1. A Castiglione,AD Santis,B Masucci,F Palmieri,X Huang. Cryptographic Hierarchical Access Control for Dynamic Structures[J]. IEEE Transactions on Information Forensics and Security ,2016,11(10): 2349-2364. ( SCI-II )
2. K Liang,X Huang,F Guo,J Liu. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data[J]. IEEE Transactions on Information Forensics and Security ,2016,11(10): 2365-2376. ( SCI-II )
3. A Castiglione,AD Santis,B Masucci,F Palmieri,X Huang. Hierarchical and Shared Access Control[J]. IEEE Transactions on Information Forensics and Security, 201611(4): 850-865. ( SCI-II )
4. D He,S Zeadally,N Kumar,W Wu. Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures[J]. IEEE Transactions on Information Forensics and Security, 2016,11(9): 2052-2064. ( SCI-II )
5. L Chen,S Wang,K Wang,J Zhu. Soft subspace clustering of categorical data with probabilistic distance[J]. Pattern Recognition, 2016, 51(C):322-332. ( SCI-II )
6. Y Fan,Y Ye,L Chen. Malicious sequential pattern mining for automatic malware detection[J]. Expert S ystems With Applications, 2016, 52(C):16-25. ( SCI-II )
7. P Shi,J Zhong,J Hong,R Huang,K Wang. Automated Ki-67 Quantification of Immunohistochemical Staining Image of Human Nasopharyngeal Carcinoma Xenografts[J]. Scientific Reports, 2016, 6:32127. ( SCI-II )
8. L Lin,L Xu,S Zhou,Y Xiang.Trustworthiness-Hypercube-based Reliable Communication in Mobile Social Networks[J]. Information Sciences, 2016, 369:34-50. ( SCI-II )
9. S Lin,GD Guo,F Huang,XF Liu. Quantum anonymous ranking based on the Chinese remainder theorem[J]. Physical Review A, 2016, 93(1): 012318. ( SCI-II )
10. S Lin,GD Guo,YZ Xu,Y Sun,XF Liu. Cryptanalysis of quantum secret sharing with d -level single particles[J]. Phys.rev.a, 2016, 93(6). ( SCI-II )
11. L Lin,L Xu,S Zhou,S Hsieh. The Extra, Restricted Connectivity and Conditional Diagnosability of Split-Star Networks[J]. IEEE Transactions on Transactions on Parallel & Distributed S ystems, 2016, 27(2):533-545. ( SCI-II )
12. L Xu,L Lin,S Zhou,SY Hsieh. The Extra Connectivity, Extra Conditional Diagnosability, and -Diagnosability of Arrangement Graphs[J]. IEEE Transactions on Reliability, 2016:1-15. ( SCI-III )
13. L Chen,Y Ye,G Guo,J Zhu. Kernel-based linear classification on categorical data[J]. Soft Computing, 2016, 20(8):2981-2993. ( SCI-III )
14. Y Zeng,Z Chen,X Yang. Self-healing and energy-efficient restoration in machine-to-machine networks[J]. Iet Communications, 2016, 10(7):805-811. ( SCI-IIII)
15. YZ Xu,GD Guo,S Lin. One-Dimensional Three-State Quantum Walk with Single-Point Phase Defects. International Journal of Theoretical Physics, 2016, 55(9):1-15. ( SCI-IIII)
16. S Song,S Zhou,X Li. Conditional Diagnosability of Burnt Pancake Networks Under the PMC Model[J]. Computer Journal, 2016(1):bxv066. ( SCI-IIII)
17. Chen Z, Wang M , Xu L , et al. Worm propagation model in mobile network[J]. Concurrency and Computation: Practice and Experience, 2016,28(4):1134-1144. ( SCI-IIII)
