With the fast development of computer science and technology, the computational intelligence (CI) methods have been successfully applied to deal with security and trusted problems during the past decades. It has been a necessary and emerging task to cross-fertilize and integrate the ideas and techniques of these two important fields: CI and information security (IS). This special issue selects 11 high-quality extended papers from a total of 171 accepted papers of the 2013 International Conference on Computational Intelligence and Security (CIS2013). These papers can be classified into two groups. The first group contains seven papers developing new CI models with applications in solving real-world problems, and the second group has four papers focusing on the theoretical study of novel CI algorithms.

In the first group, the paper entitled “Emergency Vehicle Scheduling Problem with Time Utility in Disasters” by X. Gan et al. proposes a fuzzy optimization model for the flexible emergency rescue system and uses the particle swarm optimization (PSO) method to handle this model. The paper entitled “Effective Task Scheduling and IP Mapping Algorithm for Heterogeneous NoC-Based MPSoC” by P. Yang and Q. Wang develops a new task scheduling scheme for the NoC- (network-on-chip-) based MPSoC (multiprocessor system-on-chip) design process and uses the PSO to acquire the minimum task execution time with the least task running and transfer cost. The paper entitled “Optimal Vaccine Distribution Strategy for Different Age Groups of Population: A Differential Evolution Algorithm Approach” by X.-M. Hu et al. applies the evolutionary algorithms to find the optimal strategy for the vaccine distribution of different age groups of population. This approach can minimize the number of the infectious individuals during the epidemic outbreak. In one of the papers, W. Wang et al. present an optimization model using a convex risk measure for the portfolio selection problems and design a genetic algorithm on the basis of this effective model. X. Deng and J. Deng establish a machine learning approach for the prisoners’ dilemma problem in the game theory and provide an effective method for the incomplete information game problems in their paper. C. Ruan and J. Yang investigate a fuzzy software quality evaluation method via the index system models and fuzzy methods that are applicable to those cases, in which the experts have inconsistent and uncertain judgments for software quality. J. Qu et al. present a new cascade pedestrian detection technique using the orthogonal scene motion pattern model in a general density video and a specifically designed feature classifier. The static classification and surveillance video experiments demonstrate the effectiveness of their method.

In the second group, D. Jiang and Z. Fan suggest a new idea to design algorithms: automatically designing evolutionary algorithms by computers according to the problem requirements. H. Li and L. Fang propose an efficient evolutionary algorithm for handling interval linear bilevel programming problems. H. Li and L. Zhang investigate a differential evolution method for the constrained bilevel programming problems by using the hybrid mutations and an improved constraint handling technique, which has been validated in the simulations of some linear and nonlinear bilevel programming problems. R. Wang et al. propose an improved adaptive growing and pruning algorithm (IAGP) for neural networks, and simulation results show that it can quickly and accurately predict the traffic capacity.

By publishing the above interesting papers in this special issue, we wish to provide our readers with some inspiring ideas for developing new CI models with applications in attacking practical problems.

Yuping Wang
Yiu-ming Cheung
Xiao-Zhi Gao
Patrick Wang
Hailin Liu