Search dblp for Publications

export results for "toc:db/conf/cis/cis2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cis/CaiYLH10,
  author       = {Hong{-}guo Cai and
                  Chang{-}an Yuan and
                  Jin{-}Guang Luo and
                  Jin{-}de Huang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Novel GEP-Based Multiple-Layers Association Rule Mining Algorithm},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {68--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.22},
  doi          = {10.1109/CIS.2010.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CaiYLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChaiXZL10,
  author       = {Yanmei Chai and
                  Tian Xia and
                  Jianming Zhu and
                  Haifeng Li},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Intelligent Digital Photo Management System Using Ontology and {SWRL}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {18--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.11},
  doi          = {10.1109/CIS.2010.11},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChaiXZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenG10,
  author       = {Guoqiang Chen and
                  Xiaofang Guo},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Genetic Algorithm Based on Modularity Density for Detecting Community
                  Structure in Complex Networks},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {151--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.40},
  doi          = {10.1109/CIS.2010.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenGH10,
  author       = {Yuqiang Chen and
                  Jianlan Guo and
                  Xuanzi Hu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {The Research of Internet of Things' Supporting Technologies Which
                  Face the Logistics Industry},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {659--663},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.148},
  doi          = {10.1109/CIS.2010.148},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenGH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenGWC10,
  author       = {Tieming Chen and
                  Liang Ge and
                  Xiaohao Wang and
                  Jiamei Cai},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {TinyStream: {A} Lightweight and Novel Stream Cipher Scheme for Wireless
                  Sensor Networks},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {528--532},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.121},
  doi          = {10.1109/CIS.2010.121},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenGWC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenLF10,
  author       = {Junjian Chen and
                  Jingning Liu and
                  Dan Feng},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Design and Implementation of Object-Oriented Encryption Storage System
                  Based on Trusted Computing Platform},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {546--550},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.125},
  doi          = {10.1109/CIS.2010.125},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenPXMJ10,
  author       = {Tieming Chen and
                  Xiaoming Pan and
                  Yiguang Xuan and
                  Jixia Ma and
                  Jie Jiang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Naive Feature Selection Method and Its Application in Network Intrusion
                  Detection},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {416--420},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.96},
  doi          = {10.1109/CIS.2010.96},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenPXMJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenSZHX10,
  author       = {Cheng Chen and
                  Wei Song and
                  Jiacai Zhang and
                  Zhiping Hu and
                  He Xu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Adaptive Feature Extraction Method for Motor-Imagery {BCI} Systems},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {275--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.66},
  doi          = {10.1109/CIS.2010.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenSZHX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenY10,
  author       = {Caikou Chen and
                  Jingyu Yangzhou},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Essence of Two-Dimensional Principal Component Analysis},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {280--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.67},
  doi          = {10.1109/CIS.2010.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenZ10,
  author       = {Bing Chen and
                  Shenggui Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Computing the Scattering Number of Bicyclic Graphs},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {497--500},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.114},
  doi          = {10.1109/CIS.2010.114},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenZH10,
  author       = {Liping Chen and
                  Guojun Zhang and
                  Weitao Ha},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Reliable Service Quality Evaluation Model in the Web Services Community},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {457--460},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.106},
  doi          = {10.1109/CIS.2010.106},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CuiQJJ10,
  author       = {Yang Cui and
                  Li Qian and
                  Wu Jie and
                  Zhang Jianqi},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Target-Acquisition-Performance-Model-Based Quality Metric for Multisensor
                  Image Fusion},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {398--400},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.92},
  doi          = {10.1109/CIS.2010.92},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CuiQJJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DiH10,
  author       = {Jinhong Di and
                  Hongyan Hua},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Improved Side Information Generation Scheme for Wyner-Ziv Video
                  Coding},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {234--237},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.57},
  doi          = {10.1109/CIS.2010.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DiH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DiaoK10,
  author       = {Xiaohua Diao and
                  Shiying Kang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Study on Commercial Bank Branches Performance Evaluation Using Self-Adaptive
                  {RBFNN} and {UDM}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {566--569},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.129},
  doi          = {10.1109/CIS.2010.129},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DiaoK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DingW10,
  author       = {Xiangwu Ding and
                  Junyin Wei},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Scheme for Confidentiality Protection of OpenID Authentication Mechanism},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {310--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.74},
  doi          = {10.1109/CIS.2010.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DingW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DongWKD10,
  author       = {Lin Dong and
                  Daoshun Wang and
                  Min Ku and
                  Yiqi Dai},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {(2, n) Secret Image Sharing Scheme with Ideal Contrast},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {421--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.97},
  doi          = {10.1109/CIS.2010.97},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DongWKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/DuL10,
  author       = {Jinling Du and
                  Dalian Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Hybrid Genetic Algorithm for the Multi-objective Flexible Scheduling
                  Problem},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {122--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.34},
  doi          = {10.1109/CIS.2010.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/DuL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FanWW10,
  author       = {Lei Fan and
                  Yuping Wang and
                  Meijuan Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A New Genetic Algorithm with Elliptical Crossover for Constrained
                  Multi-objective Optimization Problems},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {174--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.156},
  doi          = {10.1109/CIS.2010.156},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FanWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FengHL10,
  author       = {Tianxiang Feng and
                  Dingxiu He and
                  Hongxia Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Computer Realization of Solving Tri-diagonal Equations by Gauss-Seidel
                  Method},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {667--670},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.150},
  doi          = {10.1109/CIS.2010.150},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FengHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FengSC10,
  author       = {Xiaofeng Feng and
                  Xiong Shi and
                  Jun Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Algorithm of Collision Detection Based on Hybrid Model},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {109--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.31},
  doi          = {10.1109/CIS.2010.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FengSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/FengSC10a,
  author       = {Xiaofeng Feng and
                  Xiong Shi and
                  Jun Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A New Volume Rendering Algorithm of Data Field},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {258--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.62},
  doi          = {10.1109/CIS.2010.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/FengSC10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoW10,
  author       = {Xuejun Gao and
                  Zhenyou Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Prediction Discrete Data Used {BP} Network Based on {AGO}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {218--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.53},
  doi          = {10.1109/CIS.2010.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoZJ10,
  author       = {Yuelin Gao and
                  Jingke Zhou and
                  Songwei Jia},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A New Multi-objective Differential Evolution Algorithm},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {170--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.44},
  doi          = {10.1109/CIS.2010.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoZJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuL10,
  author       = {Fangqing Gu and
                  Hai{-}Lin Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Novel Weight Design in Multi-objective Evolutionary Algorithm},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {137--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.37},
  doi          = {10.1109/CIS.2010.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoCH10,
  author       = {Jianlan Guo and
                  Yuqiang Chen and
                  Xuanzi Hu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Implementation and Improvement of Simulated Annealing Algorithm in
                  Neural Net},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {519--522},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.119},
  doi          = {10.1109/CIS.2010.119},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoZ10,
  author       = {JiangHong Guo and
                  ZhiChu Zhong},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor
                  Networks},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {488--492},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.112},
  doi          = {10.1109/CIS.2010.112},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GuoZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HaC10,
  author       = {Weitao Ha and
                  Li{-}Ping Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Adaptive Evaluation Model of Web Service Based on Artificial Immune
                  Network},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {461--464},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.107},
  doi          = {10.1109/CIS.2010.107},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HaC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HeLX10,
  author       = {Cuiqun He and
                  Guodong Liu and
                  Zhihua Xie},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Infrared Face Recognition Based on Blood Perfusion and Weighted Block-DCT
                  in Wavelet Domain},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {283--287},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.68},
  doi          = {10.1109/CIS.2010.68},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HeLX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HosseinkhaniTS10,
  author       = {Mona Hosseinkhani Loorak and
                  Ebrahim Tarameshloo and
                  Mehdi Shajari},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment
                  Scheme},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {551--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.126},
  doi          = {10.1109/CIS.2010.126},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HosseinkhaniTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HouLQZ10,
  author       = {Meng Hou and
                  Zeng{-}li Liu and
                  Haiyan Quan and
                  Yong{-}de Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Research of Signal Frequency Domain Resolution Based-EMD},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {671--675},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.151},
  doi          = {10.1109/CIS.2010.151},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HouLQZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Hu10,
  author       = {Yibo Hu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A New Evolutionary Algorithm Based on Simplex Crossover and {PSO}
                  Mutation for Constrained Optimization Problems},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {142--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.38},
  doi          = {10.1109/CIS.2010.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Hu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiangKJ10,
  author       = {Yali Jiang and
                  Fanyu Kong and
                  Xiuling Ju},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Lattice-Based Proxy Signature},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {382--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.88},
  doi          = {10.1109/CIS.2010.88},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiangKJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiangWXC10,
  author       = {Dingde Jiang and
                  Xingwei Wang and
                  Zhengzheng Xu and
                  Zhenhua Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Approach to Maximum Lifetime Multicast Delivery in Wireless Ad-Hoc
                  Networks},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {586--590},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.134},
  doi          = {10.1109/CIS.2010.134},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiangWXC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiangXZ10,
  author       = {Han Jiang and
                  Qiuliang Xu and
                  Chenghui Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Convertible Perfect Concurrent Signature Protocol},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {352--356},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.82},
  doi          = {10.1109/CIS.2010.82},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiangXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Li10,
  author       = {Yuenan Li},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Energy Based Robust Video Hash Algorithm},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {433--436},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.100},
  doi          = {10.1109/CIS.2010.100},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Li10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Li10a,
  author       = {Zhanlan Li},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {On the Reliability of Unicyclic Networks with Vertex Failure},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {501--505},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.115},
  doi          = {10.1109/CIS.2010.115},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Li10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiC10,
  author       = {Xin Li and
                  Enhong Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Graph-Based Answer Passage Ranking for Question Answering},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {634--638},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.144},
  doi          = {10.1109/CIS.2010.144},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiH10,
  author       = {Hong{-}bo Li and
                  Yan{-}ling Hao},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Risk Assessment Model of Ship Integrated Navigation System Based on
                  Fuzzy Artificial Neural Network},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {425--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.98},
  doi          = {10.1109/CIS.2010.98},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiJ10,
  author       = {Junbing Li and
                  Wei Ji},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Tripartite Key Agreement Protocols Based on Digital Certification},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {357--361},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.83},
  doi          = {10.1109/CIS.2010.83},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiLJ10,
  author       = {Lei Li and
                  Quan Liu and
                  Xuemei Jiang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {{USB} Key-Based Dual-Factor Dynamic Authentication Scheme},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {446--449},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.103},
  doi          = {10.1109/CIS.2010.103},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiLJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiLPP10,
  author       = {Fen Li and
                  Quan Liu and
                  Qingqi Pei and
                  Liaojun Pang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {On Trust Degree-Based Usage Control in {DRM} System},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {298--301},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.71},
  doi          = {10.1109/CIS.2010.71},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiLPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiLPP10a,
  author       = {Fen Li and
                  Quan Liu and
                  Liaojun Pang and
                  Qingqi Pei},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Identity Authentication Based on Fuzzy Vault and Digital Certificate},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {441--445},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.102},
  doi          = {10.1109/CIS.2010.102},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiLPP10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiP10,
  author       = {Huaipeng Li and
                  Sulin Pang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {The Study of Credit Risk Evaluation Based on {DEA} Method},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {81--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.25},
  doi          = {10.1109/CIS.2010.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiPJLG10,
  author       = {Hongning Li and
                  Qingqi Pei and
                  Xiaohong Jiang and
                  Rui Liang and
                  Peng Geng},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio
                  Networks},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {478--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.110},
  doi          = {10.1109/CIS.2010.110},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiPJLG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiQL10,
  author       = {Yan{-}Xiao Li and
                  Lian Qin and
                  Qian Liang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Research on Wireless Sensor Network Security},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {493--496},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.113},
  doi          = {10.1109/CIS.2010.113},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiQL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiR10,
  author       = {Na Li and
                  Qing{-}dao{-}er{-}ji Ren},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {The Application of Dominant-Recessive Diploid Codes in {MOGA}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {155--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.41},
  doi          = {10.1109/CIS.2010.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiSLL10,
  author       = {Shengen Li and
                  Ling Song and
                  Qiang Lv and
                  Yuejun Li},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Efficient Semantic Similarity Search on {XML} Documents},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {86--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.26},
  doi          = {10.1109/CIS.2010.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiSLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiW10,
  author       = {Hecheng Li and
                  Yuping Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems
                  Using Genetic Algorithms},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {100--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.29},
  doi          = {10.1109/CIS.2010.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiWL10,
  author       = {Bin Li and
                  Maohua Wang and
                  Li Li},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Real-Time Pineapple Matching System Based on Speeded-Up Robust Features},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {243--247},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.59},
  doi          = {10.1109/CIS.2010.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiWSZ10,
  author       = {Wei Li and
                  Xuemei Wu and
                  Yayun Sun and
                  Quanju Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Credit Card Customer Segmentation and Target Marketing Based on Data
                  Mining},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {73--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.23},
  doi          = {10.1109/CIS.2010.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiWSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiWZ10,
  author       = {Da Li and
                  Jin Wu and
                  Jiacai Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An {EOG} Artifacts Correction Method Based on Subspace Independent
                  Component Analysis},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {127--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.35},
  doi          = {10.1109/CIS.2010.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZY10,
  author       = {Yujian Li and
                  Dedong Zhang and
                  Zhen Yang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Automatic Evaluation Method for Chinese Name Recognition},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {574--576},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.131},
  doi          = {10.1109/CIS.2010.131},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiangB10,
  author       = {Ren Liang and
                  Li Bing},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Outward Foreign Direct Investment and Industry Structural Optimization:
                  Analysis and Testing on Data of Republic of Korea},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {614--618},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.140},
  doi          = {10.1109/CIS.2010.140},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiangB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LinSW10,
  author       = {Jian Lin and
                  Yi Sun and
                  Weiqiang Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Violence Detection in Movies with Auditory and Visual Cues},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {561--565},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.128},
  doi          = {10.1109/CIS.2010.128},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LinSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LinWD10,
  author       = {Hongwei Lin and
                  Yuping Wang and
                  Cai Dai},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Swarm Intelligence Algorithm Based on Boundary Mutation},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {195--199},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.48},
  doi          = {10.1109/CIS.2010.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LinWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuG10,
  author       = {Changyou Liu and
                  Kaifeng Guo},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Airport Taxi Scheduling Optimization Based on Genetic Algorithm},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {205--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.50},
  doi          = {10.1109/CIS.2010.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuGG10,
  author       = {Junrong Liu and
                  Dawu Gu and
                  Zheng Guo},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Correlation Power Analysis Against Stream Cipher {MICKEY} v2},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {320--324},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.75},