18. S Zhou,S Song,X Yang,L Chen. On conditional fault tolerance and diagnosability of hierarchical cubic networks[J]. Theoretical Computer Science, 2016, 609(P2):421-433. ( SCI-IIII)
19. H Fang,L Xu,L Xiao. Secure routing and resource allocation based on game theory in cooperative cognitive radio networks[J]. Concurrency & Computation Practice & Experience, 2016, 28(10):2958-2977. ( SCI-IIII)
20. L Lin,L Xu,S Zhou. Relating the extra connectivity and the conditional diagnosability of regular graphs under the comparison model[J]. Theoretical Computer Science, 2016, 618(C):21-29. ( SCI-IIII)
21. X Yang,X Huang,J Han,C Su. Improved handover authentication and key pre‐distribution for wireless mesh networks[J]. Concurrency & Computation Practice & Experience, 2016, 28(10):2978-2990. ( SCI-IIII)
22. S Lin,H Wang,GD Guo,GH Ye,HZ Du. Authenticated multi-user quantum key distribution with single particles[J]. International Journal of Quantum Information, 2016, 14(01):1650002. ( SCI-IIII)
23. L Hu,G Guo,C Ma. Combined new nonnegative matrix factorization algorithms with two-dimensional nonnegative matrix factorization for image processing[J]. Multimedia Tools and Applications, 2016, 75(18):11127-11155. (SCI-IIII)
24. Lin H , Hu J , Xu L , et al. A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks[J]. Computers & Electrical Engineering, 2016:S0045790616306334. (SCI-IIII)
25. Xu L , Fang H , Lin Z . Evolutionarily stable opportunistic spectrum access in cognitive radio networks[J]. IET Communications, 2016, 10(17):2290-2299. (SCI-IIII )
26. Luo F , Lin C , Zhu Y . Role-Based Signature and Its Security Proof[J]. Journal of Information Science and Engineering, 2016, 32(6):1525-153. (SCI-IIII)
27. C Su,B Santoso,Y Li,R Deng,X Huang. Universally Composable RFID Mutual Authentication[J]. IEEE Transactions on Dependable and Secure Computing, 2015:1-1. (EI)
28. Zhen Li,Wei Wu. Reversible Data Hiding for Encrypted Images Based on Statistical Learning[J]. Australasian Conference on Information Security and Privacy, 2016: 198-212. (EI)
29. A Ye,J Sao,Q Jian. A robust location fingerprint based on differential signal strength and dynamic linear interpolation[J]. Security & Communication Networks, 2016, 9(16):3618-3626. (EI)
30. Q Chen,A Ye,L Xu. A privacy-preserving Proximity Detection Method in social network[J]. International Conference, 2016:68. (EI)
31. A Ye,Y Li,L Xu. A novel location privacy-preserving scheme based on l -queries for continuous LBS[J]. Computer Communications, 2016. (EI)
32. C Lin,F Zhu,W Wu,K Liang,KKR Choo. A New Transitive Signature Scheme[C] // International Conference on Network and S ystem Security, 2016: 156-167. (EI)
33. T Wang,HA Man,W Wu. An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords[C] // International Conference on Network and S ystem Security. Springer International Publishing, 2016: 251-265. (EI)
34. Ye A , Sao J , Jian Q . A robust location fingerprint based on differential signal strength and dynamic linear interpolation[J]. Security and Communication Networks, 2016, 9(16):3618-3626. (EI)
35. Li C , Xu L , Ye F , et al. An Adaptive Error Concealment Algorithm Based on Partition Model[M]// Advances in Image and Graphics Technologies. Springer Singapore, 2016,35-43. (EI)
36. Shi P , Wan M , Hong J , et al. A Parallel Fish Image Processing Pipeline of High-Throughput Chromosomal Analysis[C] // International Conference on Information Technology in Medicine & Education. IEEE, 2016. (EI)
37. Zhang J , Xu L , Yang H . A Novel Sleep Scheduling Algorithm for Wireless Sensor Networks[C]// International Conference on Intelligent Information Hiding & Multimedia Signal Processing. IEEE, 2016. (EI)
38. Ye A , Zheng Y . Large scale trajectory data management[C]// International Conference on Logistics. IEEE, 2016. (EI)
39. 叶锋, 李承欣, 许力, et al. 基于结构分析的感知视频信号压缩方法[J]. 北京邮电大学学报, 2016(05):113-118. (EI)
40. 柯品惠,叶智钒,常祖领. 一类推广的二元Legendre-Sidelnikov序列的自相关分布[J].电子与信息学报, 2016,38(2):303-309 . (A类)
41. 苏彬庭, 许力, 王峰, 等. 基于群签名的无线Mesh网络匿名切换认证方案[J]. 通信学报, 2016(S1):178-183. (A类)
42. 黄毅杰,林晖,许力,黄川,周赵斌[J].认知无线网络中一种基于VCG的分布式安全频谱感知策略. 小型微型计算机系统, 2016(6):1228-1233. (B类)
43. 夏有华,林晖,许力,周赵斌. 基于Core-Selecting机制的物联网安全路由协议[J].计算机系统应用, 2016, 25(4):128-134. (B类)
44. 李晴,叶阿勇,许力. 公众环境下无线接入的安全问题研究[J].信息网络安全,2016(4):67-75. (B类)
45. 张豪,陈黎飞,郭躬德. 基于符号熵的序列相似性度量方法[J].计算机工程,2016(5):201-206. (B类)
46. 范宇杰,陈黎飞,郭躬德. 一种匹配全局结构的图相似性度量[J].小型微型计算机系统,2016(7):1488-1492. (B类)
47. 肖剑川,许力,叶阿勇,林丽美. 基于Voronoi图的路网轨迹隐私保护研究[J].信息网络安全, 2016(6):15-21. (B类)
48. 方禾,许力,苏彬庭. 认知无线电网络中基于非合作博弈的隐货币交易模型[J].小型微型计算机系统, 2016(2):227-230. (B类)
49. 陈丽萍,郭躬德. 一种基于顺序特性的子空间聚类方法[J].计算机科学,2016(3):72-74. (B类)
50. 李承欣,叶锋,涂钦,陈家祯,许力. 面向视频压缩的显著性协同检测JND模型[J].计算机系统应用,2016(11):208-215. (B类)
51. 周赵斌,许力. 基于数字签名的防污染网络编码方案[J].计算机系统应用, 2016, 25(6):185-190. (B类)
52. 周赵斌,许力,李世唐. 基于CRC的防污染网络编码方案[J].计算机系统应用, 2016, 25(1):101-106. (B类)
53. 蒋欣,王开军,陈黎飞. 基于DTW匹配的粒子滤波故障预报[J].计算机系统应用2016, 25(3):124-130. (B类)
54. 田健,王开军,郭躬德,陈黎飞. 融合速度特征的压缩感知目标跟踪算法[J].南京大学学报,2016,52(2): 149-158. (B类)
55. 林品乐,王开军. 基于模糊隶属度的粒子滤波故障预测[J].计算机系统应用2016, 25(6) :119-124. (B类)
56. 徐永振,郭躬德,蔡彬彬,林崧. 基于一维三态量子游走的量子聚类算法[J].计算机科学,2016(3):80-83. (B类)
57. 林少聪,叶阿勇,许力. 基于坐标变换的k匿名位置隐私保护方法[J].小型微型计算机系统,2016(1):119-123. (B类)
58. 林建辉,严宣辉,黄波. 基于SVD与模糊聚类的协同过滤推荐算法[J].计算机系统应用,2016(11):156-163. (B类)
59. 兰天,郭躬德. 基于词共现关系和粗糙集的微博话题检测方法[J].计算机系统应用,2016(6):17-24. (B类)
60. 黄波,严宣辉,林建辉. 基于联合非负矩阵分解的协同过滤推荐算法[J].模式识别与人工智能,2016(8):725-734. (B类)
61. 韩宸望,林晖,黄川. 基于SQL语法树的SQL注入过滤方法研究[J].网络与信息安全学报, 2016, 2(11):70-77. (B类)
62. 方禾, 许力, 苏彬庭,等. 多信道无线网络中窃听与干扰攻击的对抗策略[J].四川大学学报(工程科学版), 2016, 48(1):119-125. (CSCD类)
63. 苏彬庭, 许力, 方禾,等. 基于 Diffie-Hellman的无线Mesh网络快速认证机制[J].山东大学学报(理学版), 2016, 51(9):101-105. (CSCD类)
64. 陈旖, 许力, 张美平. 面向异构物联网的轻量级网络构建层设计[J].福建师大学报(自然科学版), 2016(3):31-39. (CSCD类)
65. 汪晓丁, 许力, 周书明. 一种基于容错定位集的分布式故障诊断与定位算法[J].福建师大学报(自然科学版), 2016(2):7-14. (CSCD类)
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学) |
邮编:350007 联系电话:0591-83456050转406 |
访问量:
158962020年11月04日
|