ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2010 International Conference on Computational Intelligence and Security
Latest Publications
TOTAL DOCUMENTS
161
(FIVE YEARS 0)
H-INDEX
8
(FIVE YEARS 0)
Published By IEEE
9781424491148
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
[Cover art]
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.161
◽
2010
◽
Keyword(s):
Cover Art
Download Full-text
A New Evolutionary Algorithm Based on Simplex Crossover and PSO Mutation for Constrained Optimization Problems
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.38
◽
2010
◽
Cited By ~ 1
Author(s):
Yibo Hu
Keyword(s):
Constrained Optimization
◽
Evolutionary Algorithm
◽
Optimization Problems
◽
Constrained Optimization Problems
Download Full-text
A Digital Watermarking Scheme Used for Authentication of Surveillance Video
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.147
◽
2010
◽
Cited By ~ 3
Author(s):
Duanquan Xu
◽
Jiangshan Zhang
◽
Baochuan Pang
Keyword(s):
Digital Watermarking
◽
Surveillance Video
◽
Watermarking Scheme
Download Full-text
A Sheme of Mobile Platform Based on Trusted Computing
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.154
◽
2010
◽
Author(s):
Yingyou Wen
◽
Xuena Peng
◽
Shuyi Chen
◽
Hong Zhao
Keyword(s):
Trusted Computing
◽
Mobile Platform
Download Full-text
Improved Differential Cryptanalysis of Serpent
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.85
◽
2010
◽
Author(s):
Gaoli Wang
◽
Shaohui Wang
Keyword(s):
Differential Cryptanalysis
Download Full-text
Program Committee and Additional Reviewers
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.7
◽
2010
◽
Keyword(s):
Program Committee
Download Full-text
A Naive Feature Selection Method and Its Application in Network Intrusion Detection
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.96
◽
2010
◽
Cited By ~ 1
Author(s):
Tieming Chen
◽
Xiaoming Pan
◽
Yiguang Xuan
◽
Jixia Ma
◽
Jie Jiang
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Feature Selection Method
◽
Selection Method
◽
Network Intrusion Detection
◽
Network Intrusion
Download Full-text
Essence of Two-Dimensional Principal Component Analysis
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.67
◽
2010
◽
Author(s):
Caikou Chen
◽
Jingyu Yangzhou
Keyword(s):
Principal Component Analysis
◽
Principal Component
◽
Component Analysis
◽
Two Dimensional
Download Full-text
Preface
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.5
◽
2010
◽
Download Full-text
A New Threshold Signature Scheme to Withstand the Conspiracy Attack
2010 International Conference on Computational Intelligence and Security
◽
10.1109/cis.2010.80
◽
2010
◽
Cited By ~ 1
Author(s):
Jie Wang
◽
Yongquan Cai
◽
Jingyang He
Keyword(s):
Signature Scheme
◽
Threshold Signature
◽
Conspiracy Attack
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close