Loading…
Kernel-based Behavior Analysis for Android Malware Detection
Isohara, T., Takemori, K., Kubota, A.
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism
Changji Wang, Jiasen Huang
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
A Survey on Methods of Automatic Protocol Reverse Engineering
XiangDong Li, Li Chen
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
An Intelligent Vehicle Monitoring System Based on Internet of Things
Hu Lingling, Li Haifeng, Xu Xu, Li Jian
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Pedestrian Detection Based on HOG-LBP Feature
Guolong Gan, Jian Cheng
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers
Hegedus, J., Miche, Y., Ilin, A., Lendasse, A.
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
A Neural Network for a Class of Horizontal Linear Complementary Problems
Xingbao Gao, Jing Wang
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Search Engine Optimization Based on Algorithm of BP Neural Networks
Shuo Wang, Kaiying Xu, Yong Zhang, Fei Li
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
An Embedded Software Fusion Power Model Based on Algorithm and Micro-architectural Level
Bing Guo, Yan Shen, Xiao Bin Liu, Qi Li, Ji He Wang, Yuan Sheng Wu
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Local Reconstruction Error of l2 Norm for Discriminant Feature Extraction
Yu Hou, Caikou Chen
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
An Important Property about Vertex Distance of Crossed Cubes CQn
Xirong Xu, Aihua Deng, Wenhua Zhai
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Loading…
A Hybrid Multiobjective Differential Evolution Algorithm Based on Improved e-Dominance
Ning Dong, Yuping Wang
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
An Improved Signcryption with Proxy Re-encryption and its Application
Caifen Wang, Xiaojun Cao
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Robust Stability for Uncertain Neutral Systems with Time-varying and Distributed Delays
Liang Yuan-xin
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Loading…
An Interactive Charge Scheme with Reward and Non-repudiation
Chunling Wang, Fei Yang
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Weak-pseudo-R0 Algebras
Yong-lin Liu, Xiao-bo Cai
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
The BSC Alarm Management System Based on Rough Set Theory in Mobile Communication
Chao Deng, Sulin Pang
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Analysis of the Authentication Protocols Based on Game Theory
Xinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, Jianfeng Ma
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding