[1] Xu L , Zhang Y . Matrix-based pairwise key establishment for wireless mesh networks[J]. Future Generation Computer s ystems, 2014, 30:140-145.
[2] Lian Y , Huang X , Mu Y . SA3: Self-adaptive anonymous authentication for dynamic authentication policies[J]. Future Generation Computer s ystems, 2014, 30:133-139.
[3] Huang X , Chen X , Li J , et al. Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed s ystems[J]. IEEE Transactions on Parallel and Distributed s ystems, 2014, 25(7):1767-1775.
[4] Huang X , Xiang Y , Bertino E , et al. Robust Multi-Factor Authentication for Fragile Communications[J]. IEEE Transactions on Dependable and Secure Computing, 2014, 11(6):568-581.
[5] Xu Li, He Yuan, Chen XiaoFeng, and XinYi Huang. Ticket-based handoff authentication for wireless mesh networks[J]. Computer Networks, 2014, 73:185-194.
[6] Shi P , Huang Y , Hong J . Automated three-dimensional reconstruction and morphological analysis of dendritic spines based on semi-supervised learning[J]. Biomedical Optics Express, 2014, 5(5):1541.
[7] Lin S , Guo G , Gao F , et al. Quantum key distribution: defeating collective noise without reducing efficiency[J]. Quantum Information & Computation, 2014, 14(9&10):845-856.
[8] Xu Li, Elisa Bertino, and Yi Mu. Security of new generation computing s ystems[J]. Concurrency and Computation: Practice and Experience ,2014,26 (8): 1475-1476.
[9] He Yuan, Xu Li, and Wei Wu. A local joint fast handoff scheme in cognitive wireless mesh networks[J]. Security and Communication Networks,2014, 7 (2):455-465.
[10] Wu Wei, Huang Xinyi, Xu li, Mu Yi and Willy Susilo. An Efficient Construction of Convertible Undeniable Proxy Signatures[J]. Journal of Internet Technology, 2014,15 (3): 471-484.
[11] Peng S, Jinsheng H, Yue H, et al. Automated computational framework of blood vessel quantification in chick chorioallantoic membrane angiogenesis[J]. Journal of Biomedical Optics, 2014, 19(10):106005-106005.
[12] Lin L , Zhou S , Xu L , et al. Conditional diagnosability of arrangement graphs under the PMC model[J]. Theoretical Computer Science, 2014, 548:79-97.
[13] Lin S, Yu C H, Guo G D. Reexamining the security of fair quantum blind signature schemes[J]. Quantum Information Processing, 2014, 13(11):2407-2415.
[14] Lin H, Hu J, Ma J, et al. A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks[J]. Wireless Personal Communications, 2014, 75(3):1611-1633.
[15] Lin H, Hu J, Ma J, et al. CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks[J]. Computer Journal, 2014, 58(4).
[16] Lin L, Xu L, Zhou S, et al. Conditional diagnosability and strong diagnosability of Split-Star Networks under the PMC model[J]. Theoretical Computer Science, 2014, 562(C):565-580.
[17] Yu Chaohua, Guo Gongde, and Song Lin. Arbitrated quantum signature scheme based on reusable key[J]. Science China Physics, Mechanics & Astronomy, 2014, 57(11):2079-2085.
[18] Chen Lanxiang, Guo Gongde, and Zhen Peng.A hill cipher-based remote data possession checking in cloud storage[J]. Security and Communication Networks, 2014, 7(3):511-518.
[19] Chen Zhide, Qiu Yihui, Qiao Cheng, Xu Li and Wei Wu. Dynamics stability in wireless sensor networks active defense model[J]. Journal of Computer and s ystem Sciences, 2014, 80(8):1534-1548.
[20] Harn Lein, and Changlu Lin.Efficient group Diffie–Hellman key agreement protocols[J]. Computers & Electrical Engineering, 2014, 40(6):1972-1980.
[21] Hou S , Huang X , Xu L . Identity-based transitive signcryption[C]// International Conference on Network & s ystem Security. Springer, Cham, 2014.
[22] Lifei Chen, Gongde Guo, Shengrui Wang, Xiangzeng Kong: Kernel learning method for distance-based classification of categorical data[C]// 2014 14th UK Workshop on Computational Intelligence (UKCI).
[23] Yao C, Xu L, Huang X, et al. A secure remote data integrity checking cloud storage s ystem from threshold encryption[J]. Journal of Ambient Intelligence & Humanized Computing, 2014, 5(6):857-865.
[24] Wang K. Asynchronous standard deviation method for fault detection[C]// Prognostics and s ystem Health Management Conference (PHM-2014 Hunan), 2014. IEEE, 2014:233 - 236.
[25] Li M, Huang X, Liu J K, et al. GO-ABE: Group-Oriented Attribute-Based Encryption[M]// Network and s ystem Security. Springer International Publishing, 2014:260-270.
[26] Chen Lifei, and Gongde Guo.Centroid-Based Classification of Categorical Data. Web-Age Information Management. Springer International Publishing, 2014. 472-475.
[27] Li Xiaoyan, Lu Lishan, and Shuming Zhou. Conditional Diagnosability of Twisted-Cube Connected Networks[C]//Proceedings of International Conference on Computer Science and Information Technology. Springer India, 2014: 359-370.
[28] Chen l, Kong X. A Lifting Wavelet Watermarking Algorithm Based on Clustering and Digital Hologram.International Symposium on Fuzzy s ystems[C]//Knowledge Discovery and Natural Computation(FSKDNC 2014),2014(1):556-563.
[29] 李瑞芳,柯品惠.一类新的周期为2pq的二元广义分圆序列的线性复杂度[J].电子与信息学报,2014,(3):650-654.
