Conference 2015
时间:2019-07-22 分类:Conference Paper
-
- Hanmo Wang,Liang Du,Peng Zhou,Lei Shi,Yi-Dong Shen,Convex Batch Mode Active Sampling via alpha-relative Pearson Divergence,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,”Austin, Texas, USA”
- Miao Xie,Qiusong Yang,Qing Wang,Gao Cong,Gerard de Melo,DynaDiffuse: A Dynamic Diffusion Model for Continuous Time Constrained Influence Maximization,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,”Austin, Texas, USA”
- Meilun Li,Zhikun She,Andrea Turrini,Lijun Zhang,Preference planning for Markov decision processes,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,”Austin, Texas, USA”
- Jianfeng Du,Kewen Wang,Yi-Dong Shen,Towards Tractable and Practical ABox Abduction over Inconsistent Description Logic Ontologies,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,”Austin, Texas, USA”
- Wei Wang,Hao Wang,Chen Zhang,Fanjiang Xu,Transfer Feature Representation via Multiple Kernel Learning,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,”Austin, Texas, USA”
- Shaowei Cai,Jinkun Lin,Kaile Su,Two Weighting Local Search for Minimum Vertex Cover,Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI-15),January 25-29,”Austin, Texas, USA”
- Lei Song,Yuan Feng,Lijun Zhang,Decentralized bisimulation for multiagent systems,14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015),May 4-8,”Istanbul, Turkey”
- Bin Zhang,Chao Xu,Willi Meier,”Fast Correlation Attacks over extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0″,35th Annual Cryptology Conference (CRYPTO 2015),August 16-20,”Santa Barbara, CA, USA”
- Jinkun Lin,Chuan Luo,Shaowei Cai,Kaile Su,Dan Hao,Lu Zhang,TCA: An Efficient Two-Mode Meta-Heuristic Algorithm for Combinatorial Test Generation,30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015),November 9-13,”Lincoln, Nebraska, USA”
- Liang Zou,Martin Fraenzle,Naijun Zhan,Peter Nazier Mosaad,Automatic Verification of Stability and Safety for Delay Differential Equations,27th International Conference on Computer Aided Verification (CAV 2015),July 18-24,”San Francisco, California, USA”
- Yu-Fang Chen,Chih-Duo Hong,Bow-Yaw Wang,Lijun Zhang,Counterexample-guided polynomial loop invariant generation by lagrange interpolation,27th International Conference on Computer Aided Verification (CAV 2015),July 18-24,”San Francisco, California, USA”
- Hui Chen,Jiangdong Li,Fengjun Zhang,Yang Li,Hongan Wang,3D Model-Based Continuous Emotion Recognition,28th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015),June 7-12,”Boston, MA, USA”
- Yan Cai,Lingwei Cao,Effective and precise dynamic detection of hidden races for Java programs,10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2015) ,August 30 – September 4,”Bergamo, Italy”
- Jiang Zhang,Zhenfeng Zhang,Jintai Ding,Michael Snook,?zgür Dagdelen,Authenticated Key Exchange from Ideal Lattices,34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015),April 26-30 ,”Sofia, Bulgaria”
- Radu Curticapean,Mingji Xia,”Parameterizing the Permanent: Genus, Apices, Minors, Evaluation mod 2^k.”,IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS 2015),October 18–20,” Berkley, CA, USA”
- Lei Shi,Hanghang Tong,Xinzhu Mu,BrainQuest: Perception-Guided Brain Network Comparison,International Conference on Data Mining (ICDM 2015),November 14-17,”Atlantic City, NJ, USA”
- Hanmo Wang,Liang Du,Lei Shi,Peng Zhou,Yuhua Qian,Yi-Dong Shen ,Experimental Design With Multiple Kernels,International Conference on Data Mining (ICDM 2015),November 14-17,”Atlantic City, NJ, USA”
- Ziyang Ma,Renjie Liao,Xin Tao,Li Xu,Jiaya Jia,Enhua Wu,Handling Motion Blur in Multi-Frame Super-Resolution, 28th IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015),June 7-12,”Boston, MA, USA”
- Wanwei Liu,Lei Song,Ji?Wang,Lijun Zhang,A simple probabilistic extension of modal mu-calculus,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,”Buenos Aires, Argentina”
- Li Shen,Gang Sun,Zhouchen Lin,Qingming Huang,Enhua Wu,Adaptive Sharing for Image Classification,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,”Buenos Aires, Argentina”
- Shaowei Cai,Balance between Complexity and Quality: Local Search for Minimum Vertex Cover in Massive Graphs,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,”Buenos Aires, Argentina”
- Peng Zhou,Liang Du,Hanmo Wang,Lei Shi,Yi-Dong Shen,Learning a Robust Consensus Matrix for Clustering Ensemble via Kullback-Leibler Divergence Minimization,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,”Buenos Aires, Argentina”
- Lei Song,Yuan Feng,Lijun Zhang,Planning for stochastic games with co-safe objectives,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,”Buenos Aires, Argentina”
- Peng Zhou,Liang Du,Lei Shi,Hanmo Wang,Yi-Dong Shen,Recovery of Corrupted Multiple Kernels for Clustering,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,”Buenos Aires, Argentina”
- Liang Du,Peng Zhou,Lei Shi,Hanmo Wang,Mingyu Fan,Wenjian Wang,Yi-Dong Shen ,Robust Multiple Kernel K-means using L2-1-norm,Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015),July 25-31 ,”Buenos Aires, Argentina”
- Liang Du,Yi-Dong Shen ,Unsupervised Feature Selection with Adaptive Structure Learning, 21th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD-15),August 10-13,”Sydney, NSW, Australia.”
- Fei He,Xiaowei Gao,Bow-Yaw Wang,Lijun Zhang,Leveraging weighted automata in compositional reasoning about concurrent probabilistic systems,42nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2015),January 15-17,”Mumbai, India”
- Artur Czumaj,Pan Peng,Christian Sohler ,Testing Cluster Structure of Graphs,47th Annual Symposium on the Theory of Computing (STOC 2015),June 14-17,”Portland, Oregon, USA.”
- Qingsong Liu,Yifan Hu,Lei Shi,Xinzhu Mu,Yutao Zhang,Jie Tang,EgoNetCloud: Event-based Dynamic Egocentric Network Visualization,”IEEE Visualization (VIS’15): Visual Analytics Science and Technology (VAST), Information Visualization (InfoVis) & Scientific Visualization (SciVis)”,October 25-30,”Chicago, Il, USA”
- Minghua Wang,Heng Yin,Abhishek Vasisht Bhaskar,Purui Su,Dengguo Feng,Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries,2015 Annual Computer Security Applications Conference (ACSAC 2015),December 7-11,”Los Angeles, CA, USA”
- Bin Zhang,Xinxin Gong,Another Tradeoff Attack on Sprout-like Stream Ciphers,21st International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’ 2015),November 29-December 3,”Auckland, New Zealand”
- Ting Gan,Mingshuai Chen,Liyun Dai,Bican Xia,Naijun Zhan ,Decidability of the reachability for a family of linear vector fields, 13th International Symposium on Automated Technology for Verification and Analysis (ATVA 2015),October 12-15,”Shanghai, China”
- Liang Zou,Naijun Zhan,Shuling Wang,Martin Fr?nzle,Formal Verification of Simulink/Stateflow Diagrams, 13th International Symposium on Automated Technology for Verification and Analysis (ATVA 2015),October 12-15,”Shanghai, China”
- Constantin Enea ,Mihaela Sighireanu ,Zhilin Wu,On Automated Lemma Generation for Separation Logic with Inductive Definitions , 13th International Symposium on Automated Technology for Verification and Analysis (ATVA 2015),October 12-15,”Shanghai, China”
- Chao Wang,Yi Lv,Peng Wu,TSO-to-TSO Linearizability is Undecidable, 13th International Symposium on Automated Technology for Verification and Analysis (ATVA 2015),October 12-15,”Shanghai, China”
- Hongzhi Yin,Xiaofang Zhou,Yingxia Shao,Hao Wang,Shazia Sadiq,Joint Modeling of User Check-in Behaviors for Point-of-Interest Recommendation,24th ACM International Conference on Information and Knowledge Management (CIKM 2015),October 19-23,”Melbourne, VIC, Australia”
- Peng Zhang,Tao Jiang,Angsheng Li,Improved Approximation Algorithms for the Maximum Happy Vertices and Edges Problems,21st International Computing and Combinatorics Conference (COCOON 2015),August 4-6,”Beijing, China”
- Sa Wang,Wenbo Zhang,Tao Wang,Chunyang Ye,Tao Huang,Vmon: Monitoring and Quantifying Virtual Machine Inteference via Hardware Performance Counter,”IEEE 39th Annual International Computers, Software & Applications Conference (COMPSAC 2015)”,July 1-5,”Taichung, Taiwan”
- Ernst Moritz Hahn,Guangyuan Li,Sven Schewe, Andrea Turrini,Lijun Zhang,Lazy Probabilistic Model Checking without Determinisation,26th International Conference on Concurrency Theory (CONCUR 2015),September 1-4 ,”Madrid, Spain”
- Taolue Chen,Song Fu,Zhilin Wu,On the Satisfiability of Indexed Linear Temporal Logics,26th International Conference on Concurrency Theory (CONCUR 2015),September 1-4 ,”Madrid, Spain”
- Rongjie Yan,Chih-Hong Cheng,Yesheng Chai,Formal consistency checking over specifications in natural languages,”Design, Automation and Test in Europe Conference and Exhibition (DATE 2015)”,March 9-13 ,”Grenoble, France”
- Xinye Tang,Song Wang,Ke Mao,Will This Bug-fixing Change Break Regression Testing?,ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2015),October 22-23?,”Beijing, China”
- Jiang Liu,Naijun Zhan,Hengjun Zhao,Liang Zou,Abstraction of elementary hybrid systems by variable transformation,20th International Symposium on Formal Methods (FM 2015),June 24-26,”Oslo, Norway”
- Christian Eisentraut,Jens?Chr. Godskesen,Holger Hermanns,Lei Song,Lijun Zhang,Probabilistic bisimulation for realistic schedulers,20th International Symposium on Formal Methods (FM 2015),June 24-26,”Oslo, Norway”
- Xue-Yang Zhu,Rongjie Yan,Yu-Lei Gu,Jian Zhang,Wenhui Zhang,Guangquan Zhang,Static Optimal Scheduling for Synchronous Data Flow Graphs with Model Checking,20th International Symposium on Formal Methods (FM 2015),June 24-26,”Oslo, Norway”
- Weifeng Wang,Li Jiao,Difference Bound Constraint Abstraction for Timed Automata Reachability Checking,”35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2015)”,June 2-4,”Grenoble, France”
- Fusang Zhang,Hai Liu,Yiu-Wing Leung,Xiaowen Chu,Beihong Jin,Community-based Bus System as Routing Backbone for Vehicular Ad Hoc Networks,IEEE 35th International Conference on Distributed Computing Systems (ICDCS 2015),June 29 – July 2,”Columbus, OH, USA”
- Peng Zhang,Yulong Ao,Chao Yang,Yiqun Liu,Fangfang Liu,Changmao Wu,Haitao Zhao,Pattern-Driven Hybrid Multi- and Many-cceleration in the MPAS Shallow-Water Model,44th International Conference on Parallel Processing (ICPP’15),September 1-4,”Beijing, China”
- Zhiqiang Zhang,Tianyong Wu,Jian Zhang,Boundary value analysis in automatic white-box test generation,IEEE 26th International Symposium on Software Reliability Engineering (ISSRE 2015),November 2-5,”Gaithersbury, MD, USA”
- Lijie Xu,Wensheng Dou,Feng Zhu,Chushu Gao,Jie Liu ,Hua Zhong,Jun Wei,Experience Report: A Characteristic Study on Out of Memory Errors in Distributed Data-Parallel Applications,IEEE 26th International Symposium on Software Reliability Engineering (ISSRE 2015),November 2-5,”Gaithersbury, MD, USA”
- Jie Wang,Wensheng Dou,Chushu Gao,Jun Wei,Fast Reproducing Web Application Errors,IEEE 26th International Symposium on Software Reliability Engineering (ISSRE 2015),November 2-5,”Gaithersbury, MD, USA”
- Danli Wang,Lan Zhang,Yunfeng Qi,Fang Sun,A TUI-based Programming Tool for Children,ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE ’15),July 4-8,”Vilnius, Lithuania”
- Gilles Dowek,Ying Jiang,”Decidability, introduction rules, and automata”,”20th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR-20)”,November 24-28,”Suva, Fiji”
- Zhuang Cai,Yi-Na Li,Xianjun Sam Zheng,Kang Zhang,Applying feature integration theory to glyph-based information visualization,IEEE Pacific Visualization Symposium (PacificVis 2015),April 14-17,”Hangzhou, China”
- Phong Q. Nguyen,Jiang Zhang,Zhenfeng Zhang,Simpler Efficient Group Signatures from Lattices,IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2015),March 30-April 1 ,”Maryland, USA”
- Meining Nie,Purui Su,Qi Li,Zhi Wang,Lingyun Ying,Jinlong Hu,Dengguo Feng,Xede: Practical Exploit Early Detection,”18th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2015)”,November 2-4,”Kyoto, Japan”
- Hendrik Fichtenberger,Pan Peng,Christian Sohler,On constant size graphs that preserve the local structure of high girth graphs,19th International Workshop on Randomization and Computation (RANDOM’15),August 24-26,”Princeton University, New Jersey, USA”
- Xiaowei He,Huamin Wang,Fengjun Zhang,Hongan Wang,Guoping Wang,Kun Zhou,Enhua Wu,Simulation of fluid mixing with interface control,14th ACM SIGGRAPH / Eurographics Symposium on Computer Animation (SCA 2015),August 7-9,”Los Angeles, California, USA”
- Peng Zhou,Liang Du,Mingyu Fan,Yi-Dong Shen,An LLE based Heterogeneous Metric Learning for Crossmedia Retrieval,FIFTEENTH SIAM INTERNATIONAL CONFERENCE ON DATA MINING (SDM 2015),April 30-May 2,”Vancouver, British Columbia, Canada”
- Xiaosheng Li,Hanqiu Sun,Xuehui Liu,Enhua Wu,Adaptive level set for fluid surface tracking,21st ACM Symposium on Virtual Reality Software and Technology (VRST 2015),November 13-15,”Beijing, China”
- Jian Shi,Yue Dong,Xin Tong,Yanyun Chen,Efficient Intrinsic Image Decomposition for RGBD Images,21st ACM Symposium on Virtual Reality Software and Technology (VRST 2015),November 13-15,”Beijing, China”
- Yinling Qian,Yue Shu,Hanqiu Sun,Yanyun Chen,Vector Solid Texture Synthesis Using Two-scale Shaping Model,21st ACM Symposium on Virtual Reality Software and Technology (VRST 2015),November 13-15,”Beijing, China”
- Chao Wang,Yi Lv,Gaoang Liu,Peng Wu,Quasi-Linearizability is Undecidable,13th Asian Symposium on Programming Languages and Systems (APLAS15),11.30-12.2,”Pohang, South Korea”
- Han Yue,Peng Wu,Tsong-Yueh Chen,Yi Lv,Input-driven Active Testing of Multi-threaded Programs,Asia-Pacific Software Engineering Conference (APSEC15),12.1-12.4,”New Delhi, India”
- Feng Zhu,Jie Liu,Lijie Xu,Dan Ye,Jun Wei,Tao Huang,A Lightweight Evaluation Framework for Table Layouts in MapReduce Based Query Systems,17th Asia-Pacific Web Conference (APWeb 15),9.18-9.20,”Guangzhou, China”
- Feifei Peng,Haiming Chen,Discovering Restricted Regular Expressions with Interleaving,17th Asia-Pacific Web Conference (APWeb 15),9.18-9.20,”Guangzhou, China”
- Zhijia Li,Li Jiao,Xiang Hu,Performance Analysis for Job Scheduling in Hierarchical HPC Systems: A Coloured Petri Nets Method,15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP15),11.18-11.20,”Zhangjiajie, China”
- Yulong Ao,Yiqun Liu,Chao Yang,Fangfang Liu,Peng Zhang,Yutong Lu,Yunfei Du,Performance Evaluation of HPGMG on Tianhe-2: Early Experience,15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP15),11.18-11.20,”Zhangjiajie, China”
- Shuling Wang,Naijun Zhan,Liang Zou,An Improved HHL Prover: An Interactive Theorem Prover for Hybrid Systems,17th International Conference on Formal Engineering Methods (ICFEM15),11.3-11.5,”Paris, France”
- Rong?Wang,Min?Zhang,Dengguo?Feng,Yanyan?Fu,Zhenyu?Chen,A De-anonymization Attack on Geo-located Data Considering Spatio-temporal Influences,7th International Conference on Information and Communications Security (ICICS15),12.9-12.11,”Beijing, China”
- Feifei Peng,Haiming Chen,Xiaoying Mou,Deterministic Regular Expressions with Interleaving,12th International Colloquium on Theoretical Aspects of Computing (ICTAC15),10.29-10.31,”Cali, Colombia”
- Gang Sun,Yanyun Chen,Xuehui Liu,Enhua Wu,Adaptive Multi-task Learning for Fine-Grained Categorization,2015 IEEE International Conference on Image Processing (ICIP15),9.27-9.30,”Quebec City, QC, Canada”
- Huiling?Zhang,Wenling?Wu,Structural evaluation for generalized feistel structures and applications to LBlock and TWINE,16th International Conference on Cryptology in India (INDOCRYPT15),12.6-12.9,”Bangalore, India”
- Guangjun Fan,Yongbin Zhou,Francois-Xavier Standaert,Dengguo Feng,On the impacts of mathematical realization over practical security of leakage resilient cryptographic schemes,11th International Conference on Information Security Practice and Experience (ISPEC15),5.5-5.8,”Beijing, China”
- Shaoyu Du,Zhenqi Li,Bin Zhang,Dongdai Lin,Combined cache timing attacks and template attacks on stream cipher MUGI,11th International Conference on Information Security Practice and Experience (ISPEC15),5.5-5.8,”Beijing, China”
- Shaoyu Du,Bin Zhang,Zhenqi Li,Dongdai Lin,Fault attacks on stream cipher scream,11th International Conference on Information Security Practice and Experience (ISPEC15),5.5-5.8,”Beijing, China”
- Liangjun Zang,Weimin Wang,Bo Chen,Cungen Cao,The double-level default description logic d3L,”8th International Conference on Knowledge Science, Engineering and Management (KSEM15)”,10.28-10.30,”Chongqing, China”
- Liangjun Zang,Weimin Wang,Ya Wang,Fang Fang,Cong Cao,Xiaolong Wu,Qi Zhou,Ye Lu,Tingyu Li,Cungen Cao,A Chinese framework of semantic taxonomy and description: Preliminary experimental evaluation using web information extraction,”8th International Conference on Knowledge Science, Engineering and Management (KSEM15)”,10.28-10.30,”Chongqing, China”
- Angsheng Li,Pan Peng,Testing Small Set Expansion in General Graphs,32nd International Symposium on Theoretical Aspects of Computer Science (STACS15),3.4-3.7,”Dagstuhl, Germany”
- Tingting Hu,Shuling Wang,Zongyan Qiu,Verifying Interaction between Methods in Classes,International Symposium on Theoretical Aspects of Software Engineering (TASE15),9.12-9.14,”Nanjing, China”
- Jingzheng Wu,Yanjun Wu,Mutian Yang,Zhifei Wu,Tianyue Luo,Yongji Wang,biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application,22nd ACM SIGSAC Conference on Computer and Communications Security (CCS15),10.12-10.16,”Denver, Colorado, USA”,poster
- Tianyue Luo,Chen Ni,Qing Han,Mutian Yang,Jingzheng Wu,Yanjun Wu,PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities,22nd ACM SIGSAC Conference on Computer and Communications Security (CCS15),10.12-10.16,”Denver, Colorado, USA”,poster
- Yongjian Li,Jun Pang,Yi Lv,Dongrui Fan,Shen Cao,Kaiqiang Duan,paraVerifier: An Automatic Framework for Proving Parameterized Cache Coherence Protocols,13th International Symposium on Automated Technology for Verification and Analysis (ATVA15),10.12-10.15,”Shanghai, China”
- Liu Xuemin,Yang Meng,Wang Cheng,Yang Gang,Approach for 3D Reconstructing Bonsai Plant,2015 IEEE International Conference on Multimedia Big Data (BigMM15),4.20-4.22,”Beijing, China”
- Yunfeng Qi,Danli Wang,Lan Zhang,Yining Shi,TanProStory: A Tangible Programming System for Children’s Storytelling,33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA15),4.18-4.23,”Seoul, Republic of Korea”
- Le Wang,Jiangtao Gong,Lei Shi ,OLAP Visual Analytics on Large Software Call Graphs with Hierarchical ChordMap,2015 IEEE International Conference on Data Mining Workshop (ICDMW15),11.14-11.17,”Atlantic City, NJ, USA”
- Yuan Feng,Ernst Moritz Hahn,Andrea Turrini,Lijun Zhang,QPMC: A Model Checker for Quantum Programs and Protocols,20th International Symposium on Formal Methods (FM15),6.24-6.26,”Oslo, Norway”
- G.Burel,G. Dowek,Y. Jiang ,A Completion Method to Decide Reachability in Rewrite Systems,FroCoS #9.20-9.24,Poland
- Lavindra de Silva,Rongjie Yan,Félix Ingrand,Rachid Alami,Saddek Bensalem,A Verifiable and Correct-by-Construction Controller for Robots in Human Environments,10th Annual ACM/IEEE International Conference on Human-Robot Interaction Extended Abstracts (HRI 2015 Extended Abstracts),3.2-3.5,”Portland, Oregon, USA”
- Yue Su,Sibai Sun,Yuan Xuan,Lei Shi ,Influence Visualization of Scientific Paper Through Flow-based Citation Network Summarization,2015 IEEE International Conference on Data Mining Workshop (ICDMW15 ),11.14-11.17,”Atlantic City, NJ, USA”
- Qian?Zhang,Ying?Jiang,Liping?Ding,Modelling?and?Analysis?of?Network Security –?a?Probabilistic?Value-passing?CCS?Approach,17th International Conference on Information and Communications Security (ICICS15),12.9-12.11,”Beijing, China”
- Qingyun Wang,Xuehui Liu,Xin Lu,Jianwen Cao,Wen Tang,Cute Balloons with Thickness,International Conference on Image and Graphics (ICIG15),8.13-8.16,”Tianjin, China”,c
- Danli Wan,Yunfeng Qi,Lan Zhang,A tangible programming system conveying event handling concept,14th International Conference on Interaction Design and Children (IDC15),6.21-6.24,USA
- Tom van Dijk,Ernst Moritz Hahn,David N. Jansen,Yong Li,Thomas Neele,Marielle Stoelinga1,Andrea Turrini,Lijun Zhang,A Comparative Study of BDD Packages for Probabilistic Symbolic Model Checking,”1st International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA15)”,11.4-11.6,”Nanjing, China”
- Yu Peng,Shuling Wang,Naijun Zhan,Lijun Zhang,Extending Hybrid CSP with Probability and Stochasticity,”1st International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA15)”,11.4-11.6,”Nanjing, China”
- Yu-Lei Gu,Xue-Yang Zhu,Guangquan Zhang,Pareto Optimal Scheduling of Synchronous Data Flow Graphs via Parallel Methods,”1st International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA15)”,11.4-11.6,”Nanjing, China”
- Bo Yang,Kang Yang,Yu Qin,Zhenfeng Zhang,Dengguo Feng,DAA-TZ: An efficient DAA scheme for mobile devices using ARM trustzone,8th International Conference on Trust and Trustworthy Computing (TRUST15),8.24-8.26,”?Heraklion, Greece”
- Yan Huang,Cuixia Ma,Hongan Wang,Exploring the Benefits of Text and Sketch in Video Retrieval of Complex Queries,8th International Symposium on Visual Information Communication and Interaction (VINCI’15),8.24-8.26,”Tokyo, AA, Japan”,c
- Shaowei Cai,Chuan Luo,Kaile Su,CCAnr: A Configuration Checking Based Local Search Solver for Non-random Satisfiability,18th International Conference on Theory and Applications of Satisfiability Testing (SAT15),9.24-9.27,”Austin, Texas,USA”,tool
- Zhiyuan Guo,Wenling Wu,Si Gao,Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure, International Conference on Selected Areas in Cryptography(SAC 2015),8.12-8.14,”Sackville, Canada”
- Huiling Zhang,Wenling Wu,Yanfeng Wang, Integral Attack against Bit-Oriented Block Ciphers,Information Security and Cryptology(ICISC 2015),11.25-11.27,”Seoul, South Korea”
- Li Lin,Wenling Wu,Yafei Zheng,Improved Meet-in-the-Middle distinguisher on Feistel Schemes, International Conference on Selected Areas in Cryptography(SAC 2015),8.12-8.14,”Sackville, Canada”
- Lin Jiao,Bin Zhang,Mingsheng Wang,Two Generic Methods of Analyzing Stream Ciphers,International Information Security Conference(ISC 2015),9.9-9.11,”Trondheim, Norway”