发布时间:2019-05-24   浏览次数:229


[1]  Hou S, Huang X, Liu J K, et al. Universal designated verifier transitive signatures for graph-based big data[J]. Information Sciences, 2015, 318:144-156.
[2]  Hu L Y, Guo G D, Ma C F. Image processing using Newton-based algorithm of nonnegative matrix factorization[J]. Applied Mathematics & Computation, 2015,269(C):956-964.
[3]  Liu J K, Chu C, Chow S S M, Huang X, et al. Time-Bound Anonymous Authentication for Roaming Networks[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(1):178-189.
[4]  Liu J, Huang X, Liu J K. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption[J]. Future Generation Computer S ystems, 2015, 52:67-76.
[5]  Lin H, Xu L, Mu Y, et al. A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing[J]. Future Generation Computer S ystems, 2015, 52:125-136.
[6]  Hu L Y, Guo G D, Ma C F. The least squares anti-bisymmetric solution and the optimal approximation solution for Sylvester equation[J]. Applied Mathematics & Computation, 2015, 259:212-219.
[7]  D He,S Zeadally,B Xu,X Huang. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks[J]. IEEE Transactions on Information Forensics and Security, 2015,10(12):2681-2691.
[8]  X Yang,X Huang,JK Liu. Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing[J]. Future Generation Computer S ystems, 2016,62:190-195.
[9]  H Lin,L Xu,X Huang,W Wu,Y Huang. A trustworthy access control model for mobile cloud computing based on reputation and mechanism design[J]. Ad Hoc Networks, 2015, 35(C):51-64.
[10] L Lin,L Xu,S Zhou. Conditional diagnosability and strong diagnosability of shuffle-cubes under the comparison model[J]. International Journal of Computer Mathematics, 2015,92(2):230-249.
[11] Y Zhang,L Xu,X Huang,J Li. Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge[J]. International Journal of Ad Hoc & Ubiquitous Computing, 2015,20(4):262-273.
[12] Chen L, Guo G. Nearest neighbor classification of categorical data by attributes weighting[J]. Expert S ystems with Applications, 2015, 42(6):3142-3149.
[13] Pinhui Ke,  Zhengchun Zhou. A Generic Construction of Z-Periodic Complementary Sequence Sets  with Flexible Flock Size and Zero Correlation Zone Length[J], IEEE Signal Processing  Letters, 2015,22(9):1462-1466.
[14] Huang X, Liu J K, Tang S, et al. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security[J]. IEEE Transactions on Computers, 2015, 64(4):971-983.
[15] Lin L, Zhou S, Xu L, et al. The Extra Connectivity and Conditional Diagnosability of Alternating Group Networks[J]. IEEE Transactions on Parallel & Distributed S ystems, 2015,26(8):2352-2362.
[16] Lin L, Xu L, Zhou S, et al. The Reliability of Subgraphs in the Arrangement Graph[J]. IEEE Transactions on Reliability, 2015,64(2):807-818.
[17] Wu J, Chen Z. An Implicit Identity Authentication S ystem Considering Changes of Gesture Based on Keystroke Behaviors[J]. International Journal of Distributed Sensor Networks, 2015:1-16.
[18] L Lin,L Xu(许力),S Zhou(周书明),SY Hsieh. The t/k-Diagnosability for Regular Networks[J]. IEEE Transactions on Computers, 2015, 65(10):1-1. ( SCI-III )
[19] Y Zeng,L Xu(许力),Z Chen. Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks[J]. Sensors, 2015, 16(1):3. ( SCI-III )
[20] Lin H, Hu J, Huang C, et al. Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks[J]. International Journal of Distributed Sensor Networks, 2015:1-12.
[21] Zhifan Y E, Pinhui K E, Zhang S, et al. Zero-Difference Balanced Function Derived from Fermat Quotients and Its Applications[J]. Ieice Transactions on Fundamentals of Electronics Communications & Computer Sciences, 2015, E98.A(11):2336-2340.
[22] Zhifan Y E, Pinhui K E, Zhang S, et al. Some Notes on Pseudorandom Binary Sequences Derived from Fermat-Euler Quotients[J]. Ieice Transactions on Fundamentals of Electronics Communications & Computer Sciences, 2015, E98.A(10):2199-2202.
[23] Chen L F. A probabilistic framework for optimizing projected clusters with categorical attributes[J]. Sciece China Information Sciences, 2015, 58(7):1-15.
[24] Zhang J, Li X, Zhou S, et al. A novel sleep scheduling scheme in green wireless sensor networks[J]. Journal of Supercomputing, 2015, 71(3):1067-1094.
[25] Song S, Li X, Zhou S, et al. Fault tolerance and diagnosability of burnt pancake networks under the comparison model[J]. Theoretical Computer Science, 2015,582:48–59.
[26] Zhang J, Zhou S M, Xu L, et al. An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube[J]. International Journal of Applied Mathematics & Computer Science, 2015,25(2):295-309.
[27] Xiaoding Wang, Li Xu, Shuming Zhou, Joseph K. Liu. A Resolving Set Based Algorithm for Fault Identification in Wirless Mesh Networks[J]. Journal of Universal Computer Science, 2015,21(3):384-405.
[28] Xu L, Chen X, Li J, et al. Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis[J]. Telecommunication S ystems, 2015,60(1):149-158.
[29] Wang X, Xu L, Zhou S. Restoration Strategy Based on Optimal Relay Node Placement in Wireless Sensor Networks[J]. International Journal of Distributed Sensor Networks, 2015(8):1-13.
[30] Lin L , Xu L , Zhou S . Conditional diagnosability and strong diagnosability of shuffle-cubes under the comparison model[J]. International Journal of Computer Mathematics, 2015, 92(2):230-249.
[31] A-Yong Y E , Shao-Cong L , Jian-Feng M A , et al. An Active Diffusion Based Location Privacy Protection Method[J]. Acta Electronica Sinica, 2015, 43(7):1362-1368.
[32] Changlu Lin, Yong Li, Kewei Lv, Chin-Chen Chang. Ciphertext-auditable identity based encryption[J]. International Journal of Network Security, 2015,17(1): 23-28.
[33] Ma J, Chen Z, Wu W, et al. Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies[J]. Information, 2015,6(3):536-549.
[34] M Li,X Huang,JK Liu,L Xu,W Wu. Cooperative attribute-based access control for enterprise computing s ystem[J]. International Journal of Embedded S ystems, 2015,7(3):191-202.
[35] Lin H , Hu J , Liu J , et al. A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing[C] // IEEE International Conference on Computer & Information Technology; Ubiquitous Computing & Communications; Dependable. IEEE, 2015.
[36] X Yang,W Wu,JK Liu,X Chen. Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach[C] // In ProvSec 2015, Lecture Notes in Computer Science 2015,9451:215-226.
[37] Xia Y , Lin H , Xu L . An AGV Mechanism Based Secure Routing Protocol for Internet of Things[C] // 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). IEEE, 2015.
[38] Lin H , Hu J , Huang C , et al. A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks[C] // 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). IEEE, 2015.
[39] Lin C , Luo F , Wang H , et al. A Provable Data Possession Scheme with Data Hierarchy in Cloud[C] // Information Security and Cryptology. Springer International Publishing, 2015.
[40] Wang F , Xu L , Pan J S . Security Analysis on Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model[C]// 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2015.
[41] Ye Z , Ke P , Chen Z . Further results on pseudorandom binary sequences derived from Fermat-Euler Quotients[C]// International Conference on Information. IEEE, 2015. 55.T Wu,Y Fan,Z Hong,L Chen(陈黎飞). Subspace Clustering on Mobile Data for Discovering Circle of Friends. Lecture Notes in Computer Science, 2015.
[42] 汪晓丁,许力,周书明, 等.基于Voronoi图和定位集的故障诊断和修复策略[J].通信学报,2015,36(Z1):103-109.
[43] 陈智勤,李成进,张圣贵.物流管理中的图分割问题[J].应用数学学报,2015,38(2):356-365.
[44] 林晖,田有亮,许力, 等.HWMN中一种新的隐私感知安全路由协议[J].计算机研究与发展,2015,(8):1883-1892.
[45] 胡丽莹,郭躬德,马昌凤.基于对称非负矩阵分解的重叠社区发现方法[J].计算机应用,2015,35(10):2742-2746.
[46] 陈旖, 许力, 张美平. 适用于大规模无线传感器网的流量优化系统设计[J]. 计算机应用, 2015, 35(4):905-909.
[47] 林崧,王宁,郭躬德, 等.具有双向认证功能的多方量子密钥分发[J].中国科学(物理学 力学 天文学),2015,45(4):47-54.
