xibin

q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWB

Lin, Yuanguai

q The Application of the Internet of Things in Hainan TourismScenic Spot

Lin, Yuming

q A Comparative Study on Appending Priority Relations of Rulesin BDI-Based Agent Model

Linao, Tang

q A New Algorithm for Auto-Exposure Based on the AnalogyHistogram

Papers by Author

Ling, Jie

q Information Hiding Algorithm Based on Stentiford VisualAttention Model

Lingling, Hu

q An Intelligent Vehicle Monitoring System Based on Internetof Things

Liping, Chen

q The Design of Cooperative Intrusion Detection System

Liping, Qian

q A Study on IT-security Vocabulary for Domain DocumentClassification

Papers by Author

Liu, Caixia

q Analysis of Wireless Mesh Network Security Based on NodeFunction

q Analysis of Abnormal Events in IMS and Research onthe Strategy of Detection

Liu, Changqing

q Probabilistic Trajectory Modeling of Flight Vehicles Basedon Parameter Deviations

q Methodology for Statistical Distribution Determinationof Various Data Sources

q Sequential Bayesian Method for Formulating Uncertaintyin Sparse Data

Papers by Author

Liu, Chunlei

q Query-Aware Anonymization in Location-Based Service

Liu, Cong

q Analytical Models for Data Dependence Violation Checkingin TLS

Liu, Dalian

q A Genetic Algorithm Based on a New Fitness Functionfor Constrained Optimization Problem

Liu, Gang

q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient Pruning

Papers by Author

Liu, Guang-liang

q An ID-based (k, t, n) Threshold Group Signature Scheme

Liu, Guohua

q Modeling the Uncertain Data in the K-anonymity PrivacyProtection Model

q On the Representation and Querying of Sets of PossibleWorlds in the K-anonymity Privacy Protecting Model

q Similarity Matching over Uncertain Time Series

Liu, Hailin

q The 0/1 Multi-objective Knapsack Problem Based on RegionalSearch

Papers by Author

Liu, Hai-lin

q A Weighted K-hyperline Clustering Algorithm for Mixing MatrixEstimation on Bernoulli-Gaussian Sources

Liu, Hui

q The Multispectral Image Edge Detection Based on CliffordGradient

Liu, Jia

q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm

Liu, Jie

q A Hybrid Method for Solving Global Optimization Problems

Papers by Author

q Research on Industrial Building’s Reliability AssessmentBased on Projection Pursuit Model

Liu, Ju

q Information Hiding Algorithm Based on Stentiford VisualAttention Model

Liu, Liu

q FBctlr - A Novel Approach for Storage PerformanceVirtualization

Liu, LiXiong

q Active Contours with Adaptively Normal Biased GradientVector Flow External Force

Papers by Author

Liu, PengYuan

q Another View of the Features in Supervised Chinese WordSense Disambiguation

Liu, Ping

q Saliency-based Adaptive Scaling for Image Retargeting

Liu, Rui

q Parabolic Adjustment of Image Clearness Algorithm Basedon Retinex Theory

Liu, Shuxin

q Analysis of Wireless Mesh Network Security Based on NodeFunction

Papers by Author

Liu, Wei

q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks

q Contours-Matching in Building Reconstruction from a SingleImage

Liu, Xi

q Simplified Business Process Model Mining Basedon Structuredness Metric

Liu, Xia

q Optimization of Vehicle Routing Problem Based on Max-MinAnt System with Parameter Adaptation

Papers by Author

q Optimization of Vehicle Routing Problem Based on Max-MinAnt System with Parameter Adaptation

Liu, Xiao Bin

q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level

Liu, Yang

q Schistosoma Cercariae Image Recognition via SparseRepresentation

Liu, Yong

q An Error Bound for Eigenvalues of Graph Laplacianwith Bounded Kernel Function

Papers by Author

Liu, Yong-lin

q Weak-pseudo-R0 Algebras

Liu, Yubao

q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability Matrix

Liu, YunCheng

q Security Problems and Countermeasures with CommercialBanking Computer Networks

Liu, Zaixue

q New Heuristic Algorithm of RNA Secondary StructurePrediction with Pseudoknots

Papers by Author

Liu, Zhao

q An Improved Software Reliability Model Considering FaultCorrection Rate

Liu, Zhen Han

q FBctlr - A Novel Approach for Storage PerformanceVirtualization

Liu, ZhenDong

q New Heuristic Algorithm of RNA Secondary StructurePrediction with Pseudoknots

Liu, Zhenghong

q Study on Role-Based Access Control with Time Constraint

Papers by Author

Liu, Zhiqin

q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation

Li-Xiao, Ma

q A Line-up Competition Differential Evolution Algorithm forthe Generalized Assignment Problem

Long, Liu

q Pedestrian Recognition Based on Saliency Detectionand Kalman Filter Algorithm in Aerial Video

Long, Shujun

q Stability Analysis of Neutral-type Fuzzy Neural Networkswith Distributed Delays

Papers by Author

Longmei, Zhang

q A Model Driven Approach for Self-Healing Computing System

Longqing, Shi

q Data Sources of Webometrics

Looi, Mark

q Modeling and Simulating the Propagation of UnstructuredPeer-to-Peer Worms

Lu, Miao

q Researches and Simulations of Information Hiding in AlamoutiTransmission System

Papers by Author

Lu, Qiu

q Research on Privacy-preserving in Distributed Mining Basedon the Attribute Similarity

Lu, Xueyu

q Spatial Prediction of Dissolved Organic Carbon Using GISand ANN Modeling in River Networks

Lu, Yao

q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient Pruning

Lun, Xie

q Research of Rapid Attention-Information Extractionin Human-Robot Interaction

Papers by Author

Luo, Jiang-feng

q Action-Seeking Team Coordination for Unmanned VehiclesTeam Planning

Luo, Li-gui

q Qualitative Analysis for a Kind of Predator-Prey Modelof Holling III-Function Response with Nonlinear DensityDependent

