


default search action
15th CIS 2019: Macao, SAR, China
- 15th International Conference on Computational Intelligence and Security, CIS 2019, Macao, SAR, China, December 13-16, 2019. IEEE 2019, ISBN 978-1-7281-6092-4

Regular Papers
Intelligent Algorithms
- Xingsi Xue, Junfeng Chen, Aihong Ren:

Interactive Ontology Matching Based on Evolutionary Algorithm. 1-5 - Zhanjiang Zhi, Shuaijie Li:

An Image Segmentation Method Based on a Constrained Convex Variant of the Mumford-Shah Model. 6-10 - Yujun Xie, Yao Lu, Shuang Gu:

RGB-D Object Tracking with Occlusion Detection. 11-15 - Xinyu Li, Xiaochun Lei, Rongfeng Chen, Yizhou Feng, Tianmin Xiong, Junyan Chen:

Application of the Faster R-CNN Algorithm in Scene Recognition Function Design. 16-19 - Ying An, Xunli Fan, Li Chen, Pei Liu:

Infrared and Visible Image Fusion Based on Adaptive Dual-Channel PCNN and Saliency Detection. 20-25 - Jiaxin Hou, Weidong Zhou, Wen-An Zhang, Cong Zhang, Chen Chen, Chenghao Shan

:
High-Order Unscented Transformation Based on the Bayesian Learning for Nonlinear Systems with Non-Gaussian Noises. 26-30
Intelligent Computation
- Wei Li, Xiang Meng, Ying Huang:

Differential Learning Particle Swarm Optimization with Full Dimensional Information. 31-35 - Minyi Zheng, Fangqing Gu, Xuesong Chen, Hao-Tian Wu:

A Variable Relationship Excavating Based Optimization Algorithm for Solving 0-1 Knapsack Problems. 36-39 - Wei Guo, Yong Wang, Miao Ye

:
A New Construction Method of Regeneration Tree for Single Node Fault Repair Mechanism in Distributed Storage System. 40-44 - Zhihe Wang, Teng Zhang, Hui Du:

A Collaborative Filtering Recommendation Algorithm Based on Density Peak Clustering. 45-49 - Jiaming Song, Xiaobo Song, Xiaoli Wang:

A New Scheduling Model for Tire Production and Transportation Among Distributed Factories. 50-53 - Samson Hansen Sackey

, Junfeng Chen, Joseph Henry Anajemba
, Xuewu Zhang:
A Clustering Approach Based on Genetic Algorithm for Wireless Sensor Network Localization. 54-58 - Jiongcheng Li, Hai-Lin Liu:

A Contracting BFGS Update in Quasi-Newton Methods for Unconstrained Optimization. 59-62
Machine Learning and Neural Networks
- Weiguo Pan, Yinghao Chen, Bo Liu:

Traffic Light Detection for Self-Driving Vehicles Based on Deep Learning. 63-67 - Xiaoyu Dong, Xin Xin, Ping Guo

:
Chinese NER by Span-Level Self-Attention. 68-72 - Bingxin Xu, Xiuling Zhou:

Deep Sparse Representation Classification with Stacked Autoencoder. 73-77 - Haidong Li, Jiongcheng Li, Xiaoming Guan, Binghao Liang, Yuting Lai, Xinglong Luo:

Research on Overfitting of Deep Learning. 78-81 - Baofeng Wang, Hai Zhu, Mengmeng Xu, Zumin Wang, Xudong Song:

Analysis and Improvement for Fingerprinting-Based Localization Algorithm Based on Neural Network. 82-86 - Yaofeng Yuan, Jiechang When:

Adaptively Weighted Channel Feature Network of Mixed Convolution Kernel. 87-91 - Zhengyan Wang, Junfeng Chen, Xiaolin Wang

:
Convolutional Neural Network for Image Feature Extraction Based on Concurrent Nested Inception Modules. 92-97 - Doudou Wu, Xianghong Lin, Pangao Du:

An Adaptive Structure Learning Algorithm for Multi-Layer Spiking Neural Networks. 98-102 - Mengwei Zhang, Xianghong Lin, Pangao Du:

An Epilepsy and Seizure Classification Approach Based on Multi-Spike Liquid State Machines. 103-107 - Yan Hu, Minghua Nuo, Chao Tang:

A Deep Learning Approach for Chinese Tourism Field Attribute Extraction. 108-112 - Yan Wang, Xin Xin, Ping Guo

:
Relation Extraction via Attention-Based CNNs using Token-Level Representations. 113-117
Intelligent Systems and Complex Systems
- Wenyi Zeng, Guangchen Song, Qian Yin, Ping Guo

:
Some new Distance Measures of Hesitant Fuzzy Sets and its Application in Group Decision Making. 118-122 - Zhihua Song, Han Zhang, Xiaojie Zhang, Fa Zhang:

Unmanned Aerial Vehicle Coverage Path Planning Algorithm Based on Cellular Automata. 123-126 - Yanni Li, Wencheng Yang, Zhengang Zhong, Yueshen Xu

:
NOLGP: A Novel Optimized Large-Scale Graph Partitioning Algorithm. 127-131 - Qingshan Wang, Jun Zhang:

Point Cloud Registration Algorithm Based on Combination of NDT and PLICP. 132-136 - Hui Liu, Kuanna Huang, Liping Jia:

Personalized Learning Resource Recommendation Algorithm of Mobile Learning Terminal. 137-141
Pattern Recognition and Knowledge Discovery
- Huijian Han

, Qinghai Wang, Caixian Chen:
Policy Text Analysis Based on Text Mining and Fuzzy Cognitive Map. 142-146 - Tao Li, Yuanbo Guo, Ankang Ju:

A Self-Attention-Based Approach for Named Entity Recognition in Cybersecurity. 147-150 - Zhixian Ma, Jie Zhu, Yongkai Zhu, Haiguang Xu:

Radio Galaxy Morphology Simulation via Residual Conditional Variational Autoencoder. 151-155 - Zhihe Wang, Suping Shi, Hui Du, Shuyan Wang:

Collaborative Filtering Algorithm Based on Improved Similarity Calculation. 156-160
Data Mining and Clustering
- Si-Yuan Jing, Jun Yang:

A Novel Set-Based Discrete Differential Evolution Algorithm for Mining Process Model from Event Log. 161-165 - Yong Li, Baodong Liu, Changqing Wang:

Study of the Evolution of Online User Interest Behavior. 166-171 - Guang-Wei Cai, Zhi Fang, Yue-Feng Chen:

Estimating the Number of Hidden Nodes of the Single-Hidden-Layer Feedforward Neural Networks. 172-176 - Cheng Lin, Qinpei Zhao, Jiangfeng Li, Weixiong Rao:

Size Prediction for Online Clothing Shopping with Heterogeneous Information. 177-181 - Yuanchao Yang, Yuping Wang, Yuan Wei:

Adaptive Density Peak Clustering for Determinging Cluster Center. 182-186 - Jie Zhang, Junhong Feng

, Xiani Yang:
Gene Selection for scRNA-Seq Data Based on Information Gain and Fruit Fly Optimization Algorithm. 187-191 - Zhonghua Li, Liping Jia, Bingjun Su:

Improved K-Means Algorithm for Finding Public Opinion of Mount Emei Tourism. 192-196
Optimization Theory and Methods
- Xiang Yi, Shixiao Liu:

Mobility of Discrete Breather in a FPU-KG Chain. 197-200 - Shuang Liang, Hao Li

, Maoguo Gong, Yue Wu
, Yun Zhu:
Distributed Multi-Objective Community Detection in Large-Scale and Complex Networks. 201-205 - Shuifeng Feng, Jiechang Wen:

An Evolutionary Many-Objective Optimization Algorithm Based on IGD Indicator and Region Decomposition. 206-210 - Yonghong Long, Xiuqin Deng, Guoxiang Zhong, Juan Fan, Fuchun Liu:

Gaussian Kernel Dynamic Similarity Matrix Based Sparse Subspace Clustering for Hyperspectral Images. 211-215 - Junhao Wang, Cong Jin, Wei Zhao, Shan Liu, Xin Lv:

An Unsupervised Methodology for Musical Style Translation. 216-220 - Xiaohe Wang, Yuping Wang, Chunyang Wang, Dandan Tang:

An Improved Subspace Clustering Algorithm Based on Sparse Representation. 221-224 - Feng Pan, Hong Bao:

Reinforcement Learning Model with a Reward Function Based on Human Driving Characteristics. 225-229 - Shu-quan Hong, Quan-ju Zhang:

Analysis of Development Status and Efficiency of Logistics Industry in the Pearl River Based on Delta in the Context of China-US Trade War by the DEA-ANN Model. 230-235
Cryptography and Cryptanalysis
- Hang-chao Ding, Han Jiang, Jie Cai, Chen-guang Wang, Jing Zou, Qiuliang Xu:

Research on Key Exchange Protocol Based on LWE. 236-240 - Xirong Xu, Zhiyang Wang, Yu Hong, Tianfan Xia, Jun Cheng, Jingqing Jiang:

Classification of Spectrum Images of Solar Radio Bursts Based on Deep Learning. 241-246 - Jiali Xu, Qian Yin, Ping Guo

, Xin Zheng:
Effective Pulsar Dispersion Measure Estimation Based on Progressive Probabilistic Hough Transform. 247-251
Information Security and Integrity
- Yihong Long, Minyang Cheng:

Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption. 252-256 - Yaohua Liang, Yanmei Fang, Shangjun Luo, Bing Chen:

Image Resampling Detection Based on Convolutional Neural Network. 257-261 - Ming Fang, Yong Wang, Miao Ye

:
A Multi-Controller Deployment Method of SDN Network Based on FPGA. 262-266
Network Security
- Wenqi Fang, Huiyun Li, Shaobo Dang

, Hui Huang
, Lei Peng
, Li-Ta Hsu, Weisong Wen
:
Combining Deep Gaussian Process and Rule-Based Method for Decision-Making in Self-Driving Simulation with Small Data. 267-271 - Ya-Ming Yang, Hui Du, Xiao-Bin Guo:

Approximate Fuzzy Solution of Positive Fully Fuzzy Matrix Equation. 272-276
Security Methodologies and Management
- Chan Huang, Yanmei Luo, Qingyuan Li:

Text Classification Method Based on Co-Occurrence Events. 277-281 - Zhanjun Zhou, Jianyang Zheng, Fengnian Meng:

Physical Health Test Analysis Based on Adaptive Proportional Fusion Ensemble Classifier for College Students. 282-286 - Nan Ma, Li Chen, Jiancheng Hu, Qiuna Shang, Jiahong Li, Guoping Zhang:

Pedestrian Detection Based on HOG Features and SVM Realizes Vehicle-Human-Environment Interaction. 287-291 - Hai-Dong Li, Chiang-Lung Lin:

Research on the Ability Evaluation of "Double-Qualified and Double-Ability" Teacher in M University Based on Fuzzy-AHP. 292-295 - Helong Li, Haibo Yu, Jinshuai Yuan:

Intelligent Energy Meter Fault Prediction Based on Machine Learning. 296-300 - Mengna Chai, Yuansheng Liu:

A Hybrid Loop Closure Detection Method Based on Lidar SLAM. 301-305 - Weijun Shan, Jun Yu, Limin Guo, Kun Jiang, Lihui Wang, Qing Li:

A Horizontal Attack on SM9 Signature Generation. 306-309
System Analysis and Modeling
- Mengmeng Xu, Hai Zhu, Juanjuan Wang, Hengzhou Xu:

Dynamic and Disjoint Routing Mechanism for Protecting Source Location Privacy in WSNs. 310-314 - Weijing Zhou, Hechun Zhu, Shiying Yao, Tong Li:

A Homomorphic Encryption-Based Privacy Preserving Data Aggregation Scheme for Smart Grid. 315-319 - Shougang Zhang, Yingchun Zheng, Yunfeng Yang:

The Pricing of European Exchange Option with Continuous Dividends. 320-323 - Yunfeng Yang, Rui Qiao, Yingchun Zheng:

Portfolio Selection with Stochastic Volatility and Continuous Dividends. 324-327 - Chuan-Chuan Ko

, Ya-Juan Yang, Chien-Yu Liu:
Multinational Enterprise Investment Strategy Evaluation - Option to Growth or Option to Abandon of Binomial Options Application. 328-331
Short Papers
Intelligent Algorithms
- Wenjuan Jiang, Dong Xu, Fuyun Li:

Brain CT Image Segmentation Based on Improved Watershed Algorithm. 332-335 - Zhendong Liu, Fanghan Liu, Yurong Yang, Jiwei Wang, Hailin Zhang:

The Predicting Algorithm of Barrier Tree in RNA Folding Structure. 336-340 - Yizhou Feng, Junyan Chen, Tianmin Xiong, Rongfeng Chen, Xinyu Li, Yongqing Tang, Xiaochun Lei:

Application of the SSD Algorithm in a People Flow Monitoring System. 341-344 - Yan Zhang, Hong Bao:

Point Clouds-Image Fusion by Convolutional Method for Data Integrity using Neural Network. 345-348
Intelligent Computation
- Haosen Liu

, Fangqing Gu, Hai-Lin Liu, Lei Chen:
A Co-Evolution Algorithm for Solving Many-Objective Problems with Independent Objective Sets. 349-352 - Ruliang Wang, Haozhi Luo:

Mean-Square Exponential Stability Analysis for Uncertain Stochastic Neutral Systems with Nonlinear Perturbations and Distributed Delays. 353-357
Machine Learning and Neural Networks
- Kangshun Li, Ziming Wang, Jiahao Liu, Hongming Fang, Yishu Lei:

K-Prototype Clustering for the Person of Temporary Probation and Parole and Criminal Release Based on Rough Set. 358-361 - Wei Ding, Heng Liu, Ying Huang:

Noise Suppression Algorithm for High Precision Seismic Data Acquirement System. 362-365 - Jingrong Mo, Yong Wang, Miao Ye

:
Network Traffic Outlier Detection Based on Full Convolutional Network. 366-370 - Xinkai Xu, Yan Ma, Hong Bao, Ying Zheng:

Application of Improved MobileNet Network to Road Micro-Target Detection. 371-374 - Yanyuan Su, Jian Zhang, Jianhao Lu:

The Resume Corpus: A Large Dataset for Research in Information Extraction Systems. 375-378
Intelligent Systems and Complex Systems
- Qinghua Meng, Haiyou Mo, Dongxin Fan, Hongbin Tang:

Hardware Architecture Design of Intelligent Fighting Robot. 379-382 - Qianqian Chen

, Xiaojie Su, Jianxing Liu, Chao Shen:
Event-Triggered Output Feedback Control of Takagi-Sugeno Fuzzy Systems. 383-386 - Changsheng Zhu, Dongmin Huang

, Sijin Zhou, Yifei Chen, Jiali Lin, Dazhi Jiang:
A Robust Unsupervised Method for the Single Channel Speech Separation. 387-390
Pattern Recognition and Knowledge Discovery
- Yuxiang Yang, Qian Guan:

An Evolutionary Game Model Among the Interest-Related Parties for Return of E-Wastes. 391-394 - Shu-qing Jiao:

Image Denoising Based on Wave Atoms. 395-398
Data Mining and Clustering
- Haiyan Fu

, Yu Li, Xuechao Sun:
Design and Implementation of Rapid Information Acquisition and Analysis System. 399-401
Optimization Theory and Methods
- Jiawen Zhang, Wen-Sheng Chen, Binbin Pan:

Non-Negative Feature Extraction using Conjugate Gradient Method. 402-405 - Hong Li, Li Zhang, Hecheng Li:

Modified NSGA-II Based Interactive Algorithm for Linear Multiobjective Bilevel Programs. 406-410
Cryptography and Cryptanalysis
- Fuyun Li, Jianping Feng, Mousong Fu:

A Natural Human-Computer Interaction Method in Virtual Roaming. 411-414 - Dong Han, Peijiang Liu, Huijian Han

, Zheng Liu, Rui Zhang:
Research on Cigarette Retail and Supervision Model Based on Two-Dimensional Code. 415-418
Information Security and Integrity
- Yaling Zhang, Pei Luo, Lingyu Qu:

An Improved Differential Privacy Algorithm Using Frequent Pattern Mining. 419-423 - Wan-lung Lee, Wei Sun:

Reversible Steganography Scheme Based on Position-Recording in DCT Coefficients. 424-428 - Shenghui Su, Xuewei Niu, Shuwang Lü:

Design of a Program Identification System for Preventing Malicious Codes. 429-433
Network Security
- Qiang Wang, Yanhu Huang, Tingting Lan:

Optimized Power Allocation for Spectrum Sharing Multi-Cell Cellular Netwokrs. 434-437
System Analysis and Modeling
- Dehua He, Ruliang Wang:

State Assessment of Oil-Paper Insulation Based on Fuzzy Rough Sets. 438-441 - Yingchun Zheng, Shougang Zhang, Yunfeng Yang:

Dynamic Asset Allocation with Jump-Diffusion Processes. 442-446 - Ya-Juan Yang, Quan-ju Zhang:

Analysis on the Route of an Enterprise's Innovation and Development Based on Multi-Agent Model. 447-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














