发布时间:2019-05-24   浏览次数:164

 

1.  柯品惠,张胜元,林富春. Constructions of Binary Array Set with Zero-Correlation Zone, Information Sciences, 2012,197:197-206.

2.  柯品惠,张胜元. New Classes of Quaternary Cyclotomic Sequence of Length 2p^m With High Linear Complexity, Information Processing Letters, 2012, 12, 16:646-650.

3.  柯品惠,杨正,张颉. On the Autocorrelation  and Linear Complexity of  Some 2p Periodic Quaternary Cyclotomic Sequences  over F4, IEICE Trans. on Fundamentals, 2011E94-A(11)2472-2477.

4.  柯品惠, 章海辉, 张胜元. 一类新的具有最优平均汉明相关性的跳频序列族, 通信学报,2012,9:168-175.

5.  柯品惠, 李瑞芳, 张胜元. d-元广义分圆序列的线性复杂度及自相关函数性质分析, 电子与信息学报,  2012 34 (12): 2881-2884.

6.  柯品惠,张胜元. New classes of sequence families with low correlation by using multiplicative and additive characters. Frontiers of Electrical and Electronic Engineering, 2012, 7( 3): 308-311.

7.  蒋建民,张仕,洪中,龚平;基于消息依赖的服务适配;Proceedings - 2011 IEEE Asia-Pacific Services Computing Conference, APSCC 20112011.

8.  Lanxiang Chen(陈兰香). Using Algebraic Signatures to Check Data Possession in Cloud Storage. Future Generation Computer Systems, Elsevier, 2012.

9.   Lanxiang Chen(陈兰香). Using Algebraic Signatures for Remote Data Possession Checking. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Beijing, China, October 10-12. 2011, pp. 289-294.

10.Lanxiang Chen(陈兰香), Shuming Zhou(周书明), Research on Remote Data Possession Checking, Journal of Convergence Information Technology, 2011, Vol. 6, No. 12, pp. 42 ~ 50.

11.林晖,胡嘉, Nagar, Atulya , 许力. 无线网格网中一种基于角色的隐私感知安全路由协议. IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom, Liverpool, United Kingdom, June 25 - June 27, 2012: 1872-1877.

12.林晖, 叶阿勇, 杨凯. PA-SIP:无线网格网VoIP系统中的一种隐私感知的SIP协议. 7th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM, 武汉,中国, September 23- September 25, 2011: 1-4.

13.Kaijun Wang (王开军), Liying Yang. Geometric Linear Regression and Geometric Relation. ICIC 2012, Huangshan, China, July 25-29, 2012, LNCS 7389: 236-243.

14.J.F. Chen(陈俊凡), Meromorphic functions of infinite order in the angular domain, Cent. Eur. J. Math., 2012, 10(3): 1103-1112.

15.王开军, 严宣辉, 陈黎飞. 识别聚类间远近关系的双几何体模型. 中国科学: 信息科学, 2012, 42(1):99-110.

16.李翔宇, 王开军, 郭躬德. 挑选聚类算法的网格连通图方法.计算机系统应用, 2012,21(9):103-107.

17.Jianning Wu(吴建宁)Automated recognition of human gait pattern using manifold learning algorithm(采用流形算法鉴别人体步态模式),2012 8th International Conference on Natural ComputationChongqing of China, 29-31,May,2012,pp:206-209.

18.G.B. Lin, J.F. Chen(陈俊凡), Normality and shared sets of meromorphic functions, Cent. Eur. J. Math., 2011, 9(6): 1312-1316.

19.王开军. 多维数据的聚类结果可视化技术综述. 福建师范大学学报(自然科学版), 2012, 28(4): 115-124.

20.王开军, 李晓. 基于有效性指标的聚类算法选择. 四川师范大学学报(自然科学版), 2011, 34(6):915-918.

21.杨小雪, 林丽美, 周书明, 交换立方网络在PMC模型下的条件诊断度, 山东大学学报, 47(9)(2012), 4550.

22.林丽美, 周书明, 排列图的代数性质, 福建师大学报, 28(5)(2012), 1113.

23.杨小雪, 周书明, 交换立方网络的条件诊断度, 福建师大学报, 28(4)(2012), 24-30.

24.范伟, 林丽美, 周书明, 星图网络的容错性分析, 福建师大学报, 28(4)(2012), 59.

25.Qiao Cheng, Zhide Chen, Yanqing Zeng. Evolutionary game approach to data forwarding control for cluster-based wireless sensor networks. Journal of Computational Information Systems. August 1, 2012. 6267-6275.

26.  Zhide Chen, Yihui Qiu, Jingjing Liu, Li Xu: Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game. Computers & Mathematics with Applications (CMA) 62(9):3378-3388 (2011).

27.蒋建民,张仕,洪中,岳厚光,龚平;建模与分析面向服务的可信软件的混合通信;SCIENCE CHINA Information Sciences2012.

28.林岭. 软件工程的团队项目驱动教学模式探讨. 福建师范大学学报(自然科学版), 2011, 03: 0012-0015.

29.凌远景,叶阿勇et al:基于声誉机制的传感器网络节点安全定位算法,计算机应用,2012321):70-73.

30.叶阿勇 et al:一种基于RSSI测距的传感器网络节点鲁棒定位机制,通信学报,201233(7): 135-142.

31.Jiang, Qi ; Ma, Jianfeng ; Li, Guangsong ; Ye, AyongSecurity enhancement on an authentication method for proxy mobile IPv6Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia, November 19-20, 2011,Volume 1: Intelligent Control and Network : 345-352 .

32.许力,曾智斌;云计算中基于多目标优化的虚拟资源分配策略;2012 IEEE/ACIS 11th International Conference on Computer and Information Science2012.

33.许力,纪磊,周书明;分层mesh网络中的高效自诊断协议;Concurrency Computation Practice and Experience2012.

34.郑之,陈尤莺, 陈丽萍,郭躬德,樊永显,孔祥增.Signal-BNF: A Bayesian Network Fusing Approach to Predict Signal Peptides  .Journal of biomedicine & biotechnology.2012 (Epub 2012 Oct 15) 卷: 2012页: 492174.

35.  纪磊,许力,周书明.无线mesh网络中基于对比模型的两级诊断策略;ICCT20112011.

36.张跃欣,许力,黄欣沂;无线mesh网络中基于多项式的密钥预分发策略;Journal of Computational information system2012.

37.黄静,许力;基于可信度的簇间多跳LEACH算法;华侨大学学报(自然科学版);2012.

38.许力,蒋佳铭;无线多跳网络中基于声誉机制的可靠组播协议;中国科学技术大学学报;2011.

39.陈兰香,许力,云存储服务中可证明数据持有及恢复技术研究,计算机研究与发展, 2012, vol. 49(Suppl.): 19-25.

40.陈丽萍,姚志强;一种基于提升小波和证据理论的视频水印算法;福建师范大学学报(自然科学版;2012.

41.曹夕,许力,陈兰香;云存储系统中数据完整性验证协议;计算机应用;2012.

42.纪磊,许力,林力伟;无线多跳网络中基于故障诊断与恢复技术的拓扑容错方案;武汉大学学报(理学版);2012.

43.  严晓明,郑之;BPRBF网络在一些非线性曲线拟合上性能的比较;福建农林大学学报(自然科学版)2011.

44.龚平,蒋建民,张仕. OWL-S过程模型的形式化分析,2011 IEEE Aisa-Pacific Services Computing Conference, APSCC 2011, Jeju Island, South Korea, Dec 12-15 2011, pp.215-222.

45.龚平,蒋建民,张仕. 基于FDROWL-S过程模型的组合性验证,Journal of Convergence Information Technology, 2012, vol7,No12, pp: 398-409.

46.Changlu Lin(林昌露) and Chenglian Liu. Ciphertext-Auditable Public Key Encryptions without Random Oracles. Information, 2012, 15(6): 2599-2602.

47.Tang fei, Changlu Lin(林昌露), Yong Li, and Shengyuan Zhang, Identity-based strong designated verifier signature scheme with full non-delegatability, Proceeding s of the 2011 IEEE International Workshop on Security and Privacy (with TrustCom 2011) – SPIoT ’11, Beijing, November, 2011, pp. 800-805.

48.Changlu Lin(林昌露) and Lein Harn. Unconditionally Secure Multi-Secret Sharing Scheme. Proceedings .of 2012 IEEE International Comference on Computer Science and Automation Engineering – CSAE 2012, Zhangjiajie, May 2012, vol.1, 169-172.

49.Changlu Lin(林昌露) and Lein Harn. Unconditionally secure verifiable secret sharing scheme. Advances in Information Sciences and Service Sciences, 2012, 4(17): 514-518.

50.潘日晶,姚志强,刘晓芬;周期B样条基转换矩阵的表示和计算;应用数学学报;2012.

51.潘日晶,姚志强;小支承的双正交非均匀B样条小波;Proceedings of the 2012 International Conference on Computer Application and System Modeling, ICCASM 20122012.

52.严晓明;一种新的基于四面体的体细分方法;福建师范大学学报(自然科学版)2011.

53.张华,潘日晶;一种新的基于四面体的体细分方法;福建师范大学学报(自然科学版)2012.

54.曾锴珊,潘日晶,孙坚坡保持特征的自适应Loop细分曲面算法及实现;福建师范大学学报(自然科学版)2011.

55.黄添强, 余养强, 郭躬德. 半监督的移动对象离群轨迹检测算法. 计算机研究与发展, 2011, 48(11): 2074-2082.

56.黄添强, 李凯, 郭躬德.. 基于局部相关维度的流形离群点检测算法. 模式识别与人工智能, 2011, 24(5): 629-636.

57.Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong and Wei Wu;Certificateless Signatures: New Schemes and Security Models;The Computer Journal,2012 ,55 (4),457-473.

58.Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou and Robert H. Deng;Enhanced authentication for commercial video services;SECURITY AND COMMUNICATION NETWORKS;2012 , 5(11),1248–1259.

59.Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, and Li Xu;A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption;The Computer Journal;2012 ;5(10);1157–116.

60.陈丽萍,孔祥增;一种基于光流法与数字全息的视频水印;计算机系统应用;2011.

61.袁秀娟,黄添强, 陈智文 et al. 基于纹理特征的数字视频篡改检测. 计算机系统应用, 2012, 26(7): 91-95.

62.李南,郭躬德,陈黎飞;基于少量类标签的概念漂移检测算法;计算机应用;2012.

63.李南,郭躬德,面向高速数据流的集成分类器算法.计算机应用,32(3) 629-6332012.

64.  王怡,郭躬德,Signal-LMS:一种局部序列匹配相似度预测信号肽的方法. 生物物理学报,2012,Vol. 28 (6): 499-508.

65.严宣辉,郭躬德;计算机科学与技术专业工程实践能力培养模式的探索;福建师范大学学报;2011.

66.肖国宝,严宣辉;一种动态不确定环境中机器人路径规划方法;计算机系统应用;2012.

67.陈黎飞, 郭躬德. 最近邻分类的多代表点学习算法. 模式识别与人工智能,2011, 24(6): 882-888.

68.Lifei Chen(陈黎飞), Qingshan Jiang, Shengrui Wang. Model-based Method for Projective Clustering. IEEE Transactions on Knowledge and Data Engineering. 2012, 24(7):1291-1305.

69.张健飞, 陈黎飞, 郭躬德. 检测迷惑恶意代码的层次化特征选择方法, 计算机应用. 2012, 32(10):2761-2767.

70.李南,郭躬德,基于子空间集成的概念漂移数据流分类算法,计算机系统应用,20(12): 240-248, 2011.

71.王怡,郭躬德;基于数据划分和集成的方法预测信号肽;计算机工程与应用;2012.

 

 

 
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学)  
邮编:350007  联系电话:0591-83456050转406   
访问量:
158962020年11月04日