Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Baohua Wang, Junlian Huang, Haihong Zheng, Hui Wu |
Semi-Supervised Recursive Autoencoders for Social Review Spam Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 116-119, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Qin Zhao, Zeyu Chen, Yiyun Zhu, Zhe Li, Xinhong Hei 0001 |
Toward Automatic Review of Building Energy Efficiency Based on Building Information Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 213-217, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lu Bai, Jiansheng Wang, Baolei Huang |
The Effect of Shared L2 Cache on Determinism in Airborne Embedded System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 697-700, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tianjun Wu, Yuexiang Yang |
Crafting Intents to Detect ICC Vulnerabilities of Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 557-560, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![IEEE Computer Society, 978-1-5090-4840-3 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Wensheng Chen, Qian Wang, Binbin Pan, Yugao Li |
Local and Non-Local Feature-Based Kernel Nonnegative Matrix Factorization Method for Face Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 107-110, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fengli Zhang, Junxin Chen, Hongchuan Zhou, Zhengwei Geng |
A Dynamic Access Control Model for Spatial Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 547-550, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yan Chang, Yong Xian, Jie Li, Daqiao Zhang, Jing Gao |
Perturbation Correction Calculation Method for Remote Rendezvous between Non-Coplanar Elliptic Orbits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 208-212, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Wang 0008, Hai-Lin Liu 0001, Yiu-Ming Cheung |
A Renewable Energy Cooperation Scheme for OFDM Systems Using Evolutionary Many-Objective Optimization Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 194-197, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jian Yang, Ruonan Rao, Pei Hong, Peng Ding |
Ensemble Model for Stock Price Movement Trend Prediction on Different Investing Periods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 358-361, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lei Huang 0004, Bin Luo 0003 |
Salient Object Detection via Video Spatio-Temporal Difference and Coherence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 12th International Conference on Computational Intelligence and Security, CIS 2016, Wuxi, China, December 16-19, 2016, pp. 218-222, 2016, IEEE Computer Society, 978-1-5090-4840-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xu Zhao, Fei Deng, Hua Liang, Long Zhou |
Monitoring the Deformation of the Facade of a Building Based on Terrestrial Laser Point-Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 183-186, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuejin Bai, Yang Zhang, Zhaohui Li |
3D Video Coding Using Just Noticeable Depth Difference Based on H.265/HEVC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 142-145, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong |
The Design of a Key Expansion Algorithm Based on Dynamic Dislocation Counts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 345-349, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qian Lei, Liji Wu, Shaohui Zhang, Xiangmin Zhang, Xiangyu Li 0002, Liyang Pan, Zhimeng Dong |
Software Hardware Co-design for Side-Channel Analysis Platform on Security Chips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 398-401, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wang, Hai Zhu, Xiaoli Wang |
A Robust Quasi-Dense Wide Baseline Matching Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 113-116, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhendong Liu, Daming Zhu, Qionghai Dai |
Predicting Algorithm of RNA Folding Structure with Pseudoknots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 34-37, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuhui Liu |
Some Properties of (F-K)-Convex Mapping in Vector Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 199-202, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shulei Wu, Liya Dong, Huandong Chen, Jinmei Zhan |
Application of Image Classification Technology in Mangrove Information Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 167-170, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Baitong Zhou, Zengli Liu |
Method of Multi-resolution and Effective Singular Value Decomposition in Under-determined Blind Source Separation and Its Application to the Fault Diagnosis of Roller Bearing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 462-465, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jiani Li, Donghai Tian, Changzhen Hu |
Dynamic Tracking Reinforcement Based on Simplified Control Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 358-362, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lei Fan, Sha Meng, Yanfang Liang, Xiyang Liu |
Experimental Analysis on CTT-SP Algorithm for Intermediate Data Storage in Scientific Workflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 458-461, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yaling Zhang, Liang Yang, Shangping Wang |
An Efficient Identity-Based Signature Scheme for Vehicular Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 326-330, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huizhen Jia, Quansen Sun, Tonghan Wang 0002 |
PCANet for Blind Image Quality Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 195-198, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qin Liu, Zhongwei Ma, Xiaowen Yang, Hongming Zhu |
Identifying Influential Actors in Social Network Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 223-226, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yulin Hai, Xiaodong Zhao, Yongqiang Liu |
Reconfigurable Computing Availability and Developing Trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 138-141, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guanghui Deng, Zengli Liu |
Study of Edge Detection Based on SQI Algorithm and Morphology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 203-205, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Chun Huang, Hsin-Yun Chang |
A Novel SVM-Based Reduced NN Classification Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 62-65, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shifeng Zhang, Shenghui Su |
Design of Parallel Algorithms for Super Long Integer Operation Based on Multi-core CPUs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 335-339, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kaimei Zheng |
Content-Based Image Retrieval for Medical Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 219-222, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Liang |
Strategies for Analysis against Redundant Reused Codes in Safety-Critical Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 441-445, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jie Liang, Wenzhang He, Dongjiang Ji, Lina Wang |
Image Reconstruction Algorithm for Modified SART Based on PM Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 175-178, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yingjiu Guo, Xuemei Liu |
A Research on the Localization Technology of Wireless Sensor Networks Employing TI's CC2530 Instrument. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 446-449, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xueyi Liang, Hai-Lin Liu 0001, Qiang Wang 0008 |
4G Heterogeneous Networks Base Station Planning Using Evolutionary Multi-objective Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 248-252, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xin Lin, Yizhou Tang |
Interbank Offered Rate Forecasting Using PSO-LS-SVM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 26-29, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xi Qin, Tongge Xu, Chao Wang |
DDoS Attack Detection Using Flow Entropy and Clustering Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 412-415, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Haifeng Li, Bo Shuai, Jian Wang 0020, Chaojing Tang |
Protocol Reverse Engineering Using LDA and Association Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 312-316, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Miao Ye, Meiling Zhao, Xiaohui Cheng |
A New Minimum Exposure Path Problem and Its Solving Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 420-423, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing Meng, Hou-Biao Li |
Recycling BiCG for Families of Shifted Linear Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 86-90, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Juan Li |
A Feature Subset Selection Algorithm Based on Feature Activity and Improved GA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 206-210, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jie Liu 0009 |
On Locating All Local Minima of Multidimensional Function for Box Constrained. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 82-85, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hassan Dawood, Hussain Dawood, Ping Guo 0002 |
A Hybrid Image Feature Descriptor for Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 58-61, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mi Wang, Dong Kang |
Research on Semantic Representation to Promote the Correlation of Instructional Micro Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 470-473, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei He 0010, Shuang Li 0010, Xiaoping Yang |
A Hybrid Approach for Reducing Textual Formal Context Based on Thesaurus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 146-149, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xue Wang, Lequan Min, Mei Zhang |
A Generalized Stability Theorem for Continuous Chaos Systems and Design of Pseudorandom Number Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 375-380, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhihua Song, Han Zhang 0019, Wanfang Che, Xiaobin Hui |
Algorithm for Distance Constrained Aerial Vehicle Routing Problem: Based on Minimum Spanning Tree and Genetic Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 5-9, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bo Shuai, Haifeng Li, Lei Zhang 0064, Quan Zhang, Chaojing Tang |
Software Vulnerability Detection Based on Code Coverage and Test Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 317-321, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Miao Yuan, Guoqiang Bai 0001 |
Improving Second-Order DPA Attacks with New Modeled Power Leakages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 394-397, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Liangjian Su, Wei Guo 0005, Zheng Guo |
Combined Attack on Blinded Fault Resistant Exponentiation Algorithm and Efficient Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 331-334, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jinfeng Li, Tao Wu |
Perceptual Audio Hashing Using RT and DCT in Wavelet Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 363-366, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yushi Guo, Zuqing Huang, Yuxiang Yang |
Waste Electrical Recycling Network Optimum Design under the Carbon Cap Constraint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 53-57, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing Li, Baoming Qiao |
A Novel Differential Evolution Algorithm with K-Means and Simplex Search Method for Absolute Value Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 266-269, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jiachao Chen, Qin Wang 0009, Zheng Guo 0001, Junrong Liu, Haihua Gu |
A Circuit Design of SMS4 against Chosen Plaintext Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 371-374, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chenggang Cui, Feng Tian, Ning Yang, Junfeng Chen |
Memory Based Differential Evolution Algorithms for Dynamic Constrained Optimization Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 30-33, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhixiang He, Xiaoli Sun, Xiujun Zhang, Chen Xu 0004 |
Saliency Detection via Nonconvex Regularization Based Matrix Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 243-247, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yong He, Jiechang Wen, Meihua Huang |
Study on Emergency Relief VRP Based on Clustering and PSO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 43-47, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Limin Guo, Lihui Wang, Dan Liu, Weijun Shan, Zhimin Zhang, Qing Li 0064, Jun Yu |
A Chosen - Plaintext Differential Power Analysis Attack on HMAC - SM3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 350-353, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhao Fang, Jianjun Zhao, Haifeng Tang, Guangmin Wu |
Design and Implementation of Embedded Remote Control System in High-Precision Time Data Acquisition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 125-128, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xin Li 0040 |
A Quantity-Flexibility Contract in Two-Stage Decision with Supply Chain Coordination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 109-112, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hai Zhu, Wei Wang, Xiali Wang, Fei Wei |
An Effective Energy-Based Multi-view Piecewise Planar Stereo Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 117-120, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing Nie |
Research on Mobile Learning Platform Construction in Higher Vocational Colleges Based on Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 91-94, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bin Wang 0046, Fan Li, Xinhong Hei 0001, Weigang Ma, Lei Yu |
Research on Storage and Retrieval Method of Mass Data for High-Speed Train. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 474-477, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guanghui Deng, Zengli Liu |
A Wavelet Image Denoising Based on the New Threshold Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 158-161, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pengcheng Wen, Yadi Zhang, Yahui Li, Xiaoan Li |
Intelligence Computing Technology for UAV's Autonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 22-25, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qin Zhao, Yuchao Li, Xinhong Hei 0001, Xiaofan Wang 0002 |
Toward Automatic Calculation of Construction Quantity Based on Building Information Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 482-485, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fatma Hachmi, Mohamed Limam |
A Two-Stage Process Based on Data Mining and Optimization to Identify False Positives and False Negatives Generated by Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 308-311, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guo Xie, Minying Ye, Xinhong Hei 0001, Jinwei Zhao, Fucai Qian |
Data-Based Health State Analysis for the Axle of High Speed Train. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 454-457, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Haixia Guo |
Construction of Pooling Designs with Affine Symplectic Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 278-281, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Liu, Tianxiang Feng |
Study on the Convergence of Solving Linear Equations by Gauss-Seidel and Jacobi Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 100-103, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing Wang, Ying Yang, Lijuan Chen, Guang Yang, Zhenya Chen, Liqiang Wen |
A Combination of Timing Attack and Statistical Method to Reduce Computational Complexities of SSL/TLS Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 402-406, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoping Li, Weiwei Wang 0005, Amir Razi, Tao Li |
Nonconvex Low-Rank Sparse Factorization for Image Segmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 227-230, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xingsi Xue, Jianhua Liu, Pei-Wei Tsai, Xianyin Zhan, Aihong Ren |
Optimizing Ontology Alignment by Using Compact Genetic Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 231-234, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Liping Chen, Weitao Ha, Guojun Zhang |
Evaluation Model of Web Service Health Level on End-to-End Network Based on Artificial Immune. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 18-21, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tianxiang Feng, Qiujie Zhang |
Model of Environmental Reason Analysis and Prevention of Stroke on Linear Regression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 74-77, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xudong Miao, Yongchun Wang, Xingchen Cao, Binbin Qu, Sheng Jiang, Feng Fang |
A Software Assessment Method Based on Relevance Vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 424-427, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shan Sun, Ruliang Wang |
Robust Stability of Uncertain Nonlinear Delay Segmentation System Based on Delay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 95-99, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chunlong Fan, Chang Liu, Guohui Ding, Li Xu |
A Method of Circle Curve Fitting Based on the Cumulative Error of the Radius Error. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 211-214, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Le Wang, Yunmin Sun, Peng Guo, Yadi Zhang |
An Enhanced Reconfiguration Method for the Second Generation Integrated Modular Avionics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 433-436, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shuiqin Dai, Hai-Lin Liu 0001, Lei Chen 0044 |
Evolutionary Many-Objective Optimization Algorithm Based on Improved K-Dominance and M2M Population Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 286-290, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lihui Wang, Qing Li 0064, Gang Zhang, Jun Yu, Zhimin Zhang, Limin Guo, David Wei Zhang |
A New SPA Attack on ECC with Regular Point Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 322-325, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Haiyan Liu, Shiwei Guan, Fangjie Liu, Yuping Wang 0003 |
Cooperative Co-evolution with Formula Based Grouping and CMA for Large Scale Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 282-285, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Peng Sun 0012, Ziyan Wu, Haifeng Yang, Zhengfeng Ming, Xin Guo |
Research Methods of Sensors Validation Based on Naive Bayesian Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 235-238, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aymen Akremi, Hassen Sallay, Mohsen Rouached, Mohamed-Fouad Sriti, Mohamed Abid, Rafik Bouaziz |
Towards a Built-In Digital Forensics-Aware Framework for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 367-370, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yahui Li, Yadi Zhang, Peng Li, Peng Guo |
An Efficient Trusted Chain Model for Real-Time Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 428-432, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chao Wang, Tongge Xu, Xi Qin |
Network Traffic Classification with Improved Random Forest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 78-81, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiangyu Deng, Zengli Liu |
An Improved Image Denoising Method Applied in Resisting Mixed Noise Based on MCA and Median Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 162-166, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![IEEE Computer Society, 978-1-4673-8660-9 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Yu Liu, Xinhong Hei 0001, Jinwei Zhao, Yikun Zhang, Guo Xie |
Fault Diagnosis Based on Prior Knowledge for Train Air-Conditioning Unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 66-69, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaole Cai, Yahui Li, Yadi Zhang, Peng Li |
An Efficient Address Mapping Algorithm for Multichannel Structure SSD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 121-124, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bo Yang, Zhao Yang, Nengfei Liu, Shougui Li |
Further Attacks and Improvement of a Certificateless Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 340-344, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hongwei Lin |
A Differential Evolution Algorithm Based on Local Search and Boundary Reflection for Global Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 253-257, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wensheng Chen, Yang Zhao 0014, Binbin Pan, Chen Xu |
Nonlinear Nonnegative Matrix Factorization Based on Discriminant Analysis with Application to Face Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 191-194, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fei Qin, Jie Liu |
A Hybrid Algorithm for Global Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 262-265, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kaige Qu, Liji Wu, Xiangmin Zhang |
A Novel Detection Algorithm for Ring Oscillator Network Based Hardware Trojan Detection with Tactful FPGA Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 299-302, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jingxi Li, Xin Xu, Lejian Liao, Lu Li |
Concolic Execute Fuzzing Based on Control-Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 385-389, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hong Li 0007, Li Zhang 0051 |
Solving Linear Bilevel Programming Problems Using a Binary Differential Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 38-42, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shanshan Li, Yimin Li |
A Recognition Algorithm for Similar Characters on License Plates Based on Improved CNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 1-4, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei Li, Xiufen Yu |
An Online Flow-Level Packet Classification Method on Multi-core Network Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 407-411, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing Li, Weiwei Wang 0005, Xiaoping Li |
Image Retargeting Based on a New Salient Region Detection Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 179-182, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qian Xu, Yajuan Yang, Quanju Zhang |
Research on the Influence Factors of Entrepreneurial Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 478-481, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|