[30] 柯品惠,陈浩源.无碰撞区跳频序列集的进一步构造[J].北京邮电大学学报,2014,(2):38-42.
[31] 柯品惠,李瑞芳,张胜元.一类新的周期为 pm+1qn+1的二元广义分圆序列的线性复杂度[J].电子学报,2014,(5):1009-1013.
[32] 叶阿勇,李亚成,马建峰, 等.基于服务相似性的k-匿名位置隐私保护方法[J].通信学报,2014,35(11):162-169.
[33] 张美平, 谷雨, 许力. 无线传感器网络单基站调度算法[J].计算机应用, 2014,34(7): 1941-1946.
[34] 龚平 冯在文. 基于标注的业务过程合规性验证方法[J].计算机应用, 2014,34(7): 2115-2123.
[35] 吴坤安, 严宣辉, 陈振兴, 等.混合分散搜索的进化多目标优化算法[J].计算机应用, 2014, 34(10): 2874-2879.
[36] 林晖, 马建峰, 许力. MWNs 中基于跨层动态信誉机制的安全路由协议[J].计算机研究与发展, 2014, 51(7): 1486-1496.
[37] 吴涛, 陈黎飞, 郭躬德.优化子空间的高维聚类算法[J].计算机应用, 2014, 34(8): 2279-2284.
[38] 彭真 陈兰香 郭躬德.云存储中基于喷泉码的数据恢复系统[J]. 计算机应用, 2014, 34(4): 986-993.
[39] 郭躬德,李南,陈黎飞.一种基于混合模型的数据流概念漂移检测算法[J].计算机研究与发展,2014,51(4):731-742.
[40] 卢伟胜, 郭躬德, 陈黎飞.基于词性标注序列特征提取的微博情感分类[J].计算机应用, 2014, 34(10): 2869-2873.
[41] 严宣辉, 郭躬德.基于簇间分离性的稀有类识别算法[J].2014,27(6):502-508.
[42] 罗晓晴,李世唐,许力.在无线双向通信中基于CRC-NC抵抗污染攻击方案[J].信号处理,2014,(11):1357-1362.
[43] 方禾, 许力, 章静, 等.Ad-Hoc 网络中基于可能性博弈的拓扑控制策略[J].小型微型计算机系统, 2014, 35(008): 1761-1765.
[44] 赖智铭, 郭躬德.基于自适应阈值蚁群算法的路径规划算法[J]. 计算机系统应用, 2014, 23(2): 113-118.
[45] 宋苏琳,林丽美,周书明.Pancake网络的t/k-诊断度及其算法[J].运筹学学报,2014,18(4):65-77.
[46] 林新棋.基于改进模糊综合评价的电影情感分类[J].计算机科学, 2014, 41(2):161-165.
[47] 吴宏和, 陈黎飞, 郭躬德.一种事件序列的加权变阶马尔可夫模型[J].计算机工程, 2014, 40(4): 175-181.
[48] 郭彦明, 陈黎飞, 郭躬德.基于隐马尔科夫模型的 DNA 序列分类方法[J].计算机系统应用, 2014, 23(7): 24-30.
[49] 余勇, 郭躬德, 陈黎飞.基于多代表点学习的 RSKNN 分类算法[J].计算机系统应用, 2014, 23(11): 92-98.
[50] 吁超华, 郭躬德, 林崧.无纠缠的量子秘密比较[J].小型微型计算机系统, 2014, 35(5): 1061-1064.
[51] 卢伟胜, 郭躬德, 严宣辉, 等.SMwKnn: 基于类别子空间距离加权的互 k近邻算法[J].计算机科学, 2014, 41(2): 166-169.
[52] 江伟坚, 郭躬德.复杂环境下高效物体跟踪级联分类器[J].中国图象图形学报, 2014, 19(2): 253-265.
[53] 严晓明.基于类别平均距离的加权 KNN 分类算法[J].计算机系统应用, 2014, 23(2): 128-132.
[54] 杨洪, 许力, 章静.无线传感器网络中容错虚拟骨干网构造算法[J].小型微型计算机系统, 2014(12):2612-2616.
[55] 吴涛, 陈黎飞.自适应熵的投影聚类算法[J].计算机科学与探索, 2014, 8(8):933-944.
[56] 周赵斌,许力,李世唐, 等.一种抗窃听和污染攻击的网络编码方案[J].福建师范大学学报(自然科学版),2014,30(2):42-48.
[57] 林超君,林丽美,许力, 等.DTN中基于二分图的路由选择[J].福建师范大学学报(自然科学版),2014,30(6):33-39.
[58] 高智, 林新棋, 吴鹏, 等. 基于分层筛选方法的前景图像去噪[J]. 数据采集与处理, 2014, 29(1): 76-82.
[59] 余望鸿,柯品惠.基于正交矩阵偶构造低相关区序列偶集[J].福建师范大学学报(自然科学版),2014,30(2):7-12.
[60] 吴鹏,林新棋,李海涛, 等.基于颜色纹理和SVM的体育视频分类[J].福建师范大学学报(自然科学版),2014,30(2):34-41.
[61] 李海涛,林新棋,吴鹏, 等.基于颜色内容一致性的视频篡改检测[J].福建师范大学学报(自然科学版),2014,30(2):26-33.
[62] 罗晓晴,李世唐,许力.一种有效的抗污染攻击的网络编码认证码方案[J].福建师范大学学报(自然科学版),2014,30(5):19-26.
[63] 柯品惠, 林昌露, 张胜元.具有低自相关性质的奇周期四元序列的线性复杂度.The Journal of China University of Posts and Telecommunications,21(5):89-93.
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学) |
邮编:350007 联系电话:0591-83456050转406 |
访问量:
158962020年11月04日
|