Loading…
Attribute-Based Keyword Search and Data Access Control in Cloud
Jiazhi Li, Lei Zhang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization Algorithm
Jing Zhang, Huanqin Li
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Financial Time Series Forecasting Using Support Vector Machine
Bin Gui, Xianghe Wei, Qiong Shen, Jingshan Qi, Liqiang Guo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Fast Image Stitching Algorithm Based on Improved SURF
Zhu, Lin, Wang, Ying, Zhao, Bo, Zhang, Xiaozheng
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Wavelet-Based Noise Reduction in Power Analysis Attack
Wei Liu, Liji Wu, Xiangmin Zhang, An Wang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Quantum Algorithm for Polynomial Root Finding Problem
Sun, Guodong, Su, Shenghui, Xu, Maozhi
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Detecting Driver Use of Mobile Phone Based on In-Car Camera
Dan Wang, Mingtao Pei, Lan Zhu
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Design of a Masked S-Box for SM4 Based on Composite Field
Hao Liang, Liji Wu, Xiangmin Zhang, Jiabin Wang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Brain Storm Optimization Model Based on Uncertainty Information
Junfeng Chen, Yingjuan Xie, Jianjun Ni
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Multiple-Level DCT Based Robust DWT-SVD Watermark Method
Xueyi Ye, Xueting Chen, Meng Deng, Shuyun Hui, Yunlu Wang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text Documents
Ya Wang, Ding-Cheng Ji
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Multi-sender Broadcast Authentication in Wireless Sensor Networks
Ya Gao, Peng Zeng, Choo, Kim-Kwang Raymond
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Surveying and Analyzing Security Problems in Cloud Computing Environments
Jouini, Mouna, Ben Arfa Rabai, Latifa
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
An Improved Remote Sensing Image Classification Based on K-Means Using HSV Color Feature
Wu, Shulei, Chen, Huandong, Zhao, Zhizhong, Long, Haixia, Song, Chunhui
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Improved Bacterial Foraging Optimization Algorithm with Information Communication Mechanism
Ben Niu, Jing Liu, Ying Bi, Ting Xie, Lijing Tan
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
An Improved Side-Channel Attack Based on Support Vector Machine
Zhong Zeng, Dawu Gu, Junrong Liu, Zheng Guo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Adaptive Chosen-Plaintext Correlation Power Analysis
Wenjing Hu, Liji Wu, An Wang, Xinjun Xie, Zhihui Zhu, Shun Luo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Chosen-Plaintext Method of CPA on SM4 Block Cipher
Weijun Shan, Lihui Wang, Qing Li, Limin Guo, Shanshan Liu, Zhimin Zhang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Study of Deep Belief Network Based Chinese Speech Emotion Recognition
Bu Chen, Qian Yin, Ping Guo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Hierarchial Identity-Based Encryption Scheme from Multilinear Maps
Hao Wang, Zhihua Zheng, Lei Wu
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding