Cover image for Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papers
Title:
Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papers
Series:
Lecture notes in computer science, 4456
Publication Information:
Berlin : Springer, 2007
Physical Description:
xxiii, 1118 p. : ill. ; 24 cm.
ISBN:
9783540743767
General Note:
Available online version
Electronic Access:
Fulltext

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010164740 Q342 C57 2007 Open Access Book Proceedings, Conference, Workshop etc.
Searching...

On Order

Summary

Summary

The refereed post-proceedings of the International Conference on Computational Intelligence and Security are presented in this volume. The 116 papers were submitted to two rounds of careful review. Papers cover bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, and pattern recognition.


Table of Contents

Lijuan Li and Zhibin Huang and Feng LiuHongwei Huo and Vojislav StojkovicXiaoping Luo and Wenyao Pang and Ji HuangYuelin Gao and Chengxian Xu and Jimin LiXiangpei Hu and Qiulei Ding and Yongxian Li and Dan SongShulin Wang and Huowang Chen and Ji Wang and Dingxing Zhang and Shutao LiChen Liao and Shutao Li and Zhiyuan LuoXianjun Shen and Yuanxiang Li and Bojin Zheng and Zhifeng DaiQuanju Zhang and Fuye Feng and Zhenghong WeiJingxuan Wei and Yuping WangKata Praditwong and Xin YaoFu Yuan Hu and Hau San Wong and Zhi Qiang Liu and Hui Yang QuXingwei Wang and Pengcheng Liu and Min HuangGengui Zhou and Zhenyu Cao and Jian Cao and Zhiqing MengDan Liu and Yuanda CaoMin-Rong Chen and Yong-Zai Lu and Genke YangLixin Ding and Jinghu YuChaohua Dai and Yunfang Zhu and Weirong ChenGaoping Wang and Liyuan BaiXin Tan and Huaqian YangLiang Ming and Yuping WangCheng Bo and Guo Zhenyu and Cao Binggang and Wang JunpingLixin Ding and Yingzhou BiSeng Kah Phooi and Ang L. MRangsipan MarukatatZhiqing Meng and Lifang Peng and Gengui Zhou and Yihua ZhuFrank Chiang and Robin BraunFuyan Liu and Shaoyi LuShilei Huang and Xiang Xie and Jingming KuangSeyed Eghbal Ghobadi and Klaus Hartmann and Otmar Loffeld and Wolfgang WeihsAlain Delaplace and Thierry Brouard and Hubert CardotYoungAh Lce and SeokMi HongBinbin He and Cuihua ChenDug Hun Hong and Changha Hwang and Jooyong Shim and Kyung Ha SeokChan-Yun Yang and Che-Chang Hsu and Jr-Syu YangChuen-Tsai Sun and Ji-Lung Hsieh and Chung-Yuan HuangGang Li and Yongqiang Li and Linyan Sun and Ping JiDongwon Jeong and Keunhwan Jeon and Jang-won Kim and Jinhyung Kim and Doo-Kwon BaikSeokMi Hong and SeungGwan LeeFuchun Guo and Zhide Chen and Yi Mu and Li Xu and Shengyuan ZhangMasa-aki Fukase and Hiroki Takeda and Tomoaki SatoYuto Kawahara and Tsuyoshi Takagi and Eiji OkamotoFagen Li and Yupu Hu and Shuanggen LiuJeaHoon Park and HoonJae Lee and JaeCheol Ha and YongJe Choi and HoWon Kim and SangJae MoonMun-Kyu Lee and Dowon Hong and Dong Kyue KimYing Cai and Zhen HanNiansheng Liu and Donghui GuoJiho Kim and Duhyun Bae and Sehyun Park and Ohyoung SongChang Han Kim and Yongtae Kim and Sung Yeon Ji and IlWhan ParkJian Weng and Shengli Liu and Kefei Chen and Changshe MaYong Zhang and Xia-mu Niu and Jun-cao Li and Chun-ming LiSeung Wook Jung and Souhwan JungYu Fang Chung and Zhen Yu Wu and Feipei Lai and Tzer Shyong ChenWei Wang and Jianfeng Ma and SangJae MoonShuhua Wu and Yuefei ZhuZehui Wang and Zhiguo ZhangJin Li and Xiaofeng Chen and Tsz Hon Yuen and Yanming WangJianhong Zhang and Jian MaoYoon-Su Jeong and Bong-Keun Lee and Sang-Ho LeeVidyasagar Potdar and Song Han and Elizabeth Chang and Chen WuJia Yu and Fanyu Kong and Rong HaoYong-Zhen Li and Yoon-Su Jeong and Ning Sun and Sang-Ho LeeSung Bum Pan and Daesung Moon and Kichul Kim and Yongwha ChungXinshan ZhuBoyun Zhang and Jianping Yin and Jingbo Hao and Shulin Wang and Dingxing ZhangGoo-Rak Kwon and Seung-Won Jung and Sung-Jea KoJin-Wook Shin and Ju Cheng Yang and Sook Yoon and Dong-Sun ParkHuang Jianzhong and Xie Changsheng and Li XuHui Zhang and Bin Pang and Ke Xie and Hui WuHongyu Yang and Feng Xie and Yi LuZhu Lei and DaeHun Nyang and KyungHee Lee and Hyotaek LimKjetil Haslum and Andr ArnesAlex K.S. Ng and Janet Efstathiou and Henry Y.K. LauVojislav Stojkovic and Hongwei HuoXiaolong Li and Yaping Lin and Siqing Yang and Yeqing Yi and Jianping Yu and Xinguo LuJae-Min Seol and Seong-Whan KimMisun Moon and Dong Seong Kim and Jong Sou ParkQingqi Pei and Kefeng Fan and Jinxiu Dai and Jianfeng MaXuefei Cao and Weidong Kou and Huaping Li and Jie XuSeongHan Shin and Kazukuni Kobara and Hideki ImaiKyosuke Osaka and Tsuyoshi Takagi and Kenichi Yamazaki and Osamu TakahashiYong-Zhen Li and Young-Bok Cho and Nam-Kyoung Um and Sang-Ho LeeJun-Cheol Park and Geonu YuKaiyu Wan and Vasu AlagarMadihah Saudi and Nazean JomhariYang Bo and Lin Piyuan and Zhang WenzhengJorma Kajava and Juhani Anttila and Rauno Varonen and Reijo Savola and Juha RoningMengyao Zhu and Ming Zhang and Xiaoling Chen and Ding Zhang and Zhijie HuangJin Wang and Jia Yu and Daxing Li and Xi Bai and Zhongtian JiaYoung-Gab Kim and Dongwon Jeong and Soo-Hyun Park and Jongin Lim and Doo-Kwon BaikXin Lu and Zhi MaZhongwen Li and Yang Xiang and Dongsheng HeDong Seong Kim and Taek-Hyun Shin and Byunggil Lee and Jong Sou ParkJin Li and Xiaofeng Chen and Fangguo Zhang and Yanming WangQing Wang and Chuan-hua Zhou and Bao-hua ZhaoXinshan ZhuKi-Hong Ko and Seong-Whan KimLingyu Wang and Graham LeedhamRonghua Li and Beihai TanXiangzhi Bai and Fugen ZhouShaoming Zhang and Ying ChenMin Li and Xiangchu FengWenhui Zhou and Zhiyu Xiang and Weikang GuCheng Ma and Chengshun JiangLi Yingchun and Su GuangdaHua Cui and Guoxiang SongYiu-ming Cheung and Hong ZengJu Cheng Yang and Jin Wook Shin and Dong Sun ParkYun Xue and Chong Sze Tong and Weipeng ZhangRui-jun Gu and Wen-bo XuYuehui Sun and Minghui DuWencong Zhang and Hong Chen and Peng Yao and Bin Li and Zhenquan ZhuangKyoung-Sic Cho and Yong-Guk Kim and Yang-Bok LeeMing Bao and Luyang Guan and Xiaodong Li and Jing Tian and Jun YangXin Li and Bin Li and Hong Chen and Xianji Wang and Zhengquan ZhuangWen-Sheng Chen and Pong C Yuen and Jian Huang and Jianhuang Lai
Bio-inspired Computing
An Improved Particle Swarm Optimizer for Truss Structure Optimizationp. 1
Two-Phase Quantum Based Evolutionary Algorithm for Multiple Sequence Alignmentp. 11
A Further Discussion on Convergence Rate of Immune Genetic Algorithm to Absorbed-Statep. 22
Linear Programming Relax-PSO Hybrid Bound Algorithm for a Class of Nonlinear Integer Programming Problemsp. 29
An Improved Ant Colony System and Its Applicationp. 36
Molecular Diagnosis of Tumor Based on Independent Component Analysis and Support Vector Machinesp. 46
Gene Selection Using Wilcoxon Rank Sum Test and Support Vector Machine for Cancer Classificationp. 57
General Particle Swarm Optimization Based on Simulated Annealing for Multi-specification One-Dimensional Cutting Stock Problemp. 67
Neurodynamic Analysis for the Schur Decomposition of the Box Problemsp. 77
A New Model Based Multi-objective PSO Algorithmp. 87
Evolutionary Computation
A New Multi-objective Evolutionary Optimisation Algorithm: The Two-Archive Algorithmp. 95
Labeling of Human Motion by Constraint-Based Genetic Algorithmp. 105
Genetic Algorithm and Pareto Optimum Based QoS Multicast Routing Scheme in NGIp. 115
A Centralized Network Design Problem with Genetic Algorithm Approachp. 123
CGA: Chaotic Genetic Algorithm for Fuzzy Job Scheduling in Grid Environmentp. 133
Population-Based Extremal Optimization with Adaptive Levy Mutation for Constrained Optimizationp. 144
An Analysis About the Asymptotic Convergence of Evolutionary Algorithmsp. 156
Seeker Optimization Algorithmp. 167
Game Model Based Co-evolutionary Algorithm and Its Application for Multiobjective Nutrition Decision Making Optimization Problemsp. 177
A Novel Optimization Strategy for the Nonlinear Systems Identificationp. 184
A New Schema Survival and Construction Theory for One-Point Crossoverp. 191
Adaptive Parallel Immune Evolutionary Strategyp. 202
About the Time Complexity of Evolutionary Algorithms Based on Finite Search Spacep. 209
Learning Systems and Multi-agents
New Radial Basis Function Neural Network Training for Nonlinear and Nonstationary Signalsp. 220
Structure-Based Rule Selection Framework for Association Rule Mining of Traffic Accident Datap. 231
A Multi-classification Method of Temporal Data Based on Support Vector Machinep. 240
Towards a Management Paradigm with a Constrained Benchmark for Autonomic Communicationsp. 250
A Feature Selection Algorithm Based on Discernibility Matrixp. 259
Using Hybrid Hadamard Error Correcting Output Codes for Multi-class Problem Based on Support Vector Machinesp. 270
Range Image Based Classification System Using Support Vector Machinesp. 277
Two Evolutionary Methods for Learning Bayesian Network Structuresp. 288
Fuzzy Q-Map Algorithm for Reinforcement Learningp. 298
Spatial Data Mining with Uncertaintyp. 308
Locally Weighted LS-SVM for Fuzzy Nonlinear Regression with Fuzzy Input-Outputp. 317
Learning SVM with Varied Example Cost: A kNN Evaluating Approachp. 326
Using Evolving Agents to Critique Subjective Music Compositionsp. 336
Multi-agent Coordination Schemas in Decentralized Production Systemsp. 347
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environmentp. 357
Multiagent Search Strategy for Combinatorial Optimization Problems in Ant Modelp. 367
Cryptography
Secure and Efficient Trust Negotiationp. 374
Hardware/Software Co-design of a Secure Ubiquitous Systemp. 385
Efficient Implementation of Tate Pairing on a Mobile Phone Using Javap. 396
ID-Based (t, n) Threshold Proxy Signcryption for Multi-agent Systemsp. 406
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unitp. 417
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Schemep. 427
Binary Sequences with Three and Four Level Autocorrelationp. 435
Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementingp. 443
Enhanced Security Scheme for Managing Heterogeneous Server Platformsp. 451
A New Parallel Multiplier for Type II Optimal Normal Basisp. 460
Identity-Based Key-Insulated Signature Without Random Oraclesp. 470
Research on a Novel Hashing Stream Cipherp. 481
Secure Password Authentication for Distributed Computingp. 491
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgeryp. 502
Ternary Tree Based Group Key Management in Dynamic Peer Networksp. 513
Practical Password-Based Authenticated Key Exchange Protocolp. 523
XTR[superscript +]: A Provable Security Public Key Cryptosystemp. 534
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variantp. 545
Linkability Analysis of Some Blind Signature Schemesp. 556
Information Processing and Intrusion Detection
An Efficient Device Authentication Protocol Using Bioinformaticp. 567
Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarkingp. 576
Forward Secure Threshold Signature Scheme from Bilinear Pairingsp. 587
Low-Cost Authentication Protocol of the RFID System Using Partial IDp. 598
A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authenticationp. 605
Image-Adaptive Watermarking Using the Improved Signal to Noise Ratiop. 616
New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theoryp. 626
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protectionp. 634
An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting Techniquep. 642
iOBS3: An iSCSI-Based Object Storage Security Systemp. 652
An Efficient Algorithm for Clustering Search Engine Resultsp. 661
Network Anomalous Attack Detection Based on Clustering and Classifierp. 672
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Networkp. 683
Systems and Security
Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Modelsp. 694
A Load Scattering Algorithm for Dynamic Routing of Automated Material Handling Systemsp. 704
Software Agents Action Securitiesp. 714
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networksp. 725
Collision-Resilient Multi-state Query Tree Protocol for Fast RFID Tag Identificationp. 733
Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySecp. 743
An Intelligent Digital Content Protection Framework Between Home Network Receiver Devicesp. 750
An Efficient Anonymous Registration Scheme for Mobile IPv4p. 758
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Securityp. 767
An Efficient and Secure RFID Security Method with Ownership Transferp. 778
Security and Privacy on Authentication Protocol for Low-Cost RFIDp. 788
Securing Overlay Activities of Peers in Unstructured P2P Networksp. 795
Security Contexts in Autonomic Systemsp. 806
Knowledge Structure on Virus for User Educationp. 817
An Efficient Anonymous Fingerprinting Protocolp. 824
Senior Executives Commitment to Information Security - from Motivation to Responsibilityp. 833
A Hierarchical Key Distribution Scheme for Conditional Access System in DTV Broadcastingp. 839
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signaturep. 847
Modeling and Simulation for Security Risk Propagation in Critical Information Systemsp. 858
Information Assurance Evaluation for Network Information Systemsp. 869
Generalization of the Selective-ID Security Model for HIBS Protocolsp. 878
Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACMLp. 887
Generalization of the Selective-ID Security Model for HIBS Protocolsp. 894
Discriminatively Learning Selective Averaged One-Dependence Estimators Based on Cross-Entropy Methodp. 903
Image-Adaptive Spread Transform Dither Modulation Using Human Visual Modelp. 913
Image and Signal Processing
Improvement of Film Scratch Inpainting Algorithm Using Sobel Based Isophote Computation over Hilbert Scan Linep. 924
A Watershed Algorithmic Approach for Gray-Scale Skeletonization in Thermal Vein Pattern Biometricsp. 935
Estimation of Source Signals Number and Underdetermined Blind Separation Based on Sparse Representationp. 943
Edge Detection Based on Mathematical Morphology and Iterative Thresholdingp. 953
Image Denoising Based on Wavelet Support Vector Machinep. 963
Variational Decomposition Model in Besov Spaces and Negative Hilbert-Sobolev Spacesp. 972
Performance Analysis of Cooperative Hopfield Networks for Stereo Matchingp. 983
An Improved Entropy Function and Chaos Optimization Based Scheme for Two-Dimensional Entropic Image Segmentationp. 991
Face Pose Estimation and Synthesis by 2D Morphable Modelp. 1001
Study of the Wavelet Basis Selectionsp. 1009
Pattern Recognition
Feature Weighted Rival Penalized EM for Gaussian Mixture Clustering: Automatic Feature and Model Selections in a Single Paradigmp. 1018
Fingerprint Matching Using Invariant Moment Featuresp. 1029
Survey of Distance Measures for NMF-Based Face Recognitionp. 1039
Weighted Kernel Isomap for Data Visualization and Pattern Classificationp. 1050
DT-CWT Feature Combined with ONPP for Face Recognitionp. 1058
Precise Eye Localization with AdaBoost and Fast Radial Symmetryp. 1068
Real-Time Expression Recognition System Using Active Appearance Model and EFMp. 1078
Feature Extraction Using Histogram Entropies of Euclidean Distances for Vehicle Classificationp. 1085
Full-Space LDA with Evolutionary Selection for Face Recognitionp. 1097
Subspace KDA Algorithm for Non-linear Feature Extraction in Face Identificationp. 1106
Author Indexp. 1115