  doi          = {10.1109/CIS.2010.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuGG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuHL10,
  author       = {Huiyan Liu and
                  Wenzhang He and
                  Rui Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Improved Fog-Degrading Image Enhancement Algorithm Based on the
                  Fuzzy Contrast},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {570--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.130},
  doi          = {10.1109/CIS.2010.130},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuL10,
  author       = {Yingying Liu and
                  Hongmei Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {The Bipanconnectivity and Hamiltonian-Connectivity of Enhanced Hypercube},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {454--456},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.105},
  doi          = {10.1109/CIS.2010.105},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuL10a,
  author       = {Weiguang Liu and
                  Hailing Lai},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Probability Based Approach for Target Detection and Pose Estimation
                  in Infrared Images},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {577--581},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.132},
  doi          = {10.1109/CIS.2010.132},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuL10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuLM10,
  author       = {Hui Liu and
                  Hui Li and
                  Zhanxin Ma},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Efficient and Secure Authentication Protocol for {VANET}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {523--527},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.120},
  doi          = {10.1109/CIS.2010.120},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuMSK10,
  author       = {Yihui Liu and
                  Katherine Martin and
                  Andrew Sparkes and
                  Ross D. King},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {The Analysis of Yeast Cell Morphology Using a Robot Scientist},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {10--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.10},
  doi          = {10.1109/CIS.2010.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuMSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuR10,
  author       = {Yong{-}lin Liu and
                  Mei{-}ying Ren},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {IMP-Filters of R0-Algebras},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {15--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.158},
  doi          = {10.1109/CIS.2010.158},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuXS10,
  author       = {Dalian Liu and
                  Chunfeng Xing and
                  Xuehai Shang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A New Genetic Algorithm and Its Convergence for Constrained Optimization
                  Problems},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {147--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.39},
  doi          = {10.1109/CIS.2010.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuZ10,
  author       = {Shunbin Liu and
                  Huicheng Zheng},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Motion Analysis Based on Spatial-Temporal Visual Attention},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {253--257},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.61},
  doi          = {10.1109/CIS.2010.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Luo10,
  author       = {Qi Luo},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Dynamic Fluzzy Clustering Algorithm for Web Documents Mining},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {64--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.21},
  doi          = {10.1109/CIS.2010.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Luo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MaHW10,
  author       = {Xiaoshu Ma and
                  Jing Huo and
                  Qun Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Multi-objective Genetic Algorithm Approach Based on the Uniform
                  Design Metmod},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {160--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.43},
  doi          = {10.1109/CIS.2010.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MaHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MengJD10,
  author       = {Zhiqing Meng and
                  Min Jiang and
                  Chuangyin Dang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Evolutionary Algorithm for Zero-One Constrained Optimization Problems
                  Based on Objective Penalty Function},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {132--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.36},
  doi          = {10.1109/CIS.2010.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MengJD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MengSJ10,
  author       = {Zhiqing Meng and
                  Baosheng Shao and
                  Min Jiang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Algorithm of Dynamic Associate Rule Based on Sliding Windows},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {51--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.18},
  doi          = {10.1109/CIS.2010.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MengSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NiuS10,
  author       = {Jingang Niu and
                  Shenghui Su},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Design Verification of {BJUT} Library Management System with {PVS}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {624--628},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.142},
  doi          = {10.1109/CIS.2010.142},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NiuS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/NiuWZ10,
  author       = {Wenxue Niu and
                  Zhenghong Wei and
                  Quanju Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Non-Linear Model for Evaluating Professional Manager's Incentive
                  Effect},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {664--666},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.149},
  doi          = {10.1109/CIS.2010.149},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/NiuWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PanC10,
  author       = {Xiaoying Pan and
                  Hao Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Multi-agent Social Evolutionary Algorithm for Resource-Constrained
                  Project Scheduling},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {209--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.51},
  doi          = {10.1109/CIS.2010.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PanC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PanZ10,
  author       = {Wenbin Pan and
                  Yanquan Zhou},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Chinese Sentiment Orientation Analysis},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.8},
  doi          = {10.1109/CIS.2010.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PanZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Peng10,
  author       = {Shu{-}Juan Peng},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Motion Segmentation Using Central Distance Features and Low-Pass Filter},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {223--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.54},
  doi          = {10.1109/CIS.2010.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Peng10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PengWZ10,
  author       = {Xuena Peng and
                  Yingyou Wen and
                  Hong Zhao},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Securing {GPRS} Tunnel Protocol in 3G Core Network},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {469--473},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.108},
  doi          = {10.1109/CIS.2010.108},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PengWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PuLSC10,
  author       = {Fang Pu and
                  Linlang Liu and
                  Yu Shen and
                  Qiying Cao},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {P2P-Based Semantic Policy Infrastucture for Pervasive Computing},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {541--545},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.124},
  doi          = {10.1109/CIS.2010.124},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PuLSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/QinGW10,
  author       = {Yuxia Qin and
                  Lanshen Guo and
                  Jian Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Tool Wear Detection Based on Wavelet Packet and {BP} Neural Network},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {33--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.14},
  doi          = {10.1109/CIS.2010.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/QinGW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/QuCY10,
  author       = {Dong Qu and
                  Ping Chen and
                  Jing Yang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Efficient Solver for Differential Equations with Random Inputs},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {606--610},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.138},
  doi          = {10.1109/CIS.2010.138},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/QuCY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/RenLW10,
  author       = {Huorong Ren and
                  Chunxiao Li and
                  Haizhen Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Improved {DLDA} Based Method- Nonparametric {DLDA}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {270--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.65},
  doi          = {10.1109/CIS.2010.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/RenLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/RenQL10,
  author       = {Fei Ren and
                  Zhiguang Qin and
                  Xianhong Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Method to Prevent {CW} Sharing in {DTV} {CAS}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {429--432},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.99},
  doi          = {10.1109/CIS.2010.99},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/RenQL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/RenQY10,
  author       = {Fei Ren and
                  Zhiguang Qin and
                  Jinfeng Yang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A New Technique of Anti-tampering Technology Based on {AVS} Video},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {386--389},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.89},
  doi          = {10.1109/CIS.2010.89},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/RenQY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/RenWS10,
  author       = {Qing{-}dao{-}er{-}ji Ren and
                  Yuping Wang and
                  Xiaojing Si},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {An Improved Genetic Algorithm for Job Shop Scheduling Problem},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {113--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.32},
  doi          = {10.1109/CIS.2010.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/RenWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShabtaiFE10,
  author       = {Asaf Shabtai and
                  Yuval Fledel and
                  Yuval Elovici},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Automated Static Code Analysis for Classifying Android Applications
                  Using Machine Learning},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {329--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.77},
  doi          = {10.1109/CIS.2010.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShabtaiFE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShangCW10,
  author       = {Yun Shang and
                  Jian Chen and
                  Qun Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Improved Electromagnetism-Like Mechanism Algorithm for Constrained
                  Optimization Problem},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {165--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.42},
  doi          = {10.1109/CIS.2010.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShangCW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShangW10,
  author       = {He Shang and
                  Mingqiang Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Some New Optimal Pairings},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {390--393},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.90},
  doi          = {10.1109/CIS.2010.90},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShiFC10,
  author       = {Xiong Shi and
                  Xiaofeng Feng and
                  Jun Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {The Research on Multi-viewpoint Navigation Based on Spherical Panoramic
                  Images},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {261--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.63},
  doi          = {10.1109/CIS.2010.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShiFC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShiP10,
  author       = {Weimin Shi and
                  Changgen Peng},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Protocol of Secure Multi-party Multiplication Based on Bilinear
                  Pairing},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {302--305},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.72},
  doi          = {10.1109/CIS.2010.72},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShimshonMRE10,
  author       = {Tomer Shimshon and
                  Robert Moskovitch and
                  Lior Rokach and
                  Yuval Elovici},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Continuous Verification Using Keystroke Dynamics},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {411--415},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.95},
  doi          = {10.1109/CIS.2010.95},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShimshonMRE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Song10,
  author       = {Hongye Song},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Generalized Additive Models of {DEA} and Generalized Non-Dominated
                  Solution in Multi-objective Programming},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {596--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.136},
  doi          = {10.1109/CIS.2010.136},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Song10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SuLL10,
  author       = {Shao{-}juan Su and
                  Yin{-}dong Liu and
                  Xiao{-}Ming Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Ship 3D Collaborate Design Integration System Research},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {601--605},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.137},
  doi          = {10.1109/CIS.2010.137},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SuLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SunCTW10,
  author       = {Wenbang Sun and
                  Hexin Chen and
                  Haiyan Tang and
                  Di Wu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Unsupervised Image Change Detection Based on 2-D Fuzzy Entropy},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {248--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.60},
  doi          = {10.1109/CIS.2010.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SunCTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TangJ10,
  author       = {Qiang Tang and
                  Arjan Jeckmans},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Efficient Client Puzzle Schemes to Mitigate DoS Attacks},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {293--297},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.70},
  doi          = {10.1109/CIS.2010.70},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/TangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TianDH10,
  author       = {Tian Tian and
                  Hua Duan and
                  Guoping He},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Privacy-Preserving Classification on Horizontally Partitioned Data},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {230--233},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.56},
  doi          = {10.1109/CIS.2010.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TianDH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TsiafoulisZ10,
  author       = {Stergios G. Tsiafoulis and
                  Vasilios Zorkadis},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Neural Network Clustering Based Algorithm for Privacy Preserving
                  Data Mining},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {401--405},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.93},
  doi          = {10.1109/CIS.2010.93},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TsiafoulisZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TuLL10,
  author       = {Yu Tu and
                  Yubao Liu and
                  Zhijie Li},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Online Segmentation Algorithm for Time Series Based on {BIRCH} Clustering
                  Features},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {55--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.19},
  doi          = {10.1109/CIS.2010.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TuLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangC10,
  author       = {Wei Wang and
                  Wen{-}Sheng Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {{DST} Feature Based Locality Preserving Projections for Face Recognition},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {288--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.69},
  doi          = {10.1109/CIS.2010.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangC10a,
  author       = {Jie Wang and
                  Yongquan Cai},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Game Analysis of Non-trusted Threshold Authentication Scheme},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {450--453},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.104},
  doi          = {10.1109/CIS.2010.104},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangC10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangC10b,
  author       = {Ruliang Wang and
                  Chaoyang Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Robust Adaptive Neural Control for a Class of Stochastic Nonlinear
                  Systems},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {511--514},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.117},
  doi          = {10.1109/CIS.2010.117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangC10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangCH10,
  author       = {Jie Wang and
                  Yongquan Cai and
                  Jingyang He},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A New Threshold Signature Scheme to Withstand the Conspiracy Attack},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {343--346},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.80},
  doi          = {10.1109/CIS.2010.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangG10,
  author       = {Zhenyou Wang and
                  Xuejun Gao},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Performance Analysis Based on Transform Matrix of {MLE} in {CICA}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {227--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.55},
  doi          = {10.1109/CIS.2010.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangJ10,
  author       = {Ruliang Wang and
                  Huiying Jiang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Observer-Based Adaptive Neural Network Robust Control of Nonlinear
                  Time-Delay Systems with Unmodeled Dynamics},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {506--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.116},
  doi          = {10.1109/CIS.2010.116},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangJDL10,
  author       = {Xiuyu Wang and
                  Xingwu Jiang and
                  Xiaogang Dong and
                  Qinghuai Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Existence of the Solution for General Complementarity Problems},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {214--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.52},
  doi          = {10.1109/CIS.2010.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangJDL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangLL10,
  author       = {Gaozu Wang and
                  Weihuai Li and
                  Wenbin Li},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Research on Validity Evaluation of Mandatory Access Control Policy
                  under {LSM} Framework},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {306--309},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.73},
  doi          = {10.1109/CIS.2010.73},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangLP10,
  author       = {Juguo Wang and
                  Guoqi Li and
                  Yun Pu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Scenario-Based Architecture for Reliability Design of Artificial
                  Intelligent Software},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {6--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.9},
  doi          = {10.1109/CIS.2010.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangM10,
  author       = {Ruliang Wang and
                  Kunbo Mei},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Analysis of Fuzzy Membership Function Generation with Unsupervised
                  Learning Using Self-Organizing Feature Map},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {515--518},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.118},
  doi          = {10.1109/CIS.2010.118},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangP10,
  author       = {Shiyu Wang and
                  Sulin Pang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Reputation Calculation Model in E-Shopping Websites},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {644--648},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.146},
  doi          = {10.1109/CIS.2010.146},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangW10,
  author       = {Xueming Wang and
                  Lichen Weng},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Game-Based Analysis and Improvement of a Fair Contract Signing Protocol},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {325--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.76},
  doi          = {10.1109/CIS.2010.76},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangW10a,
  author       = {Gaoli Wang and
                  Shaohui Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Differential Fault Analysis on {PRESENT} Key Schedule},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {362--366},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.84},
  doi          = {10.1109/CIS.2010.84},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangW10b,
  author       = {Gaoli Wang and
                  Shaohui Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Improved Differential Cryptanalysis of Serpent},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {367--371},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.85},
  doi          = {10.1109/CIS.2010.85},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangW10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangWZ10,
  author       = {Xu An Wang and
                  Ping Wei and
                  Minqing Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {New CCA-Secure Proxy Re-encryption Scheme without Random Oracles},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {377--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.87},
  doi          = {10.1109/CIS.2010.87},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/WangWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangXJZ10,
  author       = {Hao Wang and
                  Qiuliang Xu and
                  Han Jiang and
                  Xiufeng Zhao},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Fully Anonymous Identity-Based Signcryption Scheme in the Standard
                  Model},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {372--376},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.86},
  doi          = {10.1109/CIS.2010.86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangXJZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangYLL10,
  author       = {Xuecheng Wang and
                  Risheng Yang and
                  Minyan Lu and
                  Haifeng Li},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Discrete Bayesian-Based Scheme of Software Reliability Demonstration
                  Testing with Decreasing Function for the Safety Critical Software},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {591--595},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.135},
  doi          = {10.1109/CIS.2010.135},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangYLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangZLL10,
  author       = {Yating Wang and
                  Wuneng Zhou and
                  Jinliang Liu and
                  Da Luo},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {New Results on H{\(\infty\)} Filter Design for Continue-Time Systems
                  with Time-Varying Delay},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {23--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.12},
  doi          = {10.1109/CIS.2010.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangZLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangZTL10,
  author       = {Wei Wang and
                  Nianke Zong and
                  Jie Tang and
                  Sangarapillai Lambotharan},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Soft Information Improvement for {PN} Sequence Iterative Acquisition},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {533--536},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.122},
  doi          = {10.1109/CIS.2010.122},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/WangZTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WeiWY10,