Luo, Min

q Design and Implementation of Bus Net Routing Algorithm

Luo, Ming

q Certificateless Broadcast Signcryption with Forward Secrecy

Papers by Author

Luo, Qi

q A New Community Structure Detection Method Basedon Structural Similarity

Luo, Ruiyi

q Software Fault Prediction Framework Based onaiNet Algorithm

Luo, Wencai

q Probabilistic Trajectory Modeling of Flight Vehicles Basedon Parameter Deviations

q Methodology for Statistical Distribution Determinationof Various Data Sources

Papers by Author

q Sequential Bayesian Method for Formulating Uncertaintyin Sparse Data

Luo, Yong-long

q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional Space

Luo, Ziqiang

q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software Reliability

q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model Theory

q Qualitative Modeling for Parallel Software System ReliabilityEvaluation

Papers by Author

Lv, Chao

q Security Analysis of Some Recent Authentication Protocolsfor RFID

Lv, Yi

q Fast Verification of Memory Consistency for ChipMulti-Processor

Lv, Zheng

q Fast Verification of Memory Consistency for ChipMulti-Processor

Ma, Jian Feng

q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks

Papers by Author

q Secure Data Aggregation Scheme for Clustered WirelessSensor Networks

Ma, Jianfeng

q PSO-BP Neural Network in Reservoir Parameter DynamicPrediction

q Analysis of the Authentication Protocols Based on GameTheory

Ma, Jun

q Multi-Side Multi-Instance Algorithm

Ma, Shengquan

q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software Reliability

Papers by Author

q Qualitative Modeling for Parallel Software System ReliabilityEvaluation

Ma, Sheng-quan

q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value Integral

Ma, Weigang

q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPS

Ma, Zeng

q Energy-efficient MAC Protocol Designed for Wireless SensorNetwork for IoT

Papers by Author

Mao, Xiaoqin

q Security Problems and Countermeasures with CommercialBanking Computer Networks

Maozhi, Xu

q Multi-Undeniable Signature Schemes

McCarthy, Diana

q Improved Word Similarity Computation for Chinese UsingSub-word Information

Mei, Denghua

q An Improved Software Reliability Model Considering FaultCorrection Rate

Papers by Author

Mei, Jie Long

q Automatic Detection of Lumina in Mouse LiverImmunohistochemical Color Image Using Support VectorMachine and Cellular Neural Network

Meng, Yanshuang

q Existence and Global Attractivity of Almost Periodic Solutionof Hopfield Neural Networks with Time Delays

Meng, Yuxin

q A Generic Scheme for the Construction of ContextualSignatures with Hash Function in Intrusion Detection

Meng, Zhiqing

q Multiobjective Interaction Programming for Two-Persons

Papers by Author

Miao, Qiguang

q A General Edge Detection Method Based on the ShearTransform

Miao, Zhang

q A Fast Handoff Method Based on RSSI and LQI in WirelessSensor Network

Miche, Yoan

q Methodology for Behavioral-based Malware Analysisand Detection Using Random Projections and K-NearestNeighbors Classifiers

Papers by Author

Min, Li

q A Secondary Image Denoising Model Based on the LocalEnergy Operator

q The Iterative Regularization Method Based on ImageDecomposition Model

Ming, Zhengfeng

q The Finite Element Analysis of the Electromagnetic LevitationSystem Based on the Large Air Gap

Mingchun, Wang

q Discretization Based on Positive Domain and InformationEntropy

Papers by Author

Mo, Jiajie

q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability Matrix

Motta, Gustavo Henrique Matos Bezerra

q A Security API for Multimodal Multi-biometric ContinuousAuthentication

Na, Li

q An Access Control Mode Based on Information Flow Graph

Nan, Li

q Research of Rapid Attention-Information Extractionin Human-Robot Interaction

Papers by Author

Nian, Lai

q Hybrid Genetic Algorithm for TSP

Nie, Ziqing

q An Implementation Method for Converting the Erhu Musicfrom Wav to Mid

Ning, Huang

q Reliability Analysis of System-in-the-Loop Network PlatformBased on Delays

Ning, JianGuo

q Streamline-based Visualization of 3D Explosion Fields

Papers by Author

Ning, Jianting

q A Trivariate Polynomial-based Dynamic Key ManagementScheme for Wireless Sensor Networks

q Optimized Approach for Computing Multi-base Chains

Ning, Xi

q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks

Niu, Ben

q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimization

q Security Analysis of Some Recent Authentication Protocolsfor RFID

Papers by Author

Niu, Wen Sheng

q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks

Niu, Yun

q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor

Olsen, Jesper

q Voice-based Local Search Using a Language ModelLook-ahead Structure for Efficient Pruning

OuYang, Jihong

q A Heuristic Genetic Process Mining Algorithmq A Heuristic Genetic Process Mining Algorithm

Papers by Author

Pan, Shaowei

q PSO-BP Neural Network in Reservoir Parameter DynamicPrediction

Pan, Xiaoying

q Using Organizational Evolutionary Particle Swarm Techniquesto Generate Test Cases for Combinatorial Testing

Pang, Baochuan

q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge Cue

Pang, Liaojun

q Fast Network Traffic Anomaly Detection Based on Iteration

Papers by Author

Pang, Sulin

q Geometric Recognitions Models of Fault Characteristicsin Mobile Core Network

q The BSC Alarm Management System Based on Rough SetTheory in Mobile Communication

Pei, Qingqi

q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model

q A Trust-based Dynamic Secure Service Discovery Modelfor Pervasive Computing

q An Automated Black-box Testing Approach for WSN SecurityProtocols

Papers by Author

Peifeng, Hao

q Study on Friction Coefficient Mechanism Model of TandemCold Mill in Unstable Condition

Peng, Jianhua

q Analysis of Wireless Mesh Network Security Based on NodeFunction

Peng, Kai

q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks

Peng, Shuoling

q Novel Quantization Watermarking Based on Random AngleModulation

Papers by Author

Peng-jun, Zhao

q Improved Differential Evolution Algorithm with AdaptiveMutation and Control Parameters

Ping, Yin

q A Novel Hash-based RFID Mutual Authentication Protocol

Puliafito, Antonio

q Achieving Distributed System Information Security

Pulin, Zhang

q A Digital Watermarking Algorithm Based on Wavelet PacketTransform and BP Neural Network

Papers by Author

Qi, He

q Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlow

Qi, Wang

q A Real Time Multi-Scale Correlation Analysis Method andits Application on the Data Mining in Thermodynamic Process

Qi, Yue

q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model

Qiao, Jianping

q Information Hiding Algorithm Based on Stentiford VisualAttention Model

Papers by Author

Qiao, Kang

q A Digital Watermarking Algorithm Based on Wavelet PacketTransform and BP Neural Network

Qijian, Xu

q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks

Qi-jun, Liu

q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network

Papers by Author

Qin, Chen

q Hierarchical Identity-based Broadcast Encryption Schemeon Lattices

Qin, Lang

q The Reliable Transmission Research of the Random Datain WSN Earthen Sites Health Monitoring

Qin, Wenda

q A Wavelet-Based Detection Approach to Traffic Anomalies

Qing, Huang Ming

q Fingerprint Composition-Feature Extraction Using DirectionalFilter Banks

Papers by Author

Qingfeng, Zhao

q Data Sources of Webometrics

Qingqi, Pei

q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks

Qingxian, Wang

q Systematical Vulnerability Detection in Browser ValidationMechanism

Qingxuan, Jia

q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System

Papers by Author

Qiu, Baozhi

q A Boundary Detection Algorithm of Clusters based on DualThreshold Segmentation

Qiu, Jing

q An Image Encryption and Authentication Scheme

Qu, Xiaohui

q Learning Local Binary Patterns with Enhanced Boostingfor Face Recognition

Qun, Fang

q Stochastic Modeling File Population in P2P Network

Papers by Author

Qun, Zhang

q Obtaining the Resonant Frequency of the Bubble in the ShipWake by ANSYS

Ren, Lian

q Multi-Agents Model Analysis for the Evolution of IndustrialClusters

Ren, Yueou

q The Application of Neural Network in the Intelligent FaultDiagnosis System

Rong, Li Chao

q Fingerprint Composition-Feature Extraction Using DirectionalFilter Banks

Papers by Author

Schwind, Camilla

q Belief Base Change on Implicant Sets: How to Give UpElements of a Belief Based on Literal Level

Shan, Rong

q Constructing the Expandability Web Service Based Linux

Shan-Zheng, Cheng

q The Simulation of Trajectory for Homing Depth ChargeAttacking the Submarine with Different Guide Orderliness

Shaojuan, Yu

q Iterative Learning Control of Double Servo Valve ControlledElectro Hydraulic Servo System

Papers by Author

Shen, Fang

q A Trust-based Dynamic Secure Service Discovery Modelfor Pervasive Computing

Shen, Rui

q Multiobjective Interaction Programming for Two-Persons

Shen, Yan

q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level

Shen, Yu Long

q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks

Papers by Author

Sheng, Zhong

q Researching on the Growth Operator SWFZIRS of GrowthEvolution Algorithms

q Algorithm of Distribution Estimation for Node Localizationin Wireless Sensor Network

Shengjie, Sun

q Researching on the Growth Operator SWFZIRS of GrowthEvolution Algorithms

Shengjie, Wang

q Design of Intelligent Decision-making System in Multi-UUVFormation Control Simulation

Papers by Author

Shengrong, Gong

q A Saliency Detection Model Based on Multi-feature Fusionq Pedestrian Recognition Based on Saliency Detection

and Kalman Filter Algorithm in Aerial Video

Shi, Caiyun

q The Application of Binary Particle Swarm Algorithm in FaceRecognition

Shi, Liwen

q Global Prefetcher Aggressiveness Controlfor Chip-Multiprocessor

Papers by Author

Shi, Xiong

q Real-time LOD Algorithm Based on Triangle CollapseOptimization

q CFD Numerical Simulation of Exhaust Muffler

Shin, Sang Uk

q Efficient e-Discovery Process Utilizing Combination Methodof Machine Learning Algorithms

Shu, Li Cheng

q Identity-based SIP Authentication and Key Agreement

Papers by Author

ShuangCheng, Ma

q Using the Callback Function Realization Touch ScreenGestures Recognition of Computer

Shulei, Wu

q Phylogenetic Tree of DNA Sequences Constructed by a NewMethod-H Curve

q Algorithm of Distribution Estimation for Node Localizationin Wireless Sensor Network

q A Blakley Secret Sharing Scheme without Trusted ShareDistributed Center

Papers by Author

Shu-qing, Chen

q A Line-up Competition Differential Evolution Algorithm forthe Generalized Assignment Problem

Si, Yain-Whar

q Lifeline: Emergency Ad Hoc Network

Song, Bo

q Model Composition and Generating Tests for WebApplications

Song, Huaguang

q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum Reservoir

Papers by Author

Song, Ping

q Data Mining Technique in the Internal Auditing of EnterpriseGroups

Song-sen, Yu

q An Optimal Architecture of Middle Agents in Multi-AgentSystems

Studer, Thomas

q An Application of Justification Logic to Protocol Verification

Su, Shenghui

q Analysis of the Success Rate of the LLL Lattice BasisReduction

Papers by Author

q An Improvement and a New Design of Algorithms for Seekingthe Inverse of an NTRU Polynomial

Su, Yu

q The Implementation of Trust Model in the P2P PatchDistribution System

Su, Zhen

q Evaluating the Effect of Loading Forensic Tools on the VolatileMemory for Digital Evidences

Su, Zou

q Correlation Factor Analysis of FEA Model SimplificationMethods of Printed Circuit Board

Papers by Author

Sun, Bo

q Multiresolution Streamline Placement for 2D Flow Fields

Sun, Chunsheng

q Energy-efficient MAC Protocol Designed for Wireless SensorNetwork for IoT

Sun, Hui

q The Analysis of Influence Factors of the Confidence Levelon University Students’ Network Shopping

Sun, Jiande

q Information Hiding Algorithm Based on Stentiford VisualAttention Model

Papers by Author

Sun, Li

q Promotion Analysis Based on Fitting in Multi-Level Space

Sun, Lingyan

q A QoS-based Self-adaptive Framework for OpenAPI

Sun, Peng

q Structural Health Monitoring via Dynamic Visualization

Sun, Rui

q A Method for New Word Extraction on Chinese Large-scaleQuery Logs

Sun, Tieli

q Study on Role-Based Access Control with Time Constraint

Papers by Author

Sun, Xiaoping

q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm

Sun, Xingchun

q Security Problems and Countermeasures with CommercialBanking Computer Networks

Sun, Xinxin

q Inertia Weight Particle Swarm Optimization with BoltzmannExploration

Sun, Zheng-Chun

q Face Recognition with Statistical Local Line Binary Pattern

Papers by Author

Su-qin, Zhang

q Spares Consumption Prediction Based on BP Neural Networkq Spares Consumption Quota Model Based on BP Neural

Network

Takemori, Keisuke

q Kernel-based Behavior Analysis for Android MalwareDetection

Tan, Jing

q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar Field

Papers by Author

Tan, Lijing

q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimization

Tan, Yan-Yan

q MOEA/D with Uniform Design for the Multiobjective 0/1Knapsack Problem

Tang, Guochun

q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model Theory

Tang, Luo-hao

q Action-Seeking Team Coordination for Unmanned VehiclesTeam Planning

Papers by Author

Tang, Xuri

q Construction of a Bilingual Cognitive Property Knowledgebase

Tao, Wang

q Design of Instrument Control System Based on LabView

Teng, Guanghui

q 3G-based Remote Video Surveillance and Control Systemfor Facility Agriculture

Thing, Vrizlynn L.L.

q Design of a Digital Forensics Evidence Reconstruction Systemfor Complex and Obscure Fragmented File Carving

Papers by Author

Tian, Feng

q Experimental Study the Measurement of Acoustic Wave FlightTime under Strong Noise in the Boiler

q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm

Tian, Xiaohui

q Soft-Voting Classification using Locally Linear Reconstruction

Tian, Yan

q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar Field

Tianxiang, Feng

q Computer Realization of Quadratic Spline Interpolation

Papers by Author

Tian-yi, Cai

q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile Communications

Tsai, Wen-Nung

q An Efficient Linear Text Segmentation Algorithm UsingHierarchical Agglomerative Clustering

Tseng, Judy C.R.

q An Efficient Linear Text Segmentation Algorithm UsingHierarchical Agglomerative Clustering

U, Leong Hou

q Lifeline: Emergency Ad Hoc Network

Papers by Author

Wang, Anhua

q Simplified Business Process Model Mining Basedon Structuredness Metric

Wang, Bin

q Level Set Region Based Image Segmentation Using LatticeBoltzmann Method

Wang, Caifen

q An Improved Signcryption with Proxy Re-encryption andits Application

Wang, Changji

q Attribute-based Signcryption with Ciphertext-policyand Claim-predicate Mechanism

Papers by Author

Wang, Chuanyun

q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm

Wang, Chunling

q An Interactive Charge Scheme with Rewardand Non-repudiation for Wireless Mesh Network

Wang, ChunXiao

q Multi-objective Optimization of Bus Dispatching Basedon Improved Genetic Algorithm

Wang, Feng

q Information Hiding Algorithm Based on Stentiford VisualAttention Model

Papers by Author

Wang, Guoyu

q Testing Anti-denial of Service Attacks Based on Mobile Agent

Wang, Haiquan

q Design and Implementation of Bus Net Routing Algorithm

Wang, HaiYang

q Optimization Plan of Using the Arrival and Departure Trackin District Station Based on Hybrid Algorithm

Wang, Hao

q Attribute-Based Authenticated Key Exchange Protocolwith General Relations

q Concurrent Non-malleable Statistically Hiding Commitment

Papers by Author

Wang, Hong

q Improved BFO with Adaptive Chemotaxis Step for GlobalOptimization

Wang, Huimei

q Testing Anti-denial of Service Attacks Based on Mobile Agent

Wang, Ji He

q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level

Wang, Jianxin

q Synthesis Algorithm of Homologous Detection Basedon Analytic Hierarchy Process

Papers by Author

Wang, Jie

q A Rational Secret Sharing Scheme Based on Repeated Game

Wang, Jing

q A Neural Network for a Class of Horizontal LinearComplementary Problems

Wang, Jingyi

q Exponentially Synchronization of Stochastic ComplexNetworks with Time-varying Delays and Switching Topologyvia Pinning Control

q On Cluster Synchronization for Linearly Coupled ComplexNetworks

Papers by Author

Wang, Li

q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor

Wang, Lian Hai

q Evaluating the Effect of Loading Forensic Tools on the VolatileMemory for Digital Evidences

Wang, Liangmin

q Recovering Coverage Holes by Using Mobile Sensorsin Wireless Sensor Networks

Wang, Lihua

q Design and Implementation of Bus Net Routing Algorithm

Papers by Author

Wang, Lin

q Approximation Kernel 2DPCA by Mixture of Vector and MatrixRepresentation

Wang, Litao

q Analysis and Measurement on the ElectromagneticCompromising Emanations of Computer Keyboards

Wang, Mingqiang

q Attack on the Cryptosystem Based on DLP

Wang, Ning

q The Application of Graph Theory in Old Chinese PhonologyStudy

Papers by Author

Wang, Ping

q An Image Encryption and Authentication Scheme

Wang, Qiang

q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value Integral

Wang, Rong

q Soft-Voting Classification using Locally Linear Reconstructionq Normalizing Modularity Matrices for Data Clustering

Wang, Rongpei

q DBS Application to Chinese Adjectives

Papers by Author

Wang, Ruizhong

q Stock Selection Based on Data Clustering Method

Wang, Ruliang

q Adaptive Neural Control for a Class of Perturbed Time-delayNonlinear Systems

q Robust Adaptive Sliding Mode Control Design for a Classof Uncertain Neutral Systems with Distributed Delays

Wang, ShouYang

q Geometric Recognitions Models of Fault Characteristicsin Mobile Core Network

Papers by Author

Wang, Shuang

q A Boundary Detection Algorithm of Clusters based on DualThreshold Segmentation

Wang, Shuo

q Search Engine Optimization Based on Algorithm of BP NeuralNetworks

Wang, Taowen

q The Estimation of Mixing Matrix Based on Bernoulli-GaussianModel

Wang, Tzai Der

q Minimal Echo State Networks for Visualisation

Papers by Author

Wang, Wei

q Similarity Matching over Uncertain Time Series

Wang, Weiming

q Saliency-based Adaptive Scaling for Image Retargeting

Wang, Weiqiang

q Fast and Effectively Identify Pornographic Images

Wang, Xiaoli

q Energy-efficient Multi-task Scheduling Based on MapReducefor Cloud Computing

Papers by Author

Wang, Xing

q Analysis on Cloud Computing-based Logistics InformationNetwork Mode

Wang, Xin-Kuan

q MOEA/D with Uniform Design for the Multiobjective 0/1Knapsack Problem

Wang, Xu An

q K-times Proxy Re-encryptionq Proxy Re-encryption with Keyword Search from Anonymous

Conditional Proxy Re-encryption

Wang, Ya

q Design and Implementation of Bus Net Routing Algorithm

Papers by Author

Wang, Yaobin

q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation

Wang, Yi

q Streamline-based Visualization of 3D Explosion Fields

Wang, Yichuan

q PSO-BP Neural Network in Reservoir Parameter DynamicPrediction

Wang, Yilei

q 2-out-of-2 Rational Secret Sharing in Extensive Form

Papers by Author

Wang, Yingmin

q Obtaining the Resonant Frequency of the Bubble in the ShipWake by ANSYS

Wang, Yingying

q The Application of Neural Network in the Intelligent FaultDiagnosis System

Wang, Yong

q The Guidance and Control of Small Net-recovery UAV

Wang, Yuan

q A Fuzzy Portfolio Model Considering Transaction Costs

Papers by Author

Wang, Yuping

q A Hybrid Multiobjective Differential Evolution Algorithm Basedon Improved ε-Dominance

q Energy-efficient Multi-task Scheduling Based on MapReducefor Cloud Computing

q Uniform Design Based Hybrid Genetic Algorithmfor Multiobjective Bilevel Convex Programming

Wang, Zhiying

q Analytical Models for Data Dependence Violation Checkingin TLS

Wang, Ziqing

q K-times Proxy Re-encryption

Papers by Author

q Proxy Re-encryption with Keyword Search from AnonymousConditional Proxy Re-encryption

Wang-da, Chen

q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile Communications

Wei, Dali

q Inertia Weight Particle Swarm Optimization with BoltzmannExploration

Wei, Lu

q A Model Driven Approach for Self-Healing Computing System

Papers by Author

Wei, Wang

q A Data Distribution Platform Based on Event-DrivenMechanism

Wei-dong, Yang

q An Adaptive Connectivity Data Dissemination Schemein Vehicular Ad-hoc Networks

Weihe, Chen

q Research of Access Control in Electronic Medical RecordBased on UCON

Weiqiang, Zhang

q The Iterative Regularization Method Based on ImageDecomposition Model

Papers by Author

Weitao, Ha

q The Design of Cooperative Intrusion Detection System

Wei-wei, Liu

q Improving Privacy of Property-based Attestation withouta Trusted Third Party

Wen, Guihua

q Relative Local Mean Classifier with Optimized Decision Rule

Wen, Jiechang

q The Estimation of Mixing Matrix Based on Bernoulli-GaussianModel

Papers by Author

Wen, Rui

q The Finite Element Analysis of the Electromagnetic LevitationSystem Based on the Large Air Gap

Wencai, He

q VVCS: Verifiable Visual Cryptography Scheme

Wen-cai, He

q A Watermarking-based Visual Cryptography Schemewith Meaningful Shares

Wu, Daiwen

q The Application Study about Lucene in Document Retrievalfor Office

Papers by Author

Wu, Haibo

q Analysis of the Success Rate of the LLL Lattice BasisReduction

Wu, Honghua

q Similarity Matching over Uncertain Time Series

Wu, Jian

q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks

Wu, Jiawei

q Modeling the Uncertain Data in the K-anonymity PrivacyProtection Model

Papers by Author

Wu, Ji-Wei

q An Efficient Linear Text Segmentation Algorithm UsingHierarchical Agglomerative Clustering

Wu, Keke

q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis Attacks

Wu, Lihua

q A Cloud Model Approach to the Modification ofthe Exponential Function Model for Software Reliability

q A Modification to the Jelinski-Moranda Software ReliabilityGrowth Model Based on Cloud Model Theory

Papers by Author

q Qualitative Modeling for Parallel Software System ReliabilityEvaluation

Wu, Liji

q Design and Implementation of an Electromagnetic AnalysisSystem for Smart Cards

q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor

Wu, Tiejun

q A Cloud Model Based Computational Intelligence Algorithmfor Parameter Identification of Chaotic Systems

Wu, Xiaochuan

q Minimal Echo State Networks for Visualisation

Papers by Author

Wu, Xiu Qiang

q Secure Data Aggregation Scheme for Clustered WirelessSensor Networks

Wu, Xuefei

q Global Synchronization of Hybrid Coupled Neural Networkswith Time-varying Delay

Wu, Yuan Sheng

q An Embedded Software Fusion Power Model Basedon Algorithm and Micro-architectural Level

Wu, Yunfang

q Improved Word Similarity Computation for Chinese UsingSub-word Information

Papers by Author

Wu, Zhongke

q Face Reconstruction from Skull Based on Partial LeastSquares Regression

Wu, Zong-Sheng

q Application of Cloud Storage in Traffic Video Detection

Xi, Houwei

q A Markov Chain-based Availability Model of Virtual ClusterNodes

Xi, Jianrong

q A Design and Implement of IPS Based on Snort

Papers by Author

Xia, Chunhe

q Design and Implementation of Bus Net Routing Algorithm

Xian, Ming

q Testing Anti-denial of Service Attacks Based on Mobile Agent

Xiang, Xu

q A Sybil-resilient Contribution Transaction Protocol

Xiao, Chuang-Bai

q A Security Model for Information Systems with Multi-levelSecurity

Papers by Author

Xiao, Fanyi

q Learning Local Binary Patterns with Enhanced Boostingfor Face Recognition

Xiao, Henghui

q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWB

Xiao-cong, Guo

q An Image Encryption Algorithm Based on Scramblingand Substitution Using Hybrid Chaotic Systems

Xiaofang, Guo

q A Hybrid Simplex Multi-objective Evolutionary Algorithm Basedon Preference Order Ranking

Papers by Author

Xiaohua, Chen

q A Genetic Algorithm Based on a New Fitness Functionfor Constrained Optimization Problem

Xiaoli, Sun

q The Iterative Regularization Method Based on ImageDecomposition Model

Xiao-li, Sun

q A Secondary Image Denoising Model Based on the LocalEnergy Operator

Xiaoni, Cheng

q VVCS: Verifiable Visual Cryptography Scheme

Papers by Author

Xiao-ni, Cheng

q A Watermarking-based Visual Cryptography Schemewith Meaningful Shares

Xiao-ya, Li

q An Optimal Architecture of Middle Agents in Multi-AgentSystems

Xie, Guo

q A Safety Framework and Alarming Model for Train OperationEnvironment Based on CPS

Xie, Min

q An Identity-based Secure Routing Protocol in WSNs

Papers by Author

Xie, W.X.

q Monitoring the PSO Process Based on Fuzzy RandomVariables

Xie, Xiaolong

q Analysis of Abnormal Events in IMS and Research onthe Strategy of Detection

Xie, Yongming

q Saliency-based Adaptive Scaling for Image Retargeting

Xi-hong, Wu

q Performance Analysis of the Single Pattern MatchingAlgorithm Based on Prefix Searching

Papers by Author

Xin, Gao

q A Human-Computer Interaction Method with Multi-DimensionalInformation in the Teleoperation Augmented Reality System

Xin, SiYuan

q Property-Based Remote Attestation Oriented to CloudComputing

Xin, Wan

q Hierarchical ID-Based Blind Signature from Lattices

Xingbao, Wang

q Pedestrian Recognition Based on Saliency Detectionand Kalman Filter Algorithm in Aerial Video

Papers by Author

Xinghua, Yang

q A Spam Filtering Method Based on Multi-modal FeaturesFusion

Xing-lan, Zhang

q Improving Privacy of Property-based Attestation withouta Trusted Third Party

Xining, Cui

q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework

Xin-Ping, Liu

q A Real Time Multi-Scale Correlation Analysis Method andits Application on the Data Mining in Thermodynamic Process

Papers by Author

Xiong, Shuming

q Recovering Coverage Holes by Using Mobile Sensorsin Wireless Sensor Networks

Xu, Bingxin

q Sparse Representation for Multi-Label Image Annotation

Xu, C.

q Monitoring the PSO Process Based on Fuzzy RandomVariables

q Time Series Forecasting Method Based on Huang Transformand BP Neural Network

Xu, Chao

q Multi-Side Multi-Instance Algorithm

Papers by Author

q A New Scheme for Information Hiding Based on DigitalImages

Xu, Chen

q Global Synchronization of Hybrid Coupled Neural Networkswith Time-varying Delay

q The Multispectral Image Edge Detection Based on CliffordGradient

Xu, Guoqing

q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis Attacks

Xu, Jianfeng

q Certificateless Broadcast Signcryption with Forward Secrecy

Papers by Author

Xu, Jing

q Resource Optimization for Uncertain Traffic Demandin Multi-radio Multi-channel Wireless Networks

Xu, Jun

q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor

Xu, Kaiying

q Search Engine Optimization Based on Algorithm of BP NeuralNetworks

Xu, Kang

q Accelerating Block Cryptography Algorithms in ProcedureLevel Speculation

Papers by Author

Xu, Lu

q FBctlr - A Novel Approach for Storage PerformanceVirtualization

Xu, Pengfei

q A General Edge Detection Method Based on the ShearTransform

Xu, Qiuliang

q 2-out-of-2 Rational Secret Sharing in Extensive Formq A New Cross-realm Group Password-based Authenticated

Key Exchange Protocolq Attribute-Based Authenticated Key Exchange Protocol

with General Relations

Papers by Author

q Concurrent Non-malleable Statistically Hiding Commitment

Xu, Wu

q Stochastic Modeling File Population in P2P Network

Xu, Xinsheng

q Multiobjective Interaction Programming for Two-Persons

Xu, Xirong

q An Important Property about Vertex Distance of CrossedCubes CQn

Xu, Xu

q An Intelligent Vehicle Monitoring System Based on Internetof Things

Papers by Author

Xu, Yiping

q Image Matching Algorithm Based on Analysis of Reliabilityin Log-Polar Field

Xu, Zhengzheng

q A Wavelet-Based Detection Approach to Traffic Anomalies

Xuan, Wang

q A Novel Hash-based RFID Mutual Authentication Protocol

Xue, Lifang

q Speech Feature Analysis Using Temporal Linear Embedding

Xue, Ru

q Application of Cloud Storage in Traffic Video Detection

Papers by Author

Xue, Zhou

q Fast Iris Boundary Location Based on Window MappingMethod

Xueming, Tang

q Hierarchical ID-Based Blind Signature from Lattices

Xunxun, Shen

q Multi-Undeniable Signature Schemes

Yafen, Shen

q Reliability Analysis of System-in-the-Loop Network PlatformBased on Delays

Papers by Author

Yahui, Li

q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework

Yameng, Cheng

q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework

Yan, Shenhai

q Schistosoma Cercariae Image Recognition via SparseRepresentation

Yanchun, Guo

q A Lower Bound for the Smarandache Function Value

Papers by Author

Yanfei, Yu

q Simulation of Influence of Desired Velocity Distributionand Herd Effect on Pedestrian Evacuation

Yang, Aijun

q Data Mining Technique in the Internal Auditing of EnterpriseGroups

Yang, Bo

q Communities Detection with Applications to Real-WorldNetworks Analysis

Yang, Chao

q Optimization of Vehicle Routing Problem Based on Max-MinAnt System with Parameter Adaptation

Papers by Author

q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model

q An Automated Black-box Testing Approach for WSN SecurityProtocols

Yang, Dan

q Analysis of the Authentication Protocols Based on GameTheory

Yang, Fei

q An Interactive Charge Scheme with Rewardand Non-repudiation for Wireless Mesh Network

Yang, Jianhui

q A Fuzzy Portfolio Model Considering Transaction Costs

Papers by Author

q Research on Characteristics of Plates on Chinese StockMarket

q Dynamic Risk Measurement of Futures based on WaveletTheory

Yang, Jun-jie

q A Weighted K-hyperline Clustering Algorithm for Mixing MatrixEstimation on Bernoulli-Gaussian Sources

Yang, Shiying

q An Implementation Method for Converting the Erhu Musicfrom Wav to Mid

Papers by Author

Yang, Ting

q A Trivariate Polynomial-based Dynamic Key ManagementScheme for Wireless Sensor Networks

q Optimized Approach for Computing Multi-base Chains

Yang, Xiaoping

q Measuring Semantic Relatedness between Words UsingLexical Context

Yang, Xing

q Privacy Preserving Naïve Bayesian Classifier Basedon Transition Probability Matrix

Papers by Author

Yang, Yajuan

q Multi-Agents Model Analysis for the Evolution of IndustrialClusters

Yang, Yang

q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive Text

Yang, Yifang

q SVM Combined with FCM and PSO for Fuzzy Clustering

Yang, Zheng

q A Saliency Detection Model Based on Multi-feature Fusion

Papers by Author

Yanhui, Zhao

q Multi-Undeniable Signature Schemes

Yanli, Wang

q Multi-user Detection Method for MIMO-OFDM UplinkTransmission

Yanqiong, Zhu

q Security Authentication Scheme Based on CertificatelessSignature and Fingerprint Recognition

Yan-xin, Shi

q Adaptive Filter for Color Impulsive Removal Based on the HSIColor Space

Papers by Author

Yanyan, Han

q VVCS: Verifiable Visual Cryptography Scheme

Yan-yan, Han

q A Watermarking-based Visual Cryptography Schemewith Meaningful Shares

Yao, Cheng

q A Wavelet-Based Detection Approach to Traffic Anomalies

Yao, Junping

q A Novel Group Signature Scheme Based on NTRU

Yi, Ji

q A Saliency Detection Model Based on Multi-feature Fusion

Papers by Author

Yi, XiusHuang

q Speech Feature Analysis Using Temporal Linear Embedding

Yian, Zhu

q A Model Driven Approach for Self-Healing Computing System

Yifang, Yang

q A Lower Bound for the Smarandache Function Value

Yin, Qian

q Software Fault Prediction Framework Based onaiNet Algorithm

Papers by Author

Yin, Xinchun

q A Trivariate Polynomial-based Dynamic Key ManagementScheme for Wireless Sensor Networks

q Optimized Approach for Computing Multi-base Chains

Yin, XuCheng

q Elliptic Curve Isogenies to Resist Differential Side-ChannelAnalysis Attacks

Yinyan, Yu

q Research on Access Control Mechanism for Digital ProductsTrading

Yiqiu, Fang

q Architecture for Component Library Retrieval on the Cloud

Papers by Author

Yisheng, Xue

q A Blakley Secret Sharing Scheme without Trusted ShareDistributed Center

Yong, Xu

q Stochastic Modeling File Population in P2P Network

Yonglin, Min

q Simulation of Influence of Desired Velocity Distributionand Herd Effect on Pedestrian Evacuation

Yong-mao, Cheng

q Joint Synchronization and Channel Estimation Algorithmof FH-OFDM Systems in Aviation Mobile Communications

Papers by Author

Yong-mei, Cheng

q Adaptive Filter for Color Impulsive Removal Based on the HSIColor Space

Yongquan, Cui

q Hierarchical ID-Based Blind Signature from Lattices

Yong-xian, Wang

q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network

YongZhao, Zhan

q Research of Access Control in Electronic Medical RecordBased on UCON

Papers by Author

You, Xinge

q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge Cue

q Clustering Based Image Denoising Using SURE-LET

Youju, Qi

q The Construction and Application of Distance and OpenExperimental Platform

Yu, Bin

q Analysis and Measurement on the ElectromagneticCompromising Emanations of Computer Keyboards

Yuan, Chen Xing

q An Access Control Mode Based on Information Flow Graph

Papers by Author

Yuan-lei, Li

q Spares Consumption Quota Model Based on BP NeuralNetwork

Yuan-xin, Liang

q Robust Stability for Uncertain Neutral Systemswith Time-varying and Distributed Delays

Yue, Xiaoli

q Similarity Matching over Uncertain Time Series

Yue-lin, Gao

q Improved Differential Evolution Algorithm with AdaptiveMutation and Control Parameters

Papers by Author

Yulong, Shen

q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks

q AHP-GRAP Based Security Evaluation Method for MILSSystem within CC Framework

Yun, Ling

q Application of the PSO-SVM Model for Credit Scoring

Yun-yuan, Dong

q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network

Papers by Author

Yu-xiang, Yang

q Closed-loop Supply Chain Network Horizontal IntegrationProblem

Zan, Hongying

q Inducing Chinese Selectional Preference Based on HowNet

Zeng, Qian

q Differential Energy Watermarking Based on Macro-blockPrediction

Zeng, Wenyi

q An Improvement of Comprehensive Evaluation Model

Papers by Author

Zeng, Wu

q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge Cue

q Clustering Based Image Denoising Using SURE-LET

Zeng, Xiantie

q Spatial Prediction of Dissolved Organic Carbon Using GISand ANN Modeling in River Networks

Zeng, Xiaoqin

q An Improved ID3 Based on Weighted Modified InformationGain

Papers by Author

Zeng, Yong

q A Security Testing Approach for WSN Protocols Basedon Object-oriented Attack Model

q An Automated Black-box Testing Approach for WSN SecurityProtocols

Zhai, Wenhua

q An Important Property about Vertex Distance of CrossedCubes CQn

Zhan, Gao

q Security Authentication Scheme Based on CertificatelessSignature and Fingerprint Recognition

Papers by Author

Zhan, Tao

q Co-Z Addition Operation of Hessian Curve

Zhan-fang, Zhao

q A Line-up Competition Differential Evolution Algorithm forthe Generalized Assignment Problem

Zhang, Chenghui

q Experimental Study the Measurement of Acoustic Wave FlightTime under Strong Noise in the Boiler

Zhang, Feng

q Multi-objective Optimization of Bus Dispatching Basedon Improved Genetic Algorithm

Papers by Author

Zhang, Hong

q Co-op Advertising Analysis within a Supply Chain Basedon the Product Life Cycle

Zhang, Hua

q Application of the PSO-SVM Model for Credit Scoring

Zhang, Jing

q Relative Stability of Solution for Hua’s Macroeconomic Model

Zhang, Jinjie

q Relative Stability of Solution for Hua’s Macroeconomic Model

Papers by Author

Zhang, Jun Wei

q FBctlr - A Novel Approach for Storage PerformanceVirtualization

Zhang, Lai-shun

q Cryptoanalysis and Improvement of Verifier-based KeyAgreement Protocol in Cross-Realm Setting

Zhang, Liumei

q PSO-BP Neural Network in Reservoir Parameter DynamicPrediction

Zhang, Manrui

q Multiresolution Streamline Placement for 2D Flow Fields

Papers by Author

Zhang, Ning

q A Simple But Effective Stream Maximal Frequent ItemsetMining Algorithm

Zhang, Peng

q A Wavelet-Based Detection Approach to Traffic Anomalies

Zhang, Qing Xiang

q Optimality Conditions for Fractional Programming with B (p,r, a) Invex Functions

Zhang, Quan-ju

q Artificial Neural System Method for Solving NonlinearProgramming with Linear Equality Constraints

Papers by Author

Zhang, Rui

q An Improved Software Reliability Model Considering FaultCorrection Rate

Zhang, Tao

q A Markov Chain-based Availability Model of Virtual ClusterNodes

Zhang, W.Q.

q Time Series Forecasting Method Based on Huang Transformand BP Neural Network

Zhang, Wei-ming

q Action-Seeking Team Coordination for Unmanned VehiclesTeam Planning

Papers by Author

Zhang, Wenyao

q Multiresolution Streamline Placement for 2D Flow Fieldsq Streamline-based Visualization of 3D Explosion Fields

Zhang, Xiang Min

q Design and Implementation of an Electromagnetic AnalysisSystem for Smart Cards

Zhang, Xiangmin

q A Configurable IPSec Processor for High Performance In-LineSecurity Network Processor

Papers by Author

Zhang, Xiumin

q Contours-Matching in Building Reconstruction from a SingleImage

Zhang, Ya Di

q Key Management Protocol Based on Finely GranularMulti-level Security Method in Wireless Networks

Zhang, Yan-ping

q A Maximal Clique Partition Method for Network Basedon Granularity

q Multi-Side Multi-Instance Algorithmq Research on the Maximum Flow in Large-scale Network

