Selected Papers from the Ninth International Conference on Computational Intelligence and Security
暂无分享,去创建一个
Yuping Wang | Xiaodong Li | Hailin Liu | Yiu-ming Cheung | Yiu-ming Cheung | Xiaodong Li | Yuping Wang | Hai-Lin Liu
[1] Yuping Wang,et al. Multiobjective programming using uniform design and genetic algorithm , 2000, IEEE Trans. Syst. Man Cybern. Part C.
[2] Kouichi Sakurai,et al. A behavior based malware detection scheme for avoiding false positive , 2010, 2010 6th IEEE Workshop on Secure Network Protocols.
[3] Dasong Cao,et al. Bounds on eigenvalues and chromatic numbers , 1998 .
[4] Wang Ruliang,et al. Observer-Based Adaptive Neural Network Robust Control of Nonlinear Time-Delay Systems with Unmodeled Dynamics , 2010, 2010 International Conference on Computational Intelligence and Security.
[5] Li Jie,et al. Adaptive neural control design for a class of perturbed nonlinear time-varying delay and input delay systems , 2011, 2011 International Conference on Machine Learning and Cybernetics.
[6] Jadzia Cendrowska,et al. PRISM: An Algorithm for Inducing Modular Rules , 1987, Int. J. Man Mach. Stud..
[7] Yanbo Li,et al. Robust Adaptive Sliding Mode Control Design for a Class of Uncertain Neutral Systems with Distributed Delays , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[8] B. Nath,et al. A New Approach on Rare Association Rule Mining , 2012 .
[9] David E. Goldberg,et al. A niched Pareto genetic algorithm for multiobjective optimization , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.
[10] Ludovic Mé,et al. Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.
[11] Mark Stamp,et al. Metamorphic worm that carries its own morphing engine , 2013, Journal of Computer Virology and Hacking Techniques.
[12] Rodrigo Lopez,et al. Clustal W and Clustal X version 2.0 , 2007, Bioinform..
[13] Graeme Hirst,et al. Algorithms for language reconstruction , 2002 .
[14] Fred Cohen,et al. Computational aspects of computer viruses , 1989, Comput. Secur..
[15] Mehmet Kaya. Autonomous classifiers with understandable rule using multi-objective genetic algorithms , 2010, Expert Syst. Appl..
[16] Bart Goethals,et al. Memory issues in frequent itemset mining , 2004, SAC '04.
[17] Jinlong Shu,et al. A sharp upper bound on the largest eigenvalue of the Laplacian matrix of a graph , 2002 .
[18] Wei Lin,et al. Adaptive control of nonlinearly parameterized systems: the smooth feedback case , 2002, IEEE Trans. Autom. Control..
[19] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[20] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[21] Anne H. H. Ngu,et al. QoS-aware middleware for Web services composition , 2004, IEEE Transactions on Software Engineering.
[22] Srinivasan Parthasarathy,et al. New Algorithms for Fast Discovery of Association Rules , 1997, KDD.
[23] Li Zhong-shen. Design of Robust H_∞ Controller for Uncertain Systems with Time-varying Delay——LMI Approach , 2006 .
[24] Thomas Risse,et al. Selecting skyline services for QoS-based web service composition , 2010, WWW '10.
[25] Aditya P. Mathur,et al. A Survey of Malware Detection Techniques , 2007 .
[26] Chengqi Zhang,et al. Genetic algorithm-based strategy for identifying association rules without specifying actual minimum support , 2009, Expert Syst. Appl..
[27] Arun N. Swami,et al. Set-oriented mining for association rules in relational databases , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[28] Lingsheng Shi. Bounds on the (Laplacian) spectral radius of graphs , 2007 .
[29] Erhan Akin,et al. Rough particle swarm optimization and its applications in data mining , 2008, Soft Comput..
[30] Yang Xiang,et al. Classification of malware using structured control flow , 2010 .
[31] Shaoning Pang,et al. The Effects of Different Representations on Malware Motif Identification , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.
[32] Rajib Mall,et al. Application of elitist multi-objective genetic algorithm for classification rule generation , 2008, Appl. Soft Comput..
[33] Xu Huai-juan. UPPER BOUND ON SPECTRAL RADIUS OF GRAPHS , 2005 .
[34] Huaguang Zhang,et al. Adaptive Synchronization Between Two Different Chaotic Neural Networks With Time Delay , 2007, IEEE Transactions on Neural Networks.
[35] Xiao-Dong Zhang,et al. Two sharp upper bounds for the Laplacian eigenvalues , 2004 .
[36] V. J. Rayward-Smith,et al. Data mining rules using multi-objective evolutionary algorithms , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[37] Siu Cheung Hui,et al. Associative Classification With Artificial Immune System , 2009, IEEE Transactions on Evolutionary Computation.
[38] Somesh Jha,et al. A semantics-based approach to malware detection , 2007, POPL '07.
[39] D. Mount. Bioinformatics: Sequence and Genome Analysis , 2001 .
[40] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[41] Guillaume Bonfante,et al. On Abstract Computer Virology from a Recursion Theoretic Perspective , 2006, Journal in Computer Virology.
[42] Zvi M. Kedem,et al. Pincer-Search: A New Algorithm for Discovering the Maximum Frequent Set , 1998, EDBT.
[43] Leonard M. Adleman,et al. An Abstract Theory of Computer Viruses , 1988, CRYPTO.
[44] Quan Z. Sheng,et al. Quality driven web services composition , 2003, WWW '03.
[45] Peter Martini,et al. Classification and detection of metamorphic malware using value set analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[46] Clarisse Dhaenens,et al. Parallel Genetic Algorithms for multi-objective rule mining , 2005 .
[47] C. K. Kwong,et al. A multi-objective genetic algorithm approach to rule mining for affective product design , 2012, Expert Syst. Appl..
[48] Jian Pei,et al. Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[49] M S Waterman,et al. Identification of common molecular subsequences. , 1981, Journal of molecular biology.
[50] Ammar Ahmed E. Elhadi,et al. Malware detection based on hybrid signature behavior application programming interface call graph , 2012 .
[51] Rajeev Motwani,et al. Dynamic itemset counting and implication rules for market basket data , 1997, SIGMOD '97.
[52] Lihua Feng,et al. SOME SHARP UPPER BOUNDS ON THE SPECTRAL RADIUS OF GRAPHS , 2007 .
[53] Bilal Alatas,et al. MODENAR: Multi-objective differential evolution algorithm for mining numeric association rules , 2008, Appl. Soft Comput..
[54] Maude Manouvrier,et al. CPN-TWS: a coloured petri-net approach for transactional-QoS driven Web Service composition , 2011, Int. J. Web Grid Serv..
[55] Quanmin Zhu,et al. Stable adaptive neurocontrol for nonlinear discrete-time systems , 2004, IEEE Trans. Neural Networks.
[56] Marco Laumanns,et al. SPEA2: Improving the strength pareto evolutionary algorithm , 2001 .
[57] Refik Molva,et al. Augmenting Web Services Composition with Transactional Requirements , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).
[58] Paulo F. Pires,et al. Building Reliable Web Services Compositions , 2002, Web, Web-Services, and Database Systems.
[59] Shengyuan Xu,et al. Technical communique: New results on delay-dependent robust H∞ control for systems with time-varying delays , 2006 .
[60] S. B. Needleman,et al. A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.
[61] J. Parikka. Digital Contagions: A Media Archaeology of Computer Viruses , 2007 .
[62] Shuzhi Sam Ge,et al. Adaptive neural network control for strict-feedback nonlinear systems using backstepping design , 1999, Proceedings of the 1999 American Control Conference (Cat. No. 99CH36251).
[63] Tzi-cker Chiueh,et al. Automatic Generation of String Signatures for Malware Detection , 2009, RAID.
[64] Y. Robiah,et al. A New Generic Taxonomy on Hybrid Malware Detection Technique , 2009, ArXiv.
[65] Lothar Thiele,et al. Comparison of Multiobjective Evolutionary Algorithms: Empirical Results , 2000, Evolutionary Computation.
[66] Mingtian Zhou,et al. Some Further Theoretical Results about Computer Viruses , 2004, Comput. J..
[67] Jian Pei,et al. Mining frequent patterns without candidate generation , 2000, SIGMOD 2000.
[68] Bing Chen,et al. Novel adaptive neural control design for nonlinear MIMO time-delay systems , 2009, Autom..
[69] Tian-fei Wang. Several sharp upper bounds for the largest laplacian eigenvalue of a graph , 2007 .
[70] Ibrahim Sogukpinar,et al. Polymorphic worm detection using token-pair signatures , 2008, SecPerU '08.
[71] Nicolás Marín,et al. A Complexity Guided Algorithm for Association Rule Extraction on Fuzzy DataCubes , 2008, IEEE Transactions on Fuzzy Systems.
[72] Xiao-Dong Zhang,et al. On the Spectral Radius of Graphs with Cut Vertices , 2001, J. Comb. Theory, Ser. B.
[73] Patrick Albert,et al. Configuration based workflow composition , 2005, IEEE International Conference on Web Services (ICWS'05).
[74] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[75] N. Biggs. Algebraic Graph Theory , 1974 .
[76] Diomidis Spinellis,et al. Reliable identification of bounded-length viruses is NP-complete , 2003, IEEE Trans. Inf. Theory.
[77] Kalyanmoy Deb,et al. Muiltiobjective Optimization Using Nondominated Sorting in Genetic Algorithms , 1994, Evolutionary Computation.
[78] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[79] Yanfang Ye,et al. CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[80] Qing Li,et al. FACTS: A Framework for Fault-Tolerant Composition of Transactional Web Services , 2010, IEEE Transactions on Services Computing.
[81] Shamkant B. Navathe,et al. An Efficient Algorithm for Mining Association Rules in Large Databases , 1995, VLDB.
[82] Li Bin. New Upper Bounds for the Laplacian Spectral Radius of Graphs , 2010 .
[83] Zvi M. Kedem,et al. Pincer-Search: An Efficient Algorithm for Discovering the Maximum Frequent Set , 2002, IEEE Trans. Knowl. Data Eng..
[84] B. Mohar,et al. Eigenvalues and the max-cut problem , 1990 .
[85] B. Mohar. Some applications of Laplace eigenvalues of graphs , 1997 .
[86] Liu Xin,et al. Detecting network intrusions by data mining and variable-length sequence pattern matching , 2009 .
[87] Gottfried Vossen,et al. A Multi-Level Model for Web Service Composition , 2004 .
[88] Marco Laumanns,et al. A unified model for multi-objective evolutionary algorithms with elitism , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).
[89] Claude Godart,et al. Ensuring required failure atomicity of composite Web services , 2005, WWW '05.
[90] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[91] Laurence A. Wolsey,et al. Integer and Combinatorial Optimization , 1988 .
[92] Peter J. Fleming,et al. Genetic Algorithms for Multiobjective Optimization: FormulationDiscussion and Generalization , 1993, ICGA.
[93] Liping Chen,et al. Service Selection of Ensuring Transactional Reliability and QoS for Web Service Composition , 2012 .
[94] Behrouz Minaei-Bidgoli,et al. Multi objective association rule mining with genetic algorithm without specifying minimum support and minimum confidence , 2011, Expert Syst. Appl..
[95] Rajib Mall,et al. Predictive and comprehensible rule discovery using a multi-objective genetic algorithm , 2006, Knowl. Based Syst..
[96] J. Lam,et al. Exponential /spl epsiv/-regulation for multi-input nonlinear systems using neural networks , 2005, IEEE Transactions on Neural Networks.
[97] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[98] Keng Peng Tee,et al. Approximation-based control of nonlinear MIMO time-delay systems , 2007, Autom..
[99] Ulrich Güntzer,et al. Algorithms for association rule mining — a general survey and comparison , 2000, SKDD.
[100] R. Merris. Laplacian matrices of graphs: a survey , 1994 .
[101] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[102] Tao Li,et al. Adaptive RBF neural-networks control for a class of time-delay nonlinear systems , 2008, Neurocomputing.
[103] Yuping Wang,et al. A clustering multi-objective evolutionary algorithm based on orthogonal and uniform design , 2009, 2009 IEEE Congress on Evolutionary Computation.
[104] Ju H. Park,et al. On improved delay-dependent robust control for uncertain time-delay systems , 2004, IEEE Transactions on Automatic Control.
[105] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[106] David W. Coit,et al. Multi-objective optimization using genetic algorithms: A tutorial , 2006, Reliab. Eng. Syst. Saf..
[107] Dirk Van den Poel,et al. Faculteit Economie En Bedrijfskunde Hoveniersberg 24 B-9000 Gent Incorporating Sequential Information into Traditional Classification Models by Using an Element/position-sensitive Sam , 2022 .
[108] Jiong Sheng Li,et al. Upper Bounds for the Laplacian Graph Eigenvalues , 2004 .
[109] Li-Chen Fu,et al. A two-phase evolutionary algorithm for multiobjective mining of classification rules , 2010, IEEE Congress on Evolutionary Computation.
[110] Kumpati S. Narendra,et al. Nonlinear adaptive control using neural networks and multiple models , 2001, Autom..
[111] Anne H. H. Ngu,et al. QoS computation and policing in dynamic web service selection , 2004, WWW Alt. '04.
[112] Behrouz Minaei-Bidgoli,et al. Clustering Based Multi-Objective Rule Mining using Genetic Algorithm , 2010, J. Digit. Content Technol. its Appl..
[113] Hisao Ishibuchi,et al. Multiobjective Genetic Fuzzy Systems , 2009 .
[114] Qingfu Zhang,et al. Multiobjective evolutionary algorithms: A survey of the state of the art , 2011, Swarm Evol. Comput..
[115] Bin Li,et al. Improved Upper Bounds for the Laplacian Spectral Radius of a Graph , 2011, Electron. J. Comb..
[116] Philippe Beaucamps,et al. Advanced Metamorphic Techniques in Computer Viruses , 2007 .
[117] Huiqing Liu,et al. On the Laplacian spectral radius of a graph , 2004 .
[118] Anthony J. Calise,et al. Adaptive Control of a Class of Nonaffine Systems Using Neural Networks , 2007, IEEE Transactions on Neural Networks.
[119] I. Maros. Computational Techniques of the Simplex Method , 2002 .
[120] Qinghua Zhang,et al. MetaAware: Identifying Metamorphic Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[121] Eric Filiol,et al. Formalization of Viruses and Malware Through Process Algebras , 2010, 2010 International Conference on Availability, Reliability and Security.
[122] Mirko Lepovic,et al. The high-energy band in the photoelectron spectrum of alkanes and its dependence on molecular structure , 1999 .
[123] Carlos A. Coello Coello,et al. Evolutionary Multi-Objective Optimization: Basic Concepts and Some Applications in Pattern Recognition , 2011, MCPR.
[124] Maude Manouvrier,et al. TQoS: Transactional and QoS-Aware Selection Algorithm for Automatic Web Service Composition , 2010, IEEE Transactions on Services Computing.
[125] Shaoning Pang,et al. Multiple sequence alignment and artificial neural networks for malicious software detection , 2012, 2012 8th International Conference on Natural Computation.
[126] Jie Li,et al. Adaptive Neural Control for a Class of Perturbed Time-delay Nonlinear Systems , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[127] Sujatha Srinivasan,et al. Evolutionary multi objective optimization for rule mining: a review , 2011, Artificial Intelligence Review.
[128] Shu Jin-long,et al. Ordering of trees with respect to their spectral radius of Nordhaus-Gaddum type , 2007 .
[129] Robert M. Sanner,et al. Gaussian Networks for Direct Adaptive Control , 1991, 1991 American Control Conference.
[130] Alex A. Freitas,et al. Discovering comprehensible classification rules with a genetic algorithm , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).
[131] Jun Zhang,et al. Simlarity Search for Web Services , 2004, VLDB.
[132] Yuping Wang,et al. Uniform Design Based Hybrid Genetic Algorithm for Multiobjective Bilevel Convex Programming , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[133] Bhabesh Nath,et al. Multi-objective rule mining using genetic algorithms , 2004, Inf. Sci..
[134] Yuan Hong,et al. A sharp upper bound for the spectral radius of the Nordhaus-Gaddum type , 2000, Discret. Math..
[135] Jie Zhang,et al. Parallel Multi-Swarm PSO Based on K-Medoids and Uniform Design , 2013 .
[136] Shuzhi Sam Ge,et al. Adaptive neural control of nonlinear time-delay systems with unknown virtual control coefficients , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[137] Rajeev Rastogi,et al. A transaction model for multidatabase systems , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.