2008年发表论著

1.         Li Xu, Meiping Zhan, Zhide Chen. Makov Chain based TCP Performance Analysis and Simulation in Wireless Multi-hop Network, International Journal of Systems and Control, 2008.3

2.         Sishen Chen, Li Xu. Secure and Anonymous Source Routing Protocol for Wireless ad hoc network, Adrdvark Golbal, 2008.4

3.         Yihui Zhang, Li Xu. Secure and Anonymous Source Routing Protocol for Wireless ad hoc network, IEEE Press, 2008.10

4.         Li Xu, Si-Shen Chen. Secure and anonymous Dynamic Source Routing for Wireless Ad Hoc Networks, International Journal of Distributed Sensor Network. 2008.11.

5.         Yihui Zhang, Li Xu, Xiaoding Wang. A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks Accepted by Journal of Communication.

6.         Yihui Zhang, Li Xu. Efficient Secure On-demand Routing in Clutsted Wireless Ad Hoc Network. Accepted by the International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2008).

7.         Gengjian Yu , Li Xu. ESCM: Ergodic Secure Control Model for Ad Hoc Network, 计算机科学, 2008.11

8.         Li Xu, Jianwei Chen, Xiaoding Wang. Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor, Accepted by Journal of Computer.

9.         Li Xu, Yihui Zhang, Xiaoding Wang. A New Reputation-based Trust Management Strategy for Clustered Ad Hoc Networks, Accepted by International Conference on Security Technology.

10.     Hui Lin, Li Xu Xiaoding Wang. A New Security Mechanism Based on SIP in Wirless Lan 3G Integration.  Accepted by 2008 International Symposium on Comuter Science and Computational Technology.

11.     Shuming Zhou, Shuxia Zheng, Li Xu. The Fault Diagnosability of Alternating Group Graphs. Journal of Information and Computational Science 5(1), 2008.1.

12.     Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo. Hierarchical Identity-Based Online/Offline . Accepted by IEEE TrustCom 2008.11

13.     Zhao hui Tang, Li Xu, Zhide Chen, Fuchun Guo. On the security of WAI Protocol in the third version of WAPI, 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008.8

14.     章静, 许力, 陈志德. 自组网中基于簇的入侵检测方案, 福建师范大学学报, 2008.3.

15.     叶秀彩, 许力, 林力伟. 基于小世界现象的无线传感器网络拓扑优化, 福建师范大学学报, 2008.9

16.     沈金波, 许力, 曾毅. 基于可信分簇的传感器网络密钥管理策略, 计算机系统应用, 2008.11

17.     沈金波, 许力, 陈建伟. 无线传感器网络中一种安全高效的共享密钥发现协议, 计算机应用, 2008.11

18.     沈金波,许力,张美平,张依惠,基于簇的无线传感器网络密钥预分配方案。武汉大学学报(理学版). 2008.11.

19.     张依惠, 许力, 陈泗盛. 一种高效的双向无线AD HOC网络匿名路由协议, 计算机应用, 2008.9

20.     许力, 章红艳, 沈金波. 无线传感器网络中的对密钥管理策略分析, 海峡科学, 2008.12

21.     张美平, 许力, 基于再生回报理论与嵌入式马氏链的无线自组织网络性能分析. 系统仿真学报.

22.     林晖, 许力. IMS中一种新的基于SigCompSIP压缩机制