Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Attribute-Based Keyword Search and Data Access Control in Cloud
Jiazhi Li, Lei Zhang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization Algorithm
Jing Zhang, Huanqin Li
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Financial Time Series Forecasting Using Support Vector Machine
Bin Gui, Xianghe Wei, Qiong Shen, Jingshan Qi, Liqiang Guo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
A Fast Image Stitching Algorithm Based on Improved SURF
Zhu, Lin, Wang, Ying, Zhao, Bo, Zhang, Xiaozheng
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Surveying and Analyzing Security Problems in Cloud Computing Environments
Jouini, Mouna, Ben Arfa Rabai, Latifa
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Quantum Algorithm for Polynomial Root Finding Problem
Sun, Guodong, Su, Shenghui, Xu, Maozhi
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Wavelet-Based Noise Reduction in Power Analysis Attack
Wei Liu, Liji Wu, Xiangmin Zhang, An Wang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Detecting Driver Use of Mobile Phone Based on In-Car Camera
Dan Wang, Mingtao Pei, Lan Zhu
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Brain Storm Optimization Model Based on Uncertainty Information
Junfeng Chen, Yingjuan Xie, Jianjun Ni
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Design of a Masked S-Box for SM4 Based on Composite Field
Hao Liang, Liji Wu, Xiangmin Zhang, Jiabin Wang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text Documents
Ya Wang, Ding-Cheng Ji
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
A Multiple-Level DCT Based Robust DWT-SVD Watermark Method
Xueyi Ye, Xueting Chen, Meng Deng, Shuyun Hui, Yunlu Wang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Multi-sender Broadcast Authentication in Wireless Sensor Networks
Ya Gao, Peng Zeng, Choo, Kim-Kwang Raymond
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Adaptive Chosen-Plaintext Correlation Power Analysis
Wenjing Hu, Liji Wu, An Wang, Xinjun Xie, Zhihui Zhu, Shun Luo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Improved Bacterial Foraging Optimization Algorithm with Information Communication Mechanism
Ben Niu, Jing Liu, Ying Bi, Ting Xie, Lijing Tan
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
An Improved Side-Channel Attack Based on Support Vector Machine
Zhong Zeng, Dawu Gu, Junrong Liu, Zheng Guo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
An Improved Remote Sensing Image Classification Based on K-Means Using HSV Color Feature
Wu, Shulei, Chen, Huandong, Zhao, Zhizhong, Long, Haixia, Song, Chunhui
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Improved Adaptive Median Filter
Guo Zhengyang, Zhang Le
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
A Study of Deep Belief Network Based Chinese Speech Emotion Recognition
Bu Chen, Qian Yin, Ping Guo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Hierarchial Identity-Based Encryption Scheme from Multilinear Maps
Hao Wang, Zhihua Zheng, Lei Wu
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding