发布时间:2019-05-24   浏览次数:216

[1]张健飞,陈黎飞,郭躬德.Projected-prototype based classifier for text categorization[J].Knowledge Based System. 2013, 49: 179–189.sci-II

[2]周书明,徐俊明Fault diagnosability of arrangement graphs[J].INFORMATION SCIENCES, 2013, 246: 177-190.sci-II

[3]陈兰香.Using algebraic signatures to check data possession in cloud storage[J].Future Generation Computer Systems, 2013, 29 (7):1709-1715.sci-II

[4]伍玮,许力,Xiang Yang,Jianying Zhou.How to achieve non-repudiation of origin with privacy protection in cloud computing[J].Journal of Computer and System Sciences 79(8) 2013: 1200-1213.sci-III

[5]  林崧,姚志强,刘晓芬,孙莹.Quantum private comparison protocol with d-dimensional Bell states[J].QUANTUM INFORMATION PROCESSING, 2013, 12: 559-568.sci-III

[6]Wang Yi, Guo Gongde, and Lifei Chen. Chaotic Artificial Bee Colony algorithm:A new approach to the problem of minimization of energy of the 3D protein structure[J]. Molecular Biology,2013,47(6): 894-900.

[7]  Yu Chaohua, Guo Gongde, and Song Lin. Quantum secure direct communication with authentication using two nonorthogonal states[J]. International Journal of Theoretical Physics,2013,52 (6): 1937-1945.

[8]Yu Chaohua, Guo Gongde, and Song Lin.Quantum private comparison with d-level single-particle states[J]. Physica Scripta 2013,88 (6): 65013-65018.

[9]Chen Zhide, and Yali Zeng.Random Access Control for M2M in LTE System[J]. International Journal of Distributed Sensor Networks 2013.

[10]Xu Li, Zhang Yuexin, Cao Xi and Wei Wu. Software Service Signature (S 3 ) for authentication in cloud computing[J]. Cluster Computing, 2013, 16(4):905-914.

[11]高建梁,闵革勇,胡嘉,许力.Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic.Concurrency and Computation: Practice and Experience, Wiley Press, 2013,25(1): 85-93 .sci-IIII

[12]陈志德,许力,曾燕清.A Supermodular Game Framework for Power Control of Wireless Sensor Networks .INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS. volume 2013,Article ID 792315,7pages   .sci-IIII

[13]林崧,郭躬德,刘晓芬.Quantum Private Comparison of Equality with chi-Type Entangled States[J].INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52: 4185-4194.  sci-IIII

[14]林崧,郭躬德.Cryptanalysis the Security of Enhanced Multiparty Quantum Secret Sharing of Classical Messages by Using EntanglementSwapping[J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52: 3238-3243.sci-IIII

[15]林崧,黄川,刘晓芬.Multi-user quantum key distribution based on Bell states with mutual authentication[J].PHYSICA SCRIPTA, 2013, 87: 035008.sci-IIII

[16]叶阿勇,杨小亮,许力,凌远景.An Improved RFID-Based Localization Algorithm for Wireless Sensor Networks[J].INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,2013,v2013(1):1:8.sci-IIII

[17]林崧,刘晓芬. A Modified Quantum Key Distribution Without Public Announcement Bases Against Photon-Number-Splitting Attack[J].INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2012, 51:2514–2523.sci-IIII

[18]Zhou S, Lin L, Xu L, et al. The t/k Diagnosability of Star Graph Networks[J]. IEEE Transactions on Computers, 2013, 64:1.

[19]柯品惠,张劼,张胜元.On the linear complexity and the autocorrelation of generalized cyclotomic binary sequences of length 2p (m)[J].Designs, Codes and Cryptography, 2013, 67(3): 325-339.sci-IIII

[20]张胜元,柯品惠,林昌露,唐飞.Provably Secure Self-Certified Signature Schemes with Message Recovery[J].CHINA COMMUNICATIONS.2012, 9(10):112-119.sci-IIII

[21]周书明,陈兰香,徐俊明.CONDITIONAL FAULT DIAGNOSABILITY OF DUAL-CUBES[J].NTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE,2012,23(8): 1729-1747.sci-IIII

[22]书明,林丽美,徐俊明.Conditional fault diagnosis of hierarchical hypercubes[J].INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89(16): 2152-2164.sci-IIII

[23]柯品惠,余望鸿,常祖领.A note on binary sequence pairs with two-level correlation[J].INFORMATION PROCESSING LETTERS,2013, 113: 811-814.sci-IIII

[24]刘晓芬,潘日晶,陈荔聪.Improving the security of n-user quantum key distribution with n quantum channels. Proceedings of the 2012 International Conference on Computer Application and System Modeling, ICCASM 2012. 2012:0433-0435.

[25]林昌露,李勇,Sriramkrishnan Srinivasan,鲁力. Analysis on token-controlled public key encryption. oceedings - 2012 8th International Conference on Mobile Ad Hoc and Sensor Networks, MSN 2012. pp. 2012: 113-117.

[26]许力,张跃欣.Matrix-based pairwise key establishment for wireless mesh networks[J].Future Generation Computer SystemsDOI:10.1016/j.future. 2013.06.031.

[27]周书明,王健,徐喜容,徐俊明. Conditional fault diagnosis of bubble sort graphs under the PMC Model. Intelligence Computation and Evolutionary Computation, 2012, 180:53-59.

[28]陈兰香,黄欣沂,周书明,许力.Data Dynamics for Remote Data Possession Checking in Cloud Storage.Computers & Electrical Engineering, 2013, 39(7):2413-2424.

[29]陈兰香,彭真.The design principles for user-centered remote data possession checking. CIS, 17-18, November, 2012:615-618.

[30]彭真,陈兰香,郭躬德. Method of fountain code based privacy protection and data recovery.华中科技大学学报(自然科学版)2012, 40(355S1):54-57.EI

[31]肖国宝,严宣辉.A New Cooperative Multi-Robot Path Planning in Dynamic Environment.The International Conference on Automatic Control and Artificial Intelligence.March 2012.Xiamen,China .EI

[32]陈黎飞,郭躬德,王声瑞. Nearest neighbor classification by partially fuzzy clustering. Proceeding of the AINA Workshops, 2012:789-796.EI

[33]陈黎飞,严宣辉,王声瑞. Centroid-based clustering for graph datasets.Proceeding of the ICPR. 2012:2144-2147.EI

[34]陈丽萍,孔祥增,曾晶,林新棋,郑之,詹晓珊,潘雄.The application of cumulative sum feature extraction algorithm in data stream anomaly analysis before earthquake.Advanced Materials Research,厦门,2013,8: 524-527.EI

[35]张仕,蒋建民.Research on type-safety parallel update . Lecture Notes in Electrical Engineering. 2012, 125(2):245-251 .EI

[36]陈智勤,陈志德,刘晶晶,邹阳.Spectrum sensing and auction in the cognitive radios network.Journal of Computational Information Systems .2013,9(14): 5577-5584.EI

[37]陈志德,陈智勤,刘晶晶,邹阳.Local stability in wireless network.Journal of Computational Information Systems, 2013, 9(14): 5569-5576.EI

[38]许力,Bertino, Elisa,穆怡.Security of new generation computing systems.Concurrency Computation Practice and ExperienceDOI: 10.1002/cpe.3128,2013.EI

[39]许力,汪晓丁,潘鹏贵,伍玮. Physical-layer network coding and connected dominating set based routing protocol in wireless multi-hop network.. 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012 :259-263, IEEE Press.EI

[40]杨小雪,周书明. On conditional fault tolerant of dual-cubes. International Journal of Parallel, Emergent and Distributed Systems, 2013, 28(3): 199-213.EI

[41]陈志德,乔成,许力,伍玮.Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.Concurrency Computation Practice and Experience.EI

[42]龚平,陈智勤,蒋建民,张仕. Executability analysis for semantically annotated process model. IEEE Computer Society .2012:117-124.EI

[43]曹夕,张跃欣,许力,伍玮. Identity-based proxy signature for cloud service in SaaS. 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012pp.594-599, IEEE Press.EI

[44]龚平. Compliance checking for semantically annotated process model. Int. J. Digit. Content Technol. Appl. 2013,6(21):670-679,EI

[45]林昌露. Identity-Based Cryptography on Hidden-Order Groups . Procedia Engineering.2012,29:2067-2071EI

[46]唐飞,林昌露,柯品惠. Universal designated verifier signcryption. NSS2012LNCS 7645, pp 126-134, 2012.EI

[47]郭躬德,李南. Classification for concept-drifting data streams with limited amount of labeled data. the international conference on automatic control and artificial intelligence, march 24 to 26, 2012 in Xiamen, China. 4259-4265, IET.EI

[48]李南,郭躬德,陈黎飞. Optimal subspace classification method for complex data. international journal of machine learning and cybernetics, 2013, 4(2):163-171.EI

[49]龚平. Formal dynamic semantics for semantically annotated process model. Journal of Convergence Information Technology. 2012,7(20):167 -174EI

[50]郭躬德,陈思. Soft Subspace Clustering with an Improved Feature Weight Self-Adjustment Mechanism. international journal of machine learning and cybernetics, 2012,3(1:39-49.EI

[51]陈志德,王孟,邵磊,邵连.A clustering method based on attribute and weight in microblog.Journal of Computational Information Systems . Journal of Computational Information Systems.2013,914:5719-5726EI

[52]Zhang Jing, Zhou Shuming, Xu Li ,and Wei Wu.Constructing Connected Dominating Set Based on Crossed Cube in WSN[C]// Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on. IEEE, 2013.EI

[53]Lu Lishan, and Shuming Zhou. Conditional Diagnosability of Complete Josephus Cubes[M]// Network and Parallel Computing. Springer Berlin Heidelberg, 2013. 220-231.

[54]Chen Lifei. EM-type method for measuring graph dissimilarity[J]. International Journal of Machine Learning and Cybernetics, 2013, 5(4).EI

[55]Chen Lifei, and Shengrui Wang. Central clustering of categorical data with automated feature weighting[C]//Proceedings of the Twenty-Third international joint conference on Artificial Intelligence. AAAI Press, 2013.EI

[56]Lian Yanling, Xu Li, and Xinyi Huang. Attribute-Based Signatures with Efficient Revocation[C]//Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on. IEEE, 2013.EI

[57]Zhang Yuexin, Huang Xinyi, and Li Xu.Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks[C]// Innovative Mobile and Internet Services in Ubiquitous Computing(IMIS), 2013 Seventh International Conference on. IEEE, 2013.

[58]Zhang Yuexin, Huang Xinyi, Xu Li, and Yang Xiang. Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge[C]//Communications (ICC), 2013 IEEE International Conference on. IEEE, 2013.EI

[59]Wu Shengyan, Lin Changlu, and Li Xu. Fully Distributed Multi-authority Cloud Storage Model. Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on. IEEE, 2013.EI

[60]Tang Fei, Lin Changlu, and Hongda Li. ID-Based Signcryption with Restrictive Unsigncryption. Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on. IEEE, 2013.EI

[61]叶锋,郑子华. Medicinal plant specimen recognition based on multi-features fusion.中南大学学报(增刊).201,9(42)656-661.EI

[62]陈黎飞,郭躬德.属性加权的类属型数据非模聚类.软件学报, 2013, 24(11):2628-2641.A类)

[63]陈浩源,柯品惠,张胜元.基于矩阵置换的最优无碰撞区跳频序列集的构造研究.计算机应用,2013, 33(11):3028-3031.A类)

[64]陈丽萍,林新棋,郑之,詹晓珊.基于滑动窗口的几何移动平均鞅算法在震前异常分析中的应用.计算机应用,2013,12:3608-3610.A类)

[65]刘芬,郭躬德.基于区间相似度的模糊时间序列预测算法.计算机应用,201333( 11):3052-3056.A类)

[66]吴胜艳,许力,林昌露.基于门限属性加密的安全分布式云存储模型.算机应用,2013,33(7):1880-1884, 1902.A类)

[67]杨小亮,叶阿勇,凌远景.基于阈值分类及信号强度加权的室内定位算法.计算机应用, 2013, 33(10): 2711-2714.A类)

[68]吴建宁,伍滨.构建基于小波熵的自训练半监督支持向量机分类模型评价老年人步态.中国生物医学工程学报.A类)

[69]刘芬,郭躬德.基于符号化聚合近似的时间序列相似性复合度量方法.计算机应用,201333( 1) : 192 -198.A类)

[70]石贤芝,张胜元,林昌露,唐飞.标准模型下高效的门限签名方案.计算机应用,201333(1):15-18.A类)

[71]林丽美,周书明,许力.交错群图AGnh-外连通度.高校应用数学学报,2013,28(4):37997[1].B类)

[72]吴铁浩,黄添强,袁秀娟,陈智文,苏伟峰.逆重心密度的半监督学习在视频篡改检测的应用.计算机系统应用, 2013,22(8):91-97.B类)

[73]苏立超,黄添强.基于单层双树小波变换和平滑零范数法的压缩感知图像重构.计算机科学, 2013,40(3):263-265.B类)

[74]陈智文,黄添强,袁秀娟,吴铁浩,苏伟峰.同源视频Copy-Move篡改检测及恢复.计算机系统应用, 2013,22(9):102-110.B类)

[75]章静,许力.Mesh网络中拓扑控制策略研究.小型微型计算机系统,2013341:140-144.B类)

[76]龚平,蒋建民,张仕.语义标识过程模型的可执行分析.小型微型计算机系统,2013 33 12):2618-2624.B类)

[77]刘晓芬,严宣辉,姚志强.可认证的多方量子秘密共享协议.小型微型计算机系统, 2012, 33(11): 2518-2521.B类)

[78]李翔宇,王开军,郭躬德.基于网格最小生成树的聚类算法选择.模式识别与人工智能, 2013,26(1):34-41.B类)

[79]范伟,周书明.分层立方体网络的容错性分析.高校应用数学学报,2013, 28(2):200-211.B类)

[80]张美平.基于STM32SN260的物联网数据采集与控制系统.计算机系统应用. 2013,22(11):86-89.B类)

[81]李云,胡珊.计算机组成原理实验教学的探究.实验室科学,2013,16(4):62-67.B类)

[82]胡小辉,黄川,许力.认知无线电网络中分布式频谱分配策略的研究.小型微型计算机系统,2013344:716-720.B类)

[83]许力,黄川,胡小辉.基于跨层议价博弈的认知无线电网络资源优化分配策略.小型微型计算机系统,20133410:2319-2323.B类)

[84]许力,陈江勇.基于遗传算法的数据流测试用例自适应生成算法.计算机系统应用,2013227:90-94.B类)

[85]肖国宝,严宣辉.一种新型协作多机器人路径规划算法.计算机科学,2013,40(4):217-220.B类)

[86]陈雪云,郭躬德,陈黎飞.GwMKnn:征对类属性数据加权的MKnn算法.计算机系统应用, 2013 ,22 (8:103-108.B类)

[87]兰天,郭躬德.基于RSKNN分类改进算法.计算机系统应用, 2013 ,22 (12 ):86-92.B类)

[88]郭玲玲,林昌露,张胜元.针对一类无证书签名方案的攻击及改进.计算机工程,201238(16): 134-137.B类)

[89]李富贵,黄添强,苏立超,苏伟峰.融合多特征的异源视频复制_粘贴篡改检测.山东大学学报2013, 43(4): 32-38.

[90]林丽美,周书明(n.k)-排列图的条件连通度.数学研究, 2012, 45(4)350-364.

[91]林丽美,周书明,许力.分层立方网络的t/t-诊断度和诊断算法.山东大学学报, 2012, 47(9): 45-50.

[92]肖国宝,严宣辉.一种基于改进theta *的机器人路径规划算法.智能系统学报,2013,8(1):58-65.

[93]石贤芝,张胜元,唐飞,林昌露.无可信中心下基于身份的门限签名方案.武汉大学学报(理工版),201359(2):137-142.

[94]李小燕,周书明,杨小雪.扭立方连接网络的故障诊断分析.福建师大学报, 2013, 29(5): 20-25.

[95]陈江勇,许力.Web自动化测试框架的设计与实现.福建师范大学学报(自然科学版),2013294),39-45.

[96]何源,黄欣沂,许力.无线网状网中基于盲签名的匿名认证方案.福建师范大学学报(自然科学版),2013292),23-27.   

 

 
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学)  
邮编:350007  联系电话:0591-83456050转406   
访问量:
158962020年11月04日