[1]张健飞,陈黎飞,郭躬德.Projected-prototype based classifier for text categorization[J].Knowledge Based System. 2013, 49: 179–189.(sci-II)
[2]周书明,徐俊明Fault diagnosability of arrangement graphs[J].INFORMATION SCIENCES, 2013, 246: 177-190.(sci-II)
[3]陈兰香.Using algebraic signatures to check data possession in cloud storage[J].Future Generation Computer Systems, 2013, 29 (7):1709-1715.(sci-II)
[4]伍玮,许力,Xiang Yang,Jianying Zhou.How to achieve non-repudiation of origin with privacy protection in cloud computing[J].Journal of Computer and System Sciences 79(8) 2013: 1200-1213.(sci-III)
[5]林崧,姚志强,刘晓芬,孙莹.Quantum private comparison protocol with d-dimensional Bell states[J].QUANTUM INFORMATION PROCESSING, 2013, 12: 559-568.(sci-III)
[6]Wang Yi, Guo Gongde, and Lifei Chen. Chaotic Artificial Bee Colony algorithm:A new approach to the problem of minimization of energy of the 3D protein structure[J]. Molecular Biology,2013,47(6): 894-900.
[7]Yu Chaohua, Guo Gongde, and Song Lin. Quantum secure direct communication with authentication using two nonorthogonal states[J]. International Journal of Theoretical Physics,2013,52 (6): 1937-1945.
[8]Yu Chaohua, Guo Gongde, and Song Lin.Quantum private comparison with d-level single-particle states[J]. Physica Scripta 2013,88 (6): 65013-65018.
[9]Chen Zhide, and Yali Zeng.Random Access Control for M2M in LTE System[J]. International Journal of Distributed Sensor Networks 2013.
[10]Xu Li, Zhang Yuexin, Cao Xi and Wei Wu. Software Service Signature (S 3 ) for authentication in cloud computing[J]. Cluster Computing, 2013, 16(4):905-914.
[11]高建梁,闵革勇,胡嘉,许力.Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic.Concurrency and Computation: Practice and Experience, Wiley Press, 2013,25(1): 85-93 .(sci-IIII)
[12]陈志德,许力,曾燕清.A Supermodular Game Framework for Power Control of Wireless Sensor Networks .INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS. volume 2013,Article ID 792315,7pages.(sci-IIII)
[13]林崧,郭躬德,刘晓芬.Quantum Private Comparison of Equality with chi-Type Entangled States[J].INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52: 4185-4194.(sci-IIII)
[14]林崧,郭躬德.Cryptanalysis the Security of Enhanced Multiparty Quantum Secret Sharing of Classical Messages by Using EntanglementSwapping[J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52: 3238-3243.(sci-IIII)
[15]林崧,黄川,刘晓芬.Multi-user quantum key distribution based on Bell states with mutual authentication[J].PHYSICA SCRIPTA, 2013, 87: 035008.(sci-IIII)
[16]叶阿勇,杨小亮,许力,凌远景.An Improved RFID-Based Localization Algorithm for Wireless Sensor Networks[J].INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,2013,v2013(1):1:8.(sci-IIII)
[17]林崧,刘晓芬. A Modified Quantum Key Distribution Without Public Announcement Bases Against Photon-Number-Splitting Attack[J].INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2012, 51:2514–2523.(sci-IIII)
[18]Zhou S, Lin L, Xu L, et al. The t/k Diagnosability of Star Graph Networks[J]. IEEE Transactions on Computers, 2013, 64:1.
[19]柯品惠,张劼,张胜元.On the linear complexity and the autocorrelation of generalized cyclotomic binary sequences of length 2p (m)[J].Designs, Codes and Cryptography, 2013, 67(3): 325-339.(sci-IIII)
[20]张胜元,柯品惠,林昌露,唐飞.Provably Secure Self-Certified Signature Schemes with Message Recovery[J].CHINA COMMUNICATIONS.2012, 9(10):112-119.(sci-IIII)
[21]周书明,陈兰香,徐俊明.CONDITIONAL FAULT DIAGNOSABILITY OF DUAL-CUBES[J].NTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE,2012,23(8): 1729-1747.(sci-IIII)
[22]书明,林丽美,徐俊明.Conditional fault diagnosis of hierarchical hypercubes[J].INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89(16): 2152-2164.(sci-IIII)
[23]柯品惠,余望鸿,常祖领.A note on binary sequence pairs with two-level correlation[J].INFORMATION PROCESSING LETTERS,2013, 113: 811-814.(sci-IIII)
[24]刘晓芬,潘日晶,陈荔聪.Improving the security of n-user quantum key distribution with n quantum channels. Proceedings of the 2012 International Conference on Computer Application and System Modeling, ICCASM 2012. 2012:0433-0435.
[25]林昌露,李勇,Sriramkrishnan Srinivasan,鲁力. Analysis on token-controlled public key encryption. oceedings - 2012 8th International Conference on Mobile Ad Hoc and Sensor Networks, MSN 2012. pp. 2012: 113-117.
[27]周书明,王健,徐喜容,徐俊明. Conditional fault diagnosis of bubble sort graphs under the PMC Model. Intelligence Computation and Evolutionary Computation, 2012, 180:53-59.
[28]陈兰香,黄欣沂,周书明,许力.Data Dynamics for Remote Data Possession Checking in Cloud Storage.Computers & Electrical Engineering, 2013, 39(7):2413-2424.
[29]陈兰香,彭真.The design principles for user-centered remote data possession checking. CIS, 17-18, November, 2012:615-618.
[30]彭真,陈兰香,郭躬德. Method of fountain code based privacy protection and data recovery.华中科技大学学报(自然科学版),2012, 40(355S1):54-57.(EI)
[31]肖国宝,严宣辉.A New Cooperative Multi-Robot Path Planning in Dynamic Environment.The International Conference on Automatic Control and Artificial Intelligence.March 2012.Xiamen,China .(EI)
[32]陈黎飞,郭躬德,王声瑞. Nearest neighbor classification by partially fuzzy clustering. Proceeding of the AINA Workshops, 2012:789-796.(EI)
[33]陈黎飞,严宣辉,王声瑞. Centroid-based clustering for graph datasets.Proceeding of the ICPR. 2012:2144-2147.(EI)
[34]陈丽萍,孔祥增,曾晶,林新棋,郑之,詹晓珊,潘雄.The application of cumulative sum feature extraction algorithm in data stream anomaly analysis before earthquake.Advanced Materials Research,厦门,2013,8: 524-527.(EI)
[35]张仕,蒋建民.Research on type-safety parallel update . Lecture Notes in Electrical Engineering. 2012, 125(2):245-251 .(EI)
[36]陈智勤,陈志德,刘晶晶,邹阳.Spectrum sensing and auction in the cognitive radios network.Journal of Computational Information Systems .2013,9(14): 5577-5584.(EI)
[37]陈志德,陈智勤,刘晶晶,邹阳.Local stability in wireless network.Journal of Computational Information Systems, 2013, 9(14): 5569-5576.(EI)
[38]许力,Bertino, Elisa,穆怡.Security of new generation computing systems.Concurrency Computation Practice and Experience,DOI: 10.1002/cpe.3128,2013.(EI)
[39]许力,汪晓丁,潘鹏贵,伍玮. Physical-layer network coding and connected dominating set based routing protocol in wireless multi-hop network.. 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012 :259-263, IEEE Press.(EI)
[40]杨小雪,周书明. On conditional fault tolerant of dual-cubes. International Journal of Parallel, Emergent and Distributed Systems, 2013, 28(3): 199-213.(EI)
[41]陈志德,乔成,许力,伍玮.Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.Concurrency Computation Practice and Experience.(EI)
[42]龚平,陈智勤,蒋建民,张仕. Executability analysis for semantically annotated process model. IEEE Computer Society .2012:117-124.(EI)
[43]曹夕,张跃欣,许力,伍玮. Identity-based proxy signature for cloud service in SaaS. 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012,pp.594-599, IEEE Press.(EI)
[44]龚平. Compliance checking for semantically annotated process model. Int. J. Digit. Content Technol. Appl. 2013,6(21):670-679,(EI)
[45]林昌露. Identity-Based Cryptography on Hidden-Order Groups . Procedia Engineering.2012,29:2067-2071(EI)
[47]郭躬德,李南. Classification for concept-drifting data streams with limited amount of labeled data. the international conference on automatic control and artificial intelligence, march 24 to 26, 2012 in Xiamen, China. 4259-4265, IET.(EI)
[48]李南,郭躬德,陈黎飞. Optimal subspace classification method for complex data. international journal of machine learning and cybernetics, 2013, 4(2):163-171.(EI)
[49]龚平. Formal dynamic semantics for semantically annotated process model. Journal of Convergence Information Technology. 2012,7(20):167 -174(EI)
[50]郭躬德,陈思. Soft Subspace Clustering with an Improved Feature Weight Self-Adjustment Mechanism. international journal of machine learning and cybernetics, 2012,3(1):39-49.(EI)
[51]陈志德,王孟,邵磊,邵连.A clustering method based on attribute and weight in microblog.Journal of Computational Information Systems . Journal of Computational Information Systems.2013,9(14):5719-5726(EI)
[52]Zhang Jing, Zhou Shuming, Xu Li ,and Wei Wu.Constructing Connected Dominating Set Based on Crossed Cube in WSN[C]// Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on. IEEE, 2013.(EI)
[53]Lu Lishan, and Shuming Zhou. Conditional Diagnosability of Complete Josephus Cubes[M]// Network and Parallel Computing. Springer Berlin Heidelberg, 2013. 220-231.
[54]Chen Lifei. EM-type method for measuring graph dissimilarity[J]. International Journal of Machine Learning and Cybernetics, 2013, 5(4).(EI)
[55]Chen Lifei, and Shengrui Wang. Central clustering of categorical data with automated feature weighting[C]//Proceedings of the Twenty-Third international joint conference on Artificial Intelligence. AAAI Press, 2013.(EI)
[56]Lian Yanling, Xu Li, and Xinyi Huang. Attribute-Based Signatures with Efficient Revocation[C]//Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on. IEEE, 2013.(EI)
[57]Zhang Yuexin, Huang Xinyi, and Li Xu.Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks[C]// Innovative Mobile and Internet Services in Ubiquitous Computing(IMIS), 2013 Seventh International Conference on. IEEE, 2013.
[58]Zhang Yuexin, Huang Xinyi, Xu Li, and Yang Xiang. Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge[C]//Communications (ICC), 2013 IEEE International Conference on. IEEE, 2013.(EI)
[59]Wu Shengyan, Lin Changlu, and Li Xu. Fully Distributed Multi-authority Cloud Storage Model. Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on. IEEE, 2013.(EI)
[60]Tang Fei, Lin Changlu, and Hongda Li. ID-Based Signcryption with Restrictive Unsigncryption. Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on. IEEE, 2013.(EI)
[61]叶锋,郑子华. Medicinal plant specimen recognition based on multi-features fusion.中南大学学报(增刊).201,9(42):656-661.(EI)