Papers by Author

q A New Scheme for Information Hiding Based on DigitalImages

Zhang, Yong

q Search Engine Optimization Based on Algorithm of BP NeuralNetworks

Zhang, Yongfu

q Construction of Overflow Attacks Based on Attack Elementand Attack Template

Zhang, Yuan

q A Maximal Clique Partition Method for Network Basedon Granularity

q Research on the Maximum Flow in Large-scale Network

Papers by Author

q Analysis of the Authentication Protocols Based on GameTheory

Zhang, Zhijun

q New Heuristic Algorithm of RNA Secondary StructurePrediction with Pseudoknots

Zhao, Gaochang

q Predictions for Coal Spontaneous Combustion Stage Basedon an Artificial Neural Network

Zhao, Hengbo

q Active Contours with Adaptively Normal Biased GradientVector Flow External Force

Papers by Author

Zhao, Lei

q Qualitative Analysis for a Kind of Predator-Prey Modelof Holling III-Function Response with Nonlinear DensityDependent

Zhao, Lingzhong

q A Comparative Study on Appending Priority Relations of Rulesin BDI-Based Agent Model

Zhao, Na

q An Improvement and a New Design of Algorithms for Seekingthe Inverse of an NTRU Polynomial

Papers by Author

Zhao, Pei

q Marshmallow: A Content-Based Publish-Subscribe Systemover Structured P2P Networks

Zhao, Ruimin

q Parabolic Adjustment of Image Clearness Algorithm Basedon Retinex Theory

Zhao, Shu

q Multi-Side Multi-Instance Algorithm

Zhao, Wei

q Analysis of the Impact of Polarization Mode Dispersionon Optical Fiber Communication

Papers by Author

Zhao, WeiDong

q Simplified Business Process Model Mining Basedon Structuredness Metric

Zhao, Xiufeng

q A New Cross-realm Group Password-based AuthenticatedKey Exchange Protocol

Zhao, Yanbo

q An Efficient Closed-form Solution of Synchronizationand Channel Estimation in UWB

Papers by Author

Zhao, Yi

q Exponentially Synchronization of Stochastic ComplexNetworks with Time-varying Delays and Switching Topologyvia Pinning Control

q On Cluster Synchronization for Linearly Coupled ComplexNetworks

Zhao, Yinghai

q Image Scrambling Based on Chaos Theory and VigenèreCipher

Zhao, Yong

q Property-Based Remote Attestation Oriented to CloudComputing

Papers by Author

Zhao, Zhi-qing

q The Design of Fuzzy Classifier Based on Sugeno Type FuzzyComplex-Value Integral

Zhaohui, Wang

q A Saliency Detection Model Based on Multi-feature Fusion

Zheng, Wei-wei

q Qualitative Analysis for a Kind of Predator-Prey Modelof Holling III-Function Response with Nonlinear DensityDependent

Zheng, Xi

q An Improved Software Reliability Model Considering FaultCorrection Rate

Papers by Author

Zheng, Xin

q Contours-Matching in Building Reconstruction from a SingleImage

Zheng-hua, Wang

q Exploring Centrality-Lethality Rule from Evolution Constrainton Essential Hub and Nonessential Hub in YeastProtein-Protein Interaction Network

Zhenglian, Su

q Improving the Performance of Personalized Recommendationwith Ontological User Interest Model

Papers by Author

Zhenqiu, Liang

q Research of Blocking Factor Combined with Improved AntColony Algorithm in VRP

Zhi-Liang, Wang

q Research of Rapid Attention-Information Extractionin Human-Robot Interaction

Zhiming, Wang

q Cooperative Neural Network Background Modelfor Multi-Modal Video Surveillance

Zhong, Hong

q A Protocol of Privacy-Preserving Closest Pair in TwoDimensional Space

Papers by Author

Zhong, Sheng

q Co-op Advertising Analysis within a Supply Chain Basedon the Product Life Cycle

Zhong, WeiDong

q Proxy Re-encryption with Keyword Search from AnonymousConditional Proxy Re-encryption

Zhou, Gengui

q Multiobjective Interaction Programming for Two-Persons

Zhou, Long

q Cell Nuclei Detection in Histopathological Images by UsingMulti-curvature Edge Cue

q Clustering Based Image Denoising Using SURE-LET

Papers by Author

Zhou, Mingquan

q Face Reconstruction from Skull Based on Partial LeastSquares Regression

Zhou, Wengang

q A Novel Two-stage Analysis Method for Customer’sRequirement

Zhou, Xiuling

q Approximation Kernel 2DPCA by Mixture of Vector and MatrixRepresentation

Zhu, Cheng

q Action-Seeking Team Coordination for Unmanned VehiclesTeam Planning

Papers by Author

Zhu, Daming

q New Heuristic Algorithm of RNA Secondary StructurePrediction with Pseudoknots

Zhu, Hai

q A General Edge Detection Method Based on the ShearTransform

q A Novel Two-stage Analysis Method for Customer’sRequirement

Zhu, Haiping

q A Topic Partition Algorithm Based on Average SentenceSimilarity for Interactive Text

Papers by Author

Zhu, Kai

q Application of Evolutionary Neural Networks for Well-loggingRecognition in Petroleum Reservoir

q The Application of Binary Particle Swarm Algorithm in FaceRecognition

Zhu, Ming

q Promotion Analysis Based on Fitting in Multi-Level Space

Zhu, Ning

q Construction of Overflow Attacks Based on Attack Elementand Attack Template

Zhu, Sencun

q Multi-jammer Localization in Wireless Sensor Networks

Papers by Author

Zhu, ShiSong

q Knowledge Discovery Method from Abnormal Monitoring Data

Zhu, Tanchao

q Saliency-based Adaptive Scaling for Image Retargeting

Zhu, Xiaoyan

q Security Analysis of Some Recent Authentication Protocolsfor RFID

Zhu, Xinshan

q Novel Quantization Watermarking Based on Random AngleModulation

Papers by Author

Zong-ji, Li

q The Simulation of Trajectory for Homing Depth ChargeAttacking the Submarine with Different Guide Orderliness

Zou, Chun-hua

q Certificateless Broadcast Signcryption with Forward Secrecy

Zuo, Yanfei

q Similarity Matching over Uncertain Time Series

Zuoshun, Wu

q Distributed Storage Schemes for Controlling Data Availabilityin Wireless Sensor Networks

Papers by Author

A B C D E F G

H I J K L M N

O P Q R S T U

V W X Y Z