  author       = {Ping Wei and
                  Xu An Wang and
                  Xiaoyuan Yang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Proxy Re-encryption from {CLE} to {CBE}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {339--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.79},
  doi          = {10.1109/CIS.2010.79},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/WeiWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WenPCZ10,
  author       = {Yingyou Wen and
                  Xuena Peng and
                  Shuyi Chen and
                  Hong Zhao},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Sheme of Mobile Platform Based on Trusted Computing},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {465--468},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.154},
  doi          = {10.1109/CIS.2010.154},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WenPCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WenY10,
  author       = {Jiechang Wen and
                  Xuefei Yao},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A New Kind of Handling Constraint Method for Optimization},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {104--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.30},
  doi          = {10.1109/CIS.2010.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WenY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Wolfengagen10,
  author       = {Viacheslav Wolfengagen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Semantic Modeling: Computational Models of the Concepts},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {42--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.16},
  doi          = {10.1109/CIS.2010.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Wolfengagen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuC10,
  author       = {Jiansheng Wu and
                  Enhong Chen},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Novel Hybrid Particle Swarm Optimization for Feature Selection and
                  Kernel Optimization in Support Vector Regression},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {189--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.47},
  doi          = {10.1109/CIS.2010.47},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuNGL10,
  author       = {Zhangjun Wu and
                  Zhiwei Ni and
                  Lichuan Gu and
                  Xiao Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Revised Discrete Particle Swarm Optimization for Cloud Workflow
                  Scheduling},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {184--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.46},
  doi          = {10.1109/CIS.2010.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuNGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuP10,
  author       = {Manqi Wu and
                  Sulin Pang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Stock Index Futures Margin Level Settings by Hill Estimation and Empirical
                  Analysis},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {649--653},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.155},
  doi          = {10.1109/CIS.2010.155},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuS10,
  author       = {Xiaotian Wu and
                  Wei Sun},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Data Hiding in Block Truncation Coding},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {406--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.94},
  doi          = {10.1109/CIS.2010.94},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WuWZRZ10,
  author       = {Zhengjia Wu and
                  Wen Wang and
                  Jin Zhou and
                  Fen{-}fen Ren and
                  Cheng Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Research on Double Objective Optimization of Master Production Schedule
                  Based on Ant Colony Algorithm},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {200--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.49},
  doi          = {10.1109/CIS.2010.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WuWZRZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Xiao10,
  author       = {Li Xiao},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Neural Network Method for Solving Linear Fractional Programming},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {37--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.15},
  doi          = {10.1109/CIS.2010.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Xiao10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XiaoSLL10,
  author       = {Shibin Xiao and
                  Zhu Shi and
                  Kun Liu and
                  Xueqiang Lv},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Kind of Vector Space Representation Model Based on Semantic in the
                  Field of English Standard Information},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {582--585},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.133},
  doi          = {10.1109/CIS.2010.133},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XiaoSLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XuZP10,
  author       = {Duanquan Xu and
                  Jiangshan Zhang and
                  Baochuan Pang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Digital Watermarking Scheme Used for Authentication of Surveillance
                  Video},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {654--658},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.147},
  doi          = {10.1109/CIS.2010.147},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XuZP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/Yang10,
  author       = {Wei Yang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Fast HITON{\_}PC Algorithm},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {47--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.17},
  doi          = {10.1109/CIS.2010.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/Yang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangL10,
  author       = {Jun{-}jie Yang and
                  Hai{-}Lin},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A New Clustering Algorithm Based on Normalized Signal for Sparse Component
                  Analysis},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {60--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.20},
  doi          = {10.1109/CIS.2010.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangMZ10,
  author       = {Li Yang and
                  Jianfeng Ma and
                  Junwei Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Security Flaws and Improvements to a Direct Anonymous Attestation
                  Scheme for Mobile Computing Platforms},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {334--338},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.78},
  doi          = {10.1109/CIS.2010.78},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangWN10,
  author       = {Yajuan Yang and
                  Pingan Wang and
                  Wenxue Niu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Industrial Clusters Evolution Research Based on the {SGA}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {117--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.33},
  doi          = {10.1109/CIS.2010.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangWN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YaoL10,
  author       = {Xue{-}fei Yao and
                  Hai{-}Lin},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {The Comparison of Two Kinds of Reproduction in Multiobjective Optimization},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {95--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.28},
  doi          = {10.1109/CIS.2010.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YaoL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YaoZ10,
  author       = {Hong Yao and
                  Wuneng Zhou},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Synchronization Algorithm for Multi-hop in Wireless Sensor Networks},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {28--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.13},
  doi          = {10.1109/CIS.2010.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YaoZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YeZX10,
  author       = {Li{-}Hua Ye and
                  Rong Zhu and
                  Jie Xu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Novel Image Classification Method Based on Double Manifold Learning},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {265--269},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.64},
  doi          = {10.1109/CIS.2010.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YeZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YuF10,
  author       = {Wang Yu and
                  Xu Feng},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Capability Simulating Model for Complex Communication Network},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {611--613},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.139},
  doi          = {10.1109/CIS.2010.139},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YuF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YueW10,
  author       = {Meng Yue and
                  Xiaofeng Wu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {The Approach of {ACARS} Data Encryption and Authentication},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {556--560},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.127},
  doi          = {10.1109/CIS.2010.127},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YueW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZengJXZ10,
  author       = {Wu Zeng and
                  Xiubao Jiang and
                  Zhengquan Xu and
                  Long Zhou},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Image Denoising Using Nonseparable Wavelet and {SURE-LET}},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {680--684},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.153},
  doi          = {10.1109/CIS.2010.153},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZengJXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangDPW10,
  author       = {Wei Zhang and
                  Ranran Du and
                  Minhui Pang and
                  Qiuhong Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Automatic Speech Corpus Construction from Broadcasting Speech Databases},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {639--643},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.145},
  doi          = {10.1109/CIS.2010.145},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangDPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangHMX10,
  author       = {Fengrong Zhang and
                  Yupu Hu and
                  Hua Ma and
                  Min Xie},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Constructions of Maiorana-McFarland's Bent Functions of Prescribed
                  Degree},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {315--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.157},
  doi          = {10.1109/CIS.2010.157},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangHMX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangL10,
  author       = {Suxian Zhang and
                  Hai{-}Lin Liu},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Improved Fuzzy K-Subspace Clustering and Its Application in Multiple
                  Dominant Sparse Component Analysis},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {77--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.24},
  doi          = {10.1109/CIS.2010.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangLHX10,
  author       = {Wenjuan Zhang and
                  Zhaohui Li and
                  Yonghui Hu and
                  Wei Xia},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Cluster Features of Bluetooth Mobile Phone Virus and Research on Strategies
                  of Control {\&} Prevention},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {474--477},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.109},
  doi          = {10.1109/CIS.2010.109},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangLHX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangS10,
  author       = {Li{-}wen Zhang and
                  Ming Shao},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Chaotic Synchronization with Single-Ring Erbium-Doped Fiber Laser
                  Systems},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {437--440},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.101},
  doi          = {10.1109/CIS.2010.101},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangSW10,
  author       = {Wenyao Zhang and
                  Bo Sun and
                  Yi Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Streamline Placement Method Highlighting Flow Field Topology},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {238--242},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.58},
  doi          = {10.1109/CIS.2010.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangW10,
  author       = {Jing Zhang and
                  Pingan Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Non-Adjacent Form Recursive Algorithm on Elliptic Curves Cryptograph},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {394--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.91},
  doi          = {10.1109/CIS.2010.91},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangZ10,
  author       = {Huidang Zhang and
                  Yifei Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {The Particle Swarm Optimization with Decaying {ICMIC} for Shortest
                  Path Computation in Computer Networks},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {179--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.45},
  doi          = {10.1109/CIS.2010.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangZ10a,
  author       = {Zhenzhen Zhang and
                  Defu Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Research on Game Algorithm for Zhang Chess},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {619--623},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.141},
  doi          = {10.1109/CIS.2010.141},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangZ10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangZXZ10,
  author       = {Chuanrong Zhang and
                  Lianqing Zheng and
                  Mingwen Xia and
                  Yuqing Zhang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Secure Signcryption Scheme Based on a Hybrid Encryption},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {537--540},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.123},
  doi          = {10.1109/CIS.2010.123},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangZXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoGY10,
  author       = {Haixing Zhao and
                  Zhuma Gao and
                  Jun Yin},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A Method to Find Chromatically Unique Multipartite Graphs},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {629--633},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.143},
  doi          = {10.1109/CIS.2010.143},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoGY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoPBPL10,
  author       = {Xiaohui Zhao and
                  Liaojun Pang and
                  Jingjuan Bi and
                  Qingqi Pei and
                  Huixian Li},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Secure Communication Model of {WSN} Based on Secret Sharing},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {483--487},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.111},
  doi          = {10.1109/CIS.2010.111},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoPBPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoWW10,
  author       = {Xiufeng Zhao and
                  Dawei Wei and
                  Hao Wang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Asymmetric Group Key Agreement with Traitor Traceability},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {347--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.81},
  doi          = {10.1109/CIS.2010.81},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoY10,
  author       = {Gao{-}chang Zhao and
                  Xiao{-}Lin Yang},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {A {BCH} Code with the Distance 11 for Sensornets},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {676--679},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.152},
  doi          = {10.1109/CIS.2010.152},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZouZ10,
  author       = {Juan Zou and
                  Jinhua Zheng},
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {Research on Feature Extraction Based on Genetic Algorithm in Text
                  Categorization},
  booktitle    = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  pages        = {91--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIS.2010.27},
  doi          = {10.1109/CIS.2010.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZouZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cis/2010,
  editor       = {Muren Liu and
                  Yuping Wang and
                  Ping Guo},
  title        = {2010 International Conference on Computational Intelligence and Security,
                  {CIS} 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December
                  11-14, 2010},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5692951/proceeding},
  isbn         = {978-1-4244-9114-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics