Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A Survey on the Internet of Things Security
Kai Zhao, Lina Ge
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Optical Flow Based Urban Road Vehicle Tracking
Ya Liu, Yao Lu, Qingxuan Shi, Jianhua Ding
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges
Wenjuan Li, Yuxin Meng, Lam-For Kwok
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Using CloudSim to Model and Simulate Cloud Computing Environment
Wang Long, Lan Yuqing, Xia Qingxin
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
A Novel Approach to IoT Security Based on Immunology
Caiming Liu, Yan Zhang, Huaqiang Zhang
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Software Defect Prediction Using Dynamic Support Vector Machine
Bo Shuai, Haifeng Li, Mengjun Li, Quan Zhang, Chaojing Tang
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
A Symmetric Image Encryption Scheme Using Chaotic Baker Map and Lorenz System
Chong Fu, Wen-Jing Li, Zhao-Yu Meng, Tao Wang, Pei-Xuan Li
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
The Finite Element Analysis on the Multi-bubble Model in the Ship Wake
Zhang Qun, Wang Ying-Min
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Study on Pseudorandomness of Some Pseudorandom Number Generators with Application
Lequan Min, Kexin Hu, Lijiao Zhang, Yuqun Zhang
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Multi-objective Evolutionary Algorithm for 4G Base Station Planning
Wentian Mai, Hai-Lin Liu, Lei Chen, Jiongcheng Li, Henghui Xiao
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Effective Fuzzing Based on Dynamic Taint Analysis
Guangcheng Liang, Lejian Liao, Xin Xu, Jianguang Du, Guoqiang Li, Henglong Zhao
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Differential Evolution Based Parameters Selection for Support Vector Machine
Li Jun, Ding Lixin, Xing Ying
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Orthogonal Locally Discriminant Projection for Classification of Plant Leaf Diseases
Shanwen Zhang, Chuanlei Zhang
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Application of the Hybrid SVM-KNN Model for Credit Scoring
Hanhai Zhou, Jinjin Wang, Jiadong Wu, Long Zhang, Peng Lei, Xiaoyun Chen
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
A Verifiable Proxy Re-encryption with Keyword Search without Random Oracle
Lifeng Guo, Bo Lu, Xiangyu Li, He Xu
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
The Superiority Analysis of Linear Frequency Modulation and Barker Code Composite Radar Signal
Yang Chunhong, Liu Zengli
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
Improving Short Text Classification through Better Feature Space Selection
Meng Wang, Lanfen Lin, Feng Wang
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
An Improved Differential Evolution Algorithm for Mixed Integer Programming Problems
Wu Jun, Gao Yuelin, Yan Lina
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding
A Method of Shot-Boundary Detection Based on HSV Space
Qifan Fu, Yichun Zhang, Liyong Xu, Huixin Li
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Published in 2013 Ninth International Conference on Computational Intelligence and Security (01.12.2013)
Get full text
Conference Proceeding