syed bahauddin alam at ieee security 2010

20
8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010 http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 1/20 No Paper ID Paper Title The First Author The Second Author The Third Author The Fourth Author The Fifth Author The Sixth Author Accession Number 1 0001- Realization Based on Hybrid LabVIEW Wanxu Zhang Liu He Wu Zhao 20110813677033  2 0002- An Advanced Design of Data Mining Wangjie Sun Zhigao Zheng 20110813677034 3 0003- 070 Development of Simulation System for Auxiliary Boiler Qiang Ma Aijun Ma Tao Wang 20110813677031 - V v 4 - 074  of Oedaleus Fieber by SSRP-PCR Xianyun Zheng Nina Zhou Li Dang Enbo Ma 5 0005- 083 Rough Set Theories and Applications in Security Evaluation of Hydropower Engineering Construction Xiazhong Zheng Jie Guo Shu Chen Wei Guo 20110813677029 6 0006- 098 Rough Set Attributes Reduction Based on Adaptive PBIL Algorithm Lihua Wang Liangli Ma Qiang Bian Xiliang Zhao 20110813677030 7 0007- 103 Construct Assembly Model for Assembly Sequence Planning Xiaoming Guo Liangli Ma Yang Shi 20110813677027 8 - 104  of Army Aviation Based on the "3S" Fuxin Jin Jiangang Yan Donghua Pan 9 0009- 115 An Algorithm for Moving Semantic Objects Trajectories Detection in Video Liang Zhang Xiangming Wen Wei Zheng Bo Wang 20110813677025 0010- A Hardware Multiplier Design of 20110813677026 117 Embedded Microprocessor eng amn en anwen ang 11 0011- 140 The Single-chip Solution of Embedded USB Encryptor Hanlin Chen 20110813677023 12 0012- Design of Generalization of Threshold Xueming Wang Ruifang Ren 20110813677024 gncryp on c eme ase on 13 0013- 191 The Technology of Music Retrieval by Humming and Its Application in Internet Yunfeng Dong Bei Qi 20110813677021 14 0014- 247 Conformance Testing for IS-IS Protocol Based on E-LOTOS Yulan Zhao Yingze Liu Xiaoqing Guo Chenguang Zhang 20110813677022

Upload: syed-bahauddin-alam

Post on 07-Apr-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 1/20

No

Paper

ID Paper Title

The First

Author

The Second

Author

The Third

Author

The Fourth

Author

The Fifth

Author

The Sixth

Author

Accession

Number

10001- Realization Based on Hybrid LabVIEW

Wanxu Zhang Liu He Wu Zhao20110813677033

 

2 0002- An Advanced Design of Data Mining Wangjie Sun Zhigao Zheng 20110813677034

30003-

070

Development of Simulation System for

Auxiliary BoilerQiang Ma Aijun Ma Tao Wang

20110813677031

- V v4

-

074

 

of Oedaleus Fieber by SSRP-PCR Xianyun Zheng Nina Zhou Li Dang Enbo Ma

50005-

083

Rough Set Theories and Applications in

Security Evaluation of Hydropower

Engineering Construction

Xiazhong

ZhengJie Guo Shu Chen Wei Guo

20110813677029

60006-

098

Rough Set Attributes Reduction Based on

Adaptive PBIL AlgorithmLihua Wang Liangli Ma Qiang Bian Xiliang Zhao

20110813677030

70007-

103

Construct Assembly Model for Assembly

Sequence Planning Xiaoming Guo Liangli Ma Yang Shi20110813677027

8-

104

 

of Army Aviation Based on the "3S"Fuxin Jin Jiangang Yan Donghua Pan

90009-

115

An Algorithm for Moving Semantic

Objects Trajectories Detection in VideoLiang Zhang

Xiangming

WenWei Zheng Bo Wang

20110813677025

0010- A Hardware Multiplier Design of 20110813677026

117 Embedded Microprocessor

eng a m n en anwen ang

110011-

140

The Single-chip Solution of Embedded

USB EncryptorHanlin Chen

20110813677023

120012- Design of Generalization of Threshold

Xueming Wang Ruifang Ren20110813677024

gncryp on c eme ase on

130013-

191

The Technology of Music Retrieval by

Humming and Its Application in InternetYunfeng Dong Bei Qi

20110813677021

14 0014-247 Conformance Testing for IS-IS ProtocolBased on E-LOTOS Yulan Zhao Yingze Liu Xiaoqing Guo ChenguangZhang 20110813677022

Page 2: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 2/20

Cycle Chain Ladder Deceleration Control

150015-

254

 

Method Research Based on Permanent

Magnet Synchronous Generator

Yecheng Zhang Guohai LiuRongbiao

Zhang

Chunyan

Zhang

20110813677019

160016-265

The Design of a Remote Control SignalSource Based On SPI Bus

ZenggangWang

Shujing Su20110813677020

17

0017-

271

obust otat on st mat on o ap

Fingerprint ImageYanmiao Li

Yongliang

ZhangJiawei Lu Chaofan Liu

Shanshan

Fang20110813677017

180018-

286

Homologous Detection Based on Text,

Token and Abstract Syntax TreeYan Zhang Xinyu Gao Ce Bian Ding Ma

Baojiang

Cui

20110813677018

0019- A Face Anal sis and Descri tion Don chen 20110813677015

19 307

 

Algorithm Based on Depth Information Shi Fengguang Shi

200020-

315

Research on IR Small Target Detection

and Backgroud SuppressionXingqiao Qin Yujuan Zhao Kai Yang Hui Wang

20110813677016

210021- Improved Method for Source Camera Gengzhong

Wenhui Lan Jianshe Wan20110813677013

323 orens cs s ng ompress on Wang 

220022-

326

Software Documents Quality

Measurement- A Fuzzy ApproachChangli Sun

20110813677014

230023-

Manipulation and Transparency Controlof ICT constituted E-Administrative

Syed

BahauddinA B M Rafi Md. Nazmus

Hussain

Mohammed Celia

Shaikh

Anowarul20110813677011

387 Protocol via Digital Watermarking for AlamSazzad Sakib

Dipu Kabir Shahnaz Fattah

240024-

388

A Secured Electronic Transaction

Scheme for Mobile Banking in

Bangladesh Incorporating Digital

Syed

Bahauddin

Alam

Hussain

Mohammed

Dipu Kabir

Md. Nazmus

Sakib

A B M Rafi

SazzadCelia

Shahnaz

Shaikh

Anowarul

Fattah

20110813677012

25

0025-

397

Exploring the Data Locality of On-Board

Disk Cache Yuhui Deng Jipeng Zhou Xiaohua Meng

20110813677009

260026-

401

2D-RAID-Based Array Self-adaptation

StrategyJi Zhang Bing He

20110813677010

0027- A Rockin Period Control Method for a Soichiro 2011081367700727

442

 

Biped Quasi Passive Walker Using aYing Cao

SuzukiKangling Fang

280028-

443

UPPAAL-Based Real-Time Testing: New

Coverage Criteria and Length-Optimal

Test Generation

Lin Xi Qinglei Zhou20110813677008

Page 3: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 3/20

0029- Performance Analysis of Turbo Codes Dongfeng 2011081367700529

455 with Different Interleavers and DecodingKaiying Sun

YuanXiaotian Zhou

30 0030-477

Recognition of Expression Variant Faces

– A Principle Component Analysis BasedApproach for Access Control

JanarthanyNagendrarajah M.U.S. Perera 20110813677006

31

0031-

510

A Novel Digital Watermark against RST

Distortion Based on SURFBin Zhang Jiazhen Wang Jiafu Wen Bin Zhang

Zhongling

Tong

20110813676874

320032-

511

Temperature Controlling Design Based on

VB and PLCYaning Sun Junyu Fu

20110813677004

0033- Desi n and Im lementation of VEEL 20110813676875

33 513

 

Archive System for Computer Forensics Gang Zhou Yonghao Mai Qiang Cao

340034-

531

UR Coding – A Novel Algorithm for Data

Compression

Syed Usama

Khalid

Muhammad

Asim Noor

20110813676873

0035-Neural Network-based Terminal sliding

20110813676877

35579

o e ontro or t e ncerta nty

Coupled Chaotic System with TwoLiming Wang

36 0036-611

ROI–Based Tamper Detection and

Recovery for Medical Images UsingReversible Watermarking Technique

Osamah M. Al-Qershi

Bee Ee Khoo 20110813683708

370037-

612

A Recursive Construction of p-ary Bent

Functions Which are not Weakly RegularYin Tan Jing Yang Xiao Zhang

20110813676879

380038-

621

A Test-Driven Web Application Model

Based on Layered ApproachDengshan Tian Jiwen Wen Yin Liu Ning Ma

Huiping

Wei

20110813676876

39

0039-

623

Method to Generate Elliptic Curves

Based on CM Algorithm Bin Yu

20110813676881

400040-

624

Improved K-Means Cluster Algorithm in

Telecommunications Enterprises

Customer Segmentation

Jinghua Zhao Wenbo Zhang Yanwei Liu 20110813676878

 

Page 4: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 4/20

No

Paper

ID Paper Title

The First

Author

The Second

Author

The Third

Author

The Fourth

Author

The Fifth

Author

The Sixth

Author

Accession

Number

410041- Pipelined Implementation of AES

Yulin ZhangXinggang

W

20110813676882

 

420042-

071

Generalized Fast Coding Steganographic

Algorithm Based on Prime NumberYu Fu Sen Xu

20110813676880

430043-

072

Design and Realization of the MSN

Monitoring SystemGuotian Xu

20110813676884

44 0044-095

Computing the K-Error 2-AdicComplexity of 2

n-Periodic Sequence

Zhihua Niu Zheng Li 20110813683709

450045-

101

A Study of Intrusion Detection System

Based on Data MiningChunyu Miao Wei Chen

20110813676886

460046-

119

A Location Privacy Preserving Algorithm

Based on Linkage ProtectionZ.P. Jin Jian Xu Ming Xu Ning Zheng

20110813676883

47

0047-

159

Optimized Source Authentication Scheme

for Multicast Based on Merkle Tree and Yang Li Miao Zhang Yanhui Guo Guoai Xu

20110813676888

0048- Research on Data Streams Publishin of 2011081367688548

161

 

Privacy PreservingGaoming Yang Jing Yang Jianpei Zhang Yan Chu

490049-

168

An Identity Authentication Scheme Based

on USB Key for Trusted Network Zhihui Liu Lize Gu Yixian Yang Guoqiang Xing

20110813676890

500050- An Attack Graph Based Network Security

Haihui Ge Lize Gu Yixian Yan Kewei Liu20110813676887

170 va uat on ode or erarch ca 

510051-

179

Image Tamper Detection Algorithm Based

on Radon and Fourier-Mellin TransformTao Jing Xinghua Li Feifei Zhang

20110813676892

520052-

188

A Novel Extended Visual Cryptography

Scheme Usin One Shared Ima eXiaotian Wu Wei Sun

20110813676889

 

530053-

189

Architectural-Enhanced Intrusion

Detection and Memory Authentication

Schemes in Embedded Systems

Lin Wang Xiang Wang Zichen Zhou Qinghai Liu Hao Yang20110813676894

Page 5: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 5/20

Desi n and Implementation of an

540054-

194

 

Efficient Montgomery Modular Multiplier

with a New Linear Systolic Array

Jizhong Liu Jinming Dong20110813676891

55 0055-196

Grid Resource Selection Model Based onTrust Moment

Jingnan Wang Junfeng Tian Chao Li 20110813676896

560056-

201

onstruct ng c ent ert cate- ased

Encryption Scheme with Pairing in theYang Lu Jiguo Li

20110813676893

570057-

206

Improved Algorithm of Pattern Matching

based on BMHSYuting Han Guoai Xu

20110813676898

0058- A New Detection Scheme for Echo 20110813676895

58 207

 

Hiding Chunhui Xie Yimin Cheng Fubao Wu

590059-

209

Batch Rekeying Model Based on

Queueing Theory in Secure GroupGuopeng Li Bo Li Tinglong Du Jin Pan

Yuansheng

Li

20110813676900

600060- A Provably Secure and Practical Fair E-

Bin LianGongliang

Jianhua Li20110813676897

218 cash Scheme 

Chen 

610061-

226

Design of Sensitivity for Direct Trust

Computation Model in Trusted NetworksYanfeng Fan Zhixiao Yang Bin Zhang

20110813676902

620062-230

Research on Supply-Chain InformationManagement of Animal Products Based

Shengjun Yuan Caixia Zhao20110813676899

630063-

234

Conflicts Analysis and Resolution for

Access Control PoliciesYigong Wang Hongqi Zhang

Xiangdong

DaiJiang Liu

20110813676904

640064-

236

Application of Intelligent Transparent

Encryption Model on Intranet SecurityPing Zhang Zeguo Wei

20110813676901

65

0065-

239

The C-Secure Codes from BIBD and

Packing Design YuLi Zhang Qingjun Cai

20110813676906

660066-

248

An Improved Kerberos Protocol Based on

Fast RSA AlgorithmDahui Hu Zhiguo Du

20110813676903

0067- Ima e Information Hidin Al orithm Xiaolon 2011081367690867

252

 

Based on DWT with Alterable ParametersHaiying Gao

Zheng

680068-

253

A Practical Implementation of Ternary

Query Tree for RFID Tag Anti-Collision

Ching-Nung

YangYu-Ching Kun Jyun-Yan He

Chih-Cheng

Wu

20110813676905

Page 6: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 6/20

Page 7: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 7/20

0084- A Key-Chain Based Key Management 2011081367699884

309 Scheme for Heterogeneous SensorGuohua Ou Jie Huang Juan Li

850085-

320

Recursive Construction Method of 

Boolean PermutationsHaimo Zhang

20110813676996

860086- Identity Management with Trust

Xiang Zou Bo Jin20110813676997

e at onsh p and r vacy reservat on

870087-

329

A Secure Distributed Key Management

Scheme for AD Hoc Network Yan Xu Hong Zhong

Xianping

YuanJia Yu

20110813676994

880088-

Probability Analysis and Application of 

XOR Difference Between Jie Guan Lin Din20110813676995

(X+K)mod2n and X⊕K

 

890089-

338

A Modified Cooperation Stimulation

Mechanism Based on Game Theory in AdGuan Wang Yu Sun Jianwei Liu

20110813676992

900090- Input Method against Trojan Horse and

Sho i SakuraiShinobu 20110813676993

340 Replay Attack   

Ushirozawa

910091-

347

Identity Attributes Quantitative Analysis

and the Development of a Metrics Model

Using Text Mining Techniques and

Jackson Phiri Tiejun Zhao20110813676990

0092- Desi n and Anal sis of Ba esian Game in 2011081367699192

350

 

Role Based Trust ManagementLan Li Wei Cai Lin Liang Lei Fan

930093-

352

Digital Spliced Image Forensics Based on

Edge Blur MeasurementQianru Zheng Wei Sun Wei Lu

20110813676988

940094- Automated Planning for Incident

Pin Liu Haifen Yu in Miao20110813676989

353 Response Based on CBR 

950095-354

Verifier-Based Password AuthenticatedKey Exchange Protocol via Elliptic Curve

Zijian Zhang Qijian Zhang20110813676986

960096-

360

Analysis and Improvement of the Linear

MAKEP ProtocolXinglan Zhang Dapeng Shao

20110813676987

 

970097-

362

Cryptanalysis of a New Blind Signature

Based on the DLPHua Chen Jianhua Chen

Guangxing

Cai

20110813676984

98

0098-

371

Information Hiding for H.264 in Video

Stream Switching Application Yao Guo Feng Pan

20110813676985

Page 8: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 8/20

0099- The Research of Recovery Mechanism in Mengmeng 2011081367698299

372 The Process of the Trusted ChainXiaolin Yi Xuhui Liu

FengYujing Wang

1000100-

373

Efficient and Scalable Multicast Key

Management Using Attribute BasedHongyong Jia Yue Chen Xiuqing Mao Ruiyu Dou

20110813676983

1010101- A New Watermarking Method Based on

Chao Cao Ruoyu WangMinghu

Rujun Chen20110813676980

and resne ract on rans orms uang

1020102-

377

A General Scheme for Construction of 

Bound Entangled States by Convex LinearWei Cheng Fang Xu

20110813676981

1030103-

381

An Improved Method Based on Random

Hash Lock Guozi Sun Wan Bao Danwei Chen Qiufeng Ding

20110813676978

104 0104-384

A Cryptographic Algorithm Based on pq-Generalized Fibonacci Matrix

Ying Zhang 20110813676979

1050105-

385

Watermarking with Fast and Highly

Secured Encryption for Real-time Speech

Hussain

Mohammed Saeed Anwar

Syed

BahauddinK. M. Sabidur

Rahman

Md. Abdul

Matin

Imranul

Kabir20110813676976

gna s pu ab r am howdhury

1060106-

389

Hardware Based Realtime, Fast and

Highly Secured Speech Communication

Using FPGA

Hussain

Mohammed

Dipu Kabir

Syed

Bahauddin

Alam

20110813676977

0107- Performance of the Direct Sequence 20110813676974107

394

 

Spread Spectrum System with Single-toneHongling Li Bin Pei Yunfei Huang Qidi Yang

1080108-

395

An Image Encryption Scheme Based on

Image ComplexityFeng Pan

ChuanCai

WangXiaoNan Chen

20110813676975

1090109- An FDIA Approach for Aircraft Based on

Caihon Jian Xi Wan Ai He Xian xin Kon20110813676972

396 The Kalman Filter 

1100110-398

An Efficient and Practicable AnonymousAuthentication Scheme Using Smart

Jie Gu Liang Zhao Zhi Xue20110813676973

1110111-

Adoption of Delayed Feedback Rekeying

Algorithm for Secure Multicast Services Ibrahim Hesham M.EL EL Sayed 20110813676970

409 During Handover in Mobile WiMAX A.Gomaa Badawy M.Saad

1120112-

412

The Study of Secure Agent-Based Scheme

on Health Information Systems

Tzer-Long

Chen

Szu-Han

ChengChia-Hui Liu

Tsui-Ying

Fang

Tzer-

ShyongChih-Sheng

Chen

20110813676971

Page 9: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 9/20

Group Key Mana ement Based on

1130113-

419

 

Information Flow Policy

for Multi-Privileged Groups

Zhen Wang Xuehui Du Yi Sun Guoyu Xu20110813676968

114 0114-421

A Compliance Policy Model for SecurityAudit

Lianzhong Liu Xiaoni Wang DongliangJiao

20110813676969

0115- Statistical Modelin of DCT Coefficients 20110813676966115

428

 

for AudioCuiping Wang Li Guo Yifang Wei Yujie Wang

1160116-

430

Against Mobile Attacks in Mobile Ad-hoc

NetworksShushan Zhao

Akshai

Aggarwal

20110813676967

1170117- Intrusion Detection Based on Model

Wei un Zhu in lei Zhou Pin Li20110813676964

432 Checking Timed Interval Temporal Logic

 

1180118-

437

Provably Secure Identity-Based Key

Agreement Protocols under SimpleXiufeng Zhao Qiuliang Xu Hao Wang

20110813676965

1190119-

444

An Intrusion-Resilient Signature Scheme

Based on ECDLPChenghua Li Xingbo Peng

20110813676962

 

1200120-

450

Enabling User Privacy in Identity

Management SystemsKheira Bekara

Maryline

Laurent

20110813676963

121 0121-460

A Comparative Study on SoftwareVulnerability Static Analysis Techniques Peng Li Baojiang Cui 20110813676960

1220122-

462

A Practical Customer Privacy Protection

on Shared Servers

Pramote

Kuacharoen

20110813676961

1230123-

463Building the Chip Based SSL Protocol Liping Du Jie Wang

20110813676958

-124

-

469

 

Dataflow Analysis

Yongji Ouyang

Wang

Qiang Wei Jie Liu

1250125-

470

3D Visualization Model Using Cyclic

Distributions of Complex 0-1 SequencesYao Zhou

Jeffrey Zhijie

Zheng

20110813676956

1260126- Detecting Malicious Rootkit Web Pages

Hen a LiuDongmei

Gen u Wei Jinxin Zhon20110813676957

472 in High-interaction Client Honeypots 

Zhang 

1270127-

474

A Novel Blind Watermarking Scheme

Based on Neural Networks for Image

Yonghong

ChenJiancong Chen

20110813676954

Page 10: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 10/20

0128- 3D Visual Method for Logic Functions on Jeffrey Zhi J. 20110813676955128

480

 

Exhaustive SequencesQingping Li

 

Zheng

1290129-

481

Worm Containment Based on Double-

Neighbor Lists in P2P Overlay NetworksChunfu Jia Xin Liu Guoyou Liu Zhichao Hu

20110813676952

1300130- Detecting Spam Comments with

’Qianqian Wang Bin Liang Wenchang Shi Zhaohui Liang Wei Sun

20110813676953a c ous sers e av ora

1310131-

484

New Client Puzzle Approach for DoS

Risistance in Ad Hoc Networks

Antonis

Michalas

Nikos

Komninos

Neeli R.

Prasad

Vladimir A.

Oleshchuk 

20110813676950

1320132-

488

Vulnerabilities Static Detection for Web

Applications with False PositiveJianjun Huang Bin Liang Jiagui Zhong

Qianqian

WangJingjing Cai

20110813676951

133 0133-489

An Efficient Cryptanalysis of a ChaoticCryptosystem and Its Improvement

Xianfeng Guo Jiashu Zhang 20110813676948

134 0134- Cryptanalysis of Harn-Ren’s Multi- Jingjing Li Shixin Zhu 20110813676949

0135- Application Traffic Classification Based 20110813676946

498 on Command Exchange Mode of TCPu en ayu ng ao e

1360136-

515

An Effective Access Control Mechanism

in Home Network Environment

Based on SPKI Certificates

Bin Song In-Kwan Yu Jiseong SonDoo-Kwon

Baik 

20110813676947

137-

516

ased ey anagement ethod

for Wireless Sensor NetworksDong Li Yixian Yang Yang Xin Bin Tian

1380138-

520

A Robust Text Digital Watermarking

Algorithm Based on FragmentsWengang

ChengHui Feng Cuiru Yang

20110813676945

0139- Practical Identity-Based Signature 20110813676942

521 without Random Oracleeng uo ong e u n ang uo

1400140-

524

An Alterable-Capacity Authentication

Watermarking Algorithm with SuperiorYaoran Huo Fan Chen Hongjie He Zhongke Yin

20110813676943

1410141- Trusted Module Based Secure Electronic

Jian Mao Ku Li Xiandong Xu20110813676940

ransact on c eme

1420142-

533

A Secure Mobile RFID Architecture for

the Internet of ThingsTao Yan Qiaoyan Wen

20110813676941

1430143-

535

A Fast Regular Expression Matching

Algorithm for Deep Packet Inspection Lei Guo Yadi Wang Qing Yao Shuqiao Chen Yuxian Jian20110813676938

Page 11: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 11/20

0144- Application Independent Identity 20110813676939144

543

 

ManagementZombo Fu Jianxin Wang Lin Yang Yuan Cao

1450145-

544

A Practical Dynamic Multi-Secret Sharing

SchemeJuan Qu Limin Zou

Jianzhong

Zhang

20110813676936

1460146- Image Steganography Based on Sparse

Soodeh AhaniShahrokh 20110813676937

ecompos t on n ave et pace aemmag a

1470147-

548

Introducing a Framework for Security

Measurements

Morteza Ansari

Dogaheh

20110813676935

1480148-

557

The Integration Technology of Multi-

source Heterogeneous EMR Based onYabin Xu Yunmei Shi Xuhong Liu

20110813676917

149 0149-564

A Scalable Encryption Scheme forCCSDS Image Data Compression

Mingyu Li Xiaowei Yi Hengtai Ma 20110813676933

1500150-

568

A Dynamic Authorization Model Based

on Security Label and RoleJing Gao Bin Zhang Zhiyu Ren

20110813676934

1510151-

581

A New Method to Construct DoS Attack 

Oriented to Attack Resistance TestNing Zhu Yongfu Zhang Xinyuan Chen

20110813676919

1520152-

582

Preimage Awareness Proofs of Two

Compression FunctionsMengdong Li

20110813676920

0153- Privacy-Aware: Tracking and Protecting Weiwei 20110813676921153

583

 

Sensitive Information Using Automatic Ouyang

1540154-

588

Qualitative Initial Risk Analysis for

Selecting Risk Analysis ApproachJung-Ho Eom

Young-Hyun

ChoiSeon-Ho Park 

Tai-Myoung

Chung

20110813676922

1550155- Study on Data Acquisition Solution of 

Kunlun Gao Jianmin Liu Jian Guo Rui An20110813676923

593 Network Security Monitoring System 

156 0156-596

On the Application of Ethernet in aDistributed Radar System

Zhoujie Yan Qiongzhi Wu Fang Nan 20110813676924

1570157-

600

Vulnerabilities in Personal Firewalls

Caused by Poor Security Usability

Bander

AlfayyadhJames Ponting

Mohammed

AlzomaiAudun JØsang

20110813676925

 

1580158-

609

An Efficient Chinese Remainder Theorem

Based Node Capture Resilience SchemeYi Ren

Vladimir A.

Oleshchuk Frank Y. Li 20110813676926

Page 12: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 12/20

No

Paper

ID Paper Title

The First

Author

The Second

Author

The Third

Author

The Fourth

Author

The Fifth

Author

The Sixth

Author

Accession

Number159

0159- The Attempt about Using ImageHui Zhou Bing Yan Guangchao Du Ping He

20110813676927

 

1600160-

025

Design of Ship Dynamic Hydrocyclone

Slop Treatment SystemQiang Ma Yuna Miao

Xiangxin

Cheng

20110813676928

1610161-

044

FTA Applied in Management of High-

Rise Buildings Fire PreventionHongmin Li

20110813676929

1620162-

056

Theory and Simulation of StatisticalRepresentation of the Stokes Parameters

in Multilook Fileds Based on PolarizationTao Liu Qi Chen

Youbing

ZhangQifeng Wang

20110813676930

1630163- Dynamic Weighted Track Fusion

Yu Zhang Jinhe Ran20110813676931

 

1640164-

152

Full Interference Cancellation for An

Asymptotically Full Rate CooperativeGaojie Chen

Jonathon

Chambers

20110813676932

165 0165-157

Resolution Analysis of the MUSIC-BasedTOA Algorithm

Jing Li Maoyong Cao Liang Pei 20110813677048

1660166-

167

Multi Parameter Estimation of Wideband

Chirp Signals Based on OMPXiangyun Gao Tianqi Zhang

20110813677045

1670167-

185

A Novel Sub-Optimal PTS Algorithm for

Controlling PAPR of OFDM SignalsFang Wang Fei Weng

Zhenchao

WangLixia Chen

20110813677050

168-

214

mage e- o s ng gor t m tu y an

Realization Based on Wavelet Analysis

Yulin Zhang Xia Zhu

1690169-

228

Affine Model for Disparity Estimation in

Multiview Sequence CodingJiali Zheng Tuanfa Qin

20110813677052

0170- Empirical Mode Decomposition of Traffic 20110813677049

240 Time Seriesan a ue eng an ang eq ang ong

1710171-

241

Time-Dependent Hurst Exponent in

Traffic Time SeriesJianhai Yue Pengjian Shang Keqiang Dong

20110813677054

Page 13: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 13/20

Research Conflict Problems of D-S

1720172-

266

 

Evidence and Its Application in Multi-

Sensor Information Fusion Technology

Huiping Peng Xiaojun Cao20110813677051

173 0173-301

Wideband MIMO Channel SpatialCorrelation Measurement under Different

Limei Lin Yang Wang Jiliang Zhang Dayong Yan 20110813677056

1740174-

339

mage estorat on w th gn cant

Curvelet Coefficients Index SetQianzong Bao Qingchun Li

20110813677053

1750175-

341

A Kind of Bit and Power Allocation

Approach for OFDM Systems in theLei Wang Ying Liu Chen Gu Wei Zhang

20110813677058

0176- An Obstacle Detection Al orithm Based Xiaochuan Yuan 20110813677055176

348

 

on U-V Disparity Map AnalysisMin Zhang Peizhi Liu

ZhaoXinxin Zhao

Zhang

1770177-

349

A Novel Line Detection Algorithm in

Images Based on Improved Hough

Transform and Wavelet Lifting Transform

Xiaochuan

ZhaoPeizhi Liu Min Zhang Xinxin Zhao

20110813677060

1780178-

364

Fast Algorithm for Direction of Arrival

Based onTime-Frequency DistributionsLutao Liu Liguo Wang

20110813677057

1790179-

367

The Application of Grey Clustering

Analysis on Social Impact Assessment of Natural Forest Protection Project

Haihua Li Yingying Fu Weiping Tang Weijie Yang20110813677062

1800180-

386

A Loss-less Compression Technique for

High Quality Speech Signals and It’s

Implementation with MPEG-4 ALS for

Hussain

Mohammed

Dipu Kabir

Syed

Bahauddin

Alam

Md. Abdul

Matin

Imranul Kabir

Chowdhury20110813677059

1810181- Research on the Relationship Between

Xinxin Pei Zhi an Huan Yanbo Zhu Wei Liu20110813677064

408 and the umber o tat ons or 

182 0182-413

Research on Robust UnscentedRegularized Particle Filtering

Li Xue Shesheng Gao JianchaoWang

20110813677061

1830183-

427

Research and Implementation of an

Improved 800BPS Speech CodingJiyong Zhao Jingyuan Wang Xia Zou Zhiyong Xu

20110813677066

1840184-

452

A Novel Sparse Representation Algorithm

Based on Local CompetitionsPing Cheng Haitian Liu Jiaqun Zhao

20110813677063

185

0185-

457

A Multi-Source Cooperative Scheme

Based on IDMA Aided Superposition Xiaotian Zhou Haixia Zhang

Dongfeng

Yuan

20110813677068

Page 14: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 14/20

0186- An Audio Watermarking Algorithm for Dongsheng 20110813677065186

465

 

Audio AuthenticationHong Zhao

Shen

1870187-

485

Subsample Time Delay Estimation in

Impulsive Noise EnvironmentYing Guo Caiyun Meng

20110813677070

1880188- BEM-Based Soft-in Soft-out Detection of 

Zheng feng Du Jiee ChenDongfeng

Xiaotian Zhou20110813677067

  mp oy ng yc c roup odes uan

1890189-

527

Blind Source Separation Based on a Novel

Relative GradientYunfeng Xue Yujia Wang Qiudong Sun

20110813677072

1900190-

Combination of Two Adaptive Filters for

Interference Miti ation Based on Space Zhenyu Tan Son tao Lu20110813677069

 

Time Processing

 

1910191-

562

DCT Image Watermarking Technique

Based on the Mix of Time-domain

Dongyang

TengRenghui Shi Xiaoqun Zhao

20110813677074

1920192- Image Synchronization Using Watermark 

Xin Xu Ru Zhan Xinxin Niu20110813677071

563 As RST Invariant Descriptors 

1930193-

572

Remote Control of an Electrical Car with

SSVEP-Based BCIHongtao Wang Ting Li

Zhenfeng

Huang

20110813683710

1940194- Improved Method for Detecting the Short

Pan Hu Hongyu Zhao20110813677073

 

Paper The First The Second The Third The Fourth The Fifth The Sixth Accession

Session 4 Network Theory and Technology

 

195 0195- A New Underwater Sensor Networks Junjie Zheng Shudao Zhou Zhihua Liu Song Ye Lilong Liu Lu Yin 20110813677077

1960196-

250

An Adaptive Error Control Mechanism

for Wireless Media Streaming Based on

GOP Fetchin and Cross-la er Desi n

Hongqiang Jiao Wanning Ding20110813677075

-

1970197-

308

Distributed Scheme Based on Network 

Coding to Construct k -RedundantJing Wang Xiangyang Liu Xinmei Wang

20110813677079

Page 15: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 15/20

A Model of the Solution of the Task 

1980198-

328Distribution and Load Balance among

Parallel Multiprocessors Based on theMian Sun Jieao Zhu Xue Liu

Jeffrey Zhi-jie

Zheng

20110813677076

199 0199-404

Research on Double Chaos EncryptionAlgorithm Based on Disturbance

Ping Chen Fenmei Wang Yihang Peng Dejun Chu 20110813677117

2000200-

411

Research on Data Forwarding Mechanism

for Space Information Network Xuehui Du

Xingyuan

ChenYadi Wang Daowen Hua

20110813677078

2010201-

420

Energy-Aware Routing Protocol in Fading

Channel for Mobile Ad Hoc NetworksXinyu Shen Limin Meng

20110813683712

0202- The Failure Probabilit at Sink Node of 20110813677116202

440

 

Random Linear Network CodingXuan Guang Fangwei Fu

2030203-

466

An Efficient A-DSR Routing Algorithm

for Asymmetric Space InformationHefei Hu Yuan’an Liu

20110813677118

2040204- Fault Tolerant and Storage Efficient

Jiayi Liu Zilian Pin20110813677119

468 recte - us on or re ess ensor 

2050205-

540n-Order Prime Sequences Qingge Liu Guangwen Yan

20110813677120

Session 5 Communication and Information System

No

Paper

ID Paper Title

The First

Author

The Second

Author

The Third

Author

The Fourth

Author

The Fifth

Author

The Sixth

Author

Accession

Number

2060206-

060

Research on Adaptive Control Algorithm

of Jitter in Laser Beam Pointing Zhaowei Sun Xiangzhi Li 20110813677121

 

207 0207-065

A New Photonic Crystal Patch AntennaBased on EBG Structure

Jianwei Wang Kang Xie 20110813677122

2080208-

078

Predictions Based on the GM Model of 

Gre S stemWuji Sun Yichen Liu Wei Fu 20110813677123

2090209-

082

Research on The Key Technologies of 

DRM Intercommunications

Dongfang

ZhangYu Han Shuai Zeng Jianli Ma 20110813677124

2100210-

139

Conceptual Interoperability Model of 

NCW SimulationYuanzheng Ge Xiaogang Qiu Kedi Huang 20110813677125

Page 16: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 16/20

0211- Joint Source-Channel Coding Based on211

178 End-to-End Distortion over WirelessYan Huo Tao Jing Liyuan Zhong 20110813677126

2120212-

200

The Research and Design of 

Communication Power Supply Based onthe Proton Exchange Membrane Fuel Cell

Renbin Feng Hui Wang Kui Xie Chunhua Xu Enyong Hu 20110813677127

2130213-

216

Optimizing the Number of Pilot Symbols

for OFDM SystemsBin Sheng Laili Wang Lan Chen 20110813677128

2140214-

235

Cooperative Communication with

Grouped Relays for Zero-Padding MB-Tao Xu H. Lu H. Nikookar R. van Leuken 20110813677129

0215- Flexible Resources Reservation Scheme Hassene Sihem215

243

 

for Ad Hoc Networks Bouhouch Guemara El20110813677130

2160216-

256

Research on Fuzzy Comprehensive

Evaluation of Enterprise Websites

Xiaohong

WangLiwei Li Ling Tian 20110813677131

2170217- A Large Family of Binary Sequences with

Yefen He Wenpin Ma 20110813677132269 Low Correlation

 

2180218-

272

Simulating BB84 Protocol in Amplitude

Damping ChannelYingkai Tang Xiaoyu Chen 20110813677133

219 0219-279

A Kind of Cyclotomic Numbers andSidel'nikov Sequences

Jing Yang Lingli Xia 20110813677134 

2200220-

289

Design and Implementation of the Mobile

Internet of Things Based on TD-SCDMAZhiyong Shi Kui Liao Shiping Yin Qingbo Ou 20110813677135

2210221-

310

The Remote Intelligent Controlling and

Monitoring System of Home AppliancesPeng Wang Lixiang Yan Jun Wang

Yuancheng

Zhu20110813677136

2220222-

333

Research of Information Dissemination

Model Based on Network Centric WarfareYong Yao Zhi Li 20110813677137

2230223-

342

Research for Service Fastly Setuping and

Restoration in Mesh Network Zegang Bai 20110813677138

0224- A Cooperative STC Scheme for IEEE Xuezhen 

225 0225- Stability Analysis for Ranking Algorithms Wei Gao Yungang Li Liang Youming Xia 20110813677046

226 0226- A New Equation Involving the Euler Bin Chen 20110813677043

Page 17: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 17/20

A Low-complexity Schedulin Scheme

2270227-

399

 

for Multiuser MIMO System Based on

Tomlinson-Harashima Precoding

Heng Liu Li Hao Pingzhi Fan20110813677044

228 0228-403

Low-Density Parity-Check Codes forAsymmetric Distributed Source Coding

Jeffrey J.Micallef 

Reuben A.Farrugia

Carl J. Debono 20110813677041

2290229-

418

On the Application of Sphere Decoding

Algorithm in Overload MIMO SystemsXiaoli Lian Daoben Li

20110813677042

2300230-

448

Distributed Fusion for Satellite Passive

Localization Using Convex CombinationZhengbin Yang Yan Qiu Xiaoxing Li Yong Kang

20110813677039

0231- Deterministic Multi le Access Wireta Vahid Mahmoud 20110813677040231

449

 

Channel JahandidehSomaye Salimi

Salmasizadeh

2320232-

456

Closed-Loop Four-Antenna Transmission

Schemes Based on EO-STBCs withPeng Zhang

Dongfeng

YuanHaixia Zhang Xiaotian Zhou

20110813677037

0233-Performance Analysis for Rectangular

20110813677038233

459QAM Modulation with Arbitrary Bits-to-

Symbols Mapping over Rician Channel

Youfu Yang Jianwei Liu Qishan Zhang Chundi Xiu

2340234-

467MSN and QQ in China Xiaodong Hai Laurent GILLE

20110813677035

0235- Undetected Error Probabilit of Hammin Jaskaran S. Bharat Naresh 20110813677036235

476

 

Code for Any Number of SymbolsManish Gupta

.

Bhullar

 

Bansal

2360236-

479

A Simple Simi-Blind Equalization

Algorithm for Precoding Single Carrier

System with Frequency DomainMeiyan Ju Li Li

20110813677080

2370237-

486

An Improved Geography and Overlay

Routing in Urban Vehicular EnvironmentMiao Hu Tao Luo Xinjun Shi

20110813677081

2380238-

487

A Self-Optimizing Method Based on

Handover for Load BalancingBo Wang

Xiangming

WenWei Zheng

20110813677082

0239- Distributed Turbo with Pre-Decodin in Jianhon 20110813677083239

494

 

Relay Communication ZhengXinli Zhao

2400240-

501

A Novel Downlink Signaling Method for

OFDM Based Cognitive Radio SystemHaigang Zhang

Dongfeng

Yuan

20110813677084

Page 18: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 18/20

0241- A Format-Compliant Encryption Scheme Zilong 20110813677085241

512

 

for JPEG2000 CodestreamJiafu Wen Jiazhen Wang Bin Zhang Zhande Li

Huang

2420242-

522

A Novel Constant-Power Bit Loading

Algorithm for QAM Modulated OFDM

Yunxia Song Deqiang Wang Man LiYuanyuan

Yang

20110813677086

2430243- A Relay Selection Scheme for IR-UWB Yuanyuan

Deqiang Wang Man Li Yunxia Song20110813677087

etwor s ased on stance n ormat on ang

2440244-

525

On Repeated-Root Cyclic Codes and Its

Weight Enumirator

Jaskaran S.

BhullarManish Gupta Sonia

20110813677088

2450245-

528

A Low Complexity Resource Allocation

Method for Relay OFDMA SystemsGaojun Song Hongwu Liu

20110813677089

246 0246-529

Outage Capacity Analysis for SIMONakagami-m Fading Channel in Spectrum

Yang Yang Xin Liu Qihui Wu Jinlong Wang 20110813677090

2470247-

534

Cooperative Relay Cognitive Interference

Channel

Mohammad

Kazemi

Mohammad

Reza Aref 

Mahmood

Ahmadian20110813677091

ttar

2480248-

537

Cooperative Relay Cognitive Interference

Channels with Causal Channel StateMohammad

Kazemi

Mahtab

Mirmohseni

Mohammad

Reza Aref 

20110813677092

2490249- Iterative Multi-Channel Equalization and

LDPC Decodin for Underwater Acoustic Lian Zhao Jianhua Ge20110813677093

554 

Coherent Communications

 

2500250-

573

Achievable Rate Regions for Relay

Channel with Private Messages withBahareh

Akhbari

Mahtab

Mirmohseni

Mohammad

Reza Aref 

20110813677094

2510251- Compress-and-Forward Strategy for Mahtab Bahareh Mohammad 20110813677095

575 Causal Cognitive Interference Channel Mirmohseni Akhbari Reza Aref  

252 0252-594

Cognitive Radio-Based InterferenceAvoidance Schemes for MB-OFDM

Man Li Deqiang Wang Yunxia Song YuanyuanYang

20110813677096

2530253-

601

Proportional Resource Allocation for

Multi-User OFDM SystemsXinfeng Zhao Laibo Zheng

Mingjuan

HuanJintang Wang

20110813677097

 

2540254-

603

The Teaching Reform Research and

Practice of Satellite CommunicationsYajuan Xue

20110813677098

Page 19: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 19/20

Construction of Multiple-Wei ht

2550255-

606

 

Signature Pattern Codes

for Optical CDMA Networks

Xiyang Li Pingzhi FanShinya

Matsufuji20110813677099

Session 6 Artificial Intelligence and Machine Learning

No ID Paper Title

 

Author

 

Author

 

Author

 

Author

 

Author

 

Author Number

2560256-

066

Detecting Objects in Complex Urban Area

Using Depth InformationYu Song Haijun Zhou

Xiongchang

Pang20110813677100

0257- Research on the Disposal of Negative Xianwen

111 Partial Product for Booth Algorithm

eng a m n en

Yang

2580258-

127

Optimization of the Compensatory

Anticathode in the Electric Fields

Protection of Ship Based on EvolutionaryQiang Bian Min Zhang Lihua Wang Fangjun Zhou 20110813677102

259-

131

erarc ca uzzy ystems as n versa

ApproximatorsLijuan Cai Zhanhua Cui Huilin Liu 20110813677103

2600260-

181

Image Splicing Detection Based on

Moment Features and Hilbert-Huang

Xuefang Li Tao Jing Xinghua Li 20110813677104

0261- Algorithm of Ensemble of Multi-Cassifier

183 Based on Roughnessun ang

2620262-

210

Combination Rule for Belief Functions

Based on Improved Measure of ConflictYing Peng Huairong Shen 20110813677106

2630263- Handwritten Character Recognition via

Kaibing Zhang Jun Lu 20110813683711 

2640264-

425

Distributed log information Processingwith Map-Reduce

A Case Study from Raw Data to Final

Models

Mingyue Luo Gang Liu 20110813677107

2650265-

539

A Novel Scheme of Webpage Information

Hiding Based on Attributes

Dongsheng

ShenHong Zhao 20110813677108

2660266-

542

An Effective Resources Organizational

Structure in the Grid Environment

Qing YaoXingyuan

Chen

Lei Guo Xi Wang Yuxian Jian 20110813677109

Page 20: Syed Bahauddin Alam at IEEE SECURITY 2010

8/4/2019 Syed Bahauddin Alam at IEEE SECURITY 2010

http://slidepdf.com/reader/full/syed-bahauddin-alam-at-ieee-security-2010 20/20

0267- Effects of Image Lossy Compression on Yinglong267

591

 

Palmprint Verification PerformanceHengjian Li Jizhi Wang

WangJiashu Zhang 20110813677110

2680268-

607

Matter Element Analysis Theory to Urban

Public Transport System Evaluation

Meng Li 20110813677111

269 0269- Establishement of Elliptic Curve Bin Yu 20110813677112

2700270-

626

Classify Encryption Algorithm Methods

Using Pattern Recognition Techniques

Suhaila O.

Sharif L.I. Kuncheva S.P. Mansoor 20110813677113