[48] 叶立淼,陈庆华.混合指数几何分布[J].统计研究,2015,32(7):106-112.
[49] 赖智铭,郭躬德.基于滑动窗口和蚁群优化算法的二次路径规划算法[J].计算机应用,2015,35(1):172-178.
[50] 林新棋,李海涛,林云玫.基于多尺度互信息量的数字视频帧篡改检测[J].计算机工程,2015,(4):246-252.
[51] 林新棋, 林云玫, 林志新,等. 基于纹理谱的视频帧间篡改检测[J].计算机工程, 2015, 41(11):314-321.
[52] 余勇,郭躬德.基于矩阵分解模型的微博好友推荐算法[J].计算机系统应用,2015,24(12):133-141.
[53] 叶锋,傅燕云,陈林芳, 等.基于多协议融合的实时移动视频监控系统[J].计算机系统应用,2015,(4):80-85.
[54] 陈家祯, 郑子华, 叶锋,等. 多重虚拟三维物体菲涅耳全息水印方法[J]. 计算机系统应用, 2015, 24(8):33-39.
[55] 陈家祯,郑子华,叶锋, 等.数字全息图可控再现菲涅耳计算全息水印方法[J].激光与光电子学进展,2015,52(12):72-79.
[56] 张豪, 陈黎飞, 郭躬德. 规范化相似度的符号序列层次聚类[J].计算机科学, 2015, 42(5):114-118.
[57] 郭彦明,陈黎飞,郭躬德.DNA序列的二阶隐马尔科夫模型分类[J].计算机系统应用,2015,(9):22-28.
[58] 杨婷婷, 林昌露, 刘忆宁,等. 基于多方排序协议的安全电子投票方案[J].计算机系统应用, 2015, 24(8):25-32.
[59] 王宁,林崧.基于最低有效位的量子图像水印[J].量子电子学报,2015,32(3):263-269.
[60] 王宁,郭躬德,林崧.基于Greenberger-Horne-Zeilinger态的量子公平盲签名方案[J].小型微型计算机系统,2015,36(3):520-523.
[61] 罗芬芬, 林昌露, 张胜元,等. 基于FOO投票协议的无收据电子投票方案[J]. 计算机科学, 2015, 42(8):180-184.
[62] 蒋欣, 王开军, 陈黎飞. 基于改进余弦相似度的粒子滤波故障预报[J].计算机系统应用, 2015, 24(1):98-103.
[63] 黄波,严宣辉,林建辉.基于有向图分割的推荐算法[J].计算机系统应用,2015,24(12):196-203.
[64] 白猛,严宣辉,吴坤安,陈振兴. 混合分解的多目标粒子群优化算法[J].计算机系统应用,2015(12):215-222.
[65] 许力, 黄毅杰, 林晖. 分布式协作频谱感知的信誉模型[J].北京邮电大学学报, 2015, 38(4):53-57.
[66] 陈旖,张美平,许力.WSN应用层协议MQTT-SN与CoAP的剖析与改进[J].计算机系统应用,2015,(2):229-234.
[67] 张美平, 许力. 基于ZigBee的物联网环境数据采集与控制系统[J].计算机系统应用, 2015(2):59-64.
[68] 余勇, 郭躬德. 基于RBLDA模型和交互关系的微博标签推荐算法[J].计算机系统应用, 2015, 24(8):141-148.
[69] 卢伟胜, 郭躬德. 基于特定话题的微博意见领袖在线检测方法[J].计算机应用与软件, 2015, 32(5):70-74.
[70] 詹晓珊, 林新棋, 孔祥增,等. CUSUM算法在NOAA卫星数据震前异常分析中的应用[J].计算机应用与软件, 2015(2):232-235.
[71] 杨婷婷,林昌露,张胜元.安全的多候选人电子投票方案的改进[J].福建师范大学学报(自然科学版),2015,31(3):32-38.
[72] 邵剑飞,叶阿勇.基于位置连续性的室内定位算法[J].福建师范大学学报(自然科学版),2015,31(3):17-25.
[73] 夏有华,许力,林晖, 等.一种基于VCG机制的物联网安全路由协议[J].福建师范大学学报(自然科学版),2015,31(5):21-28.

 
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学)  
邮编:350007  联系电话:0591-83456050转406   
访问量:
158962020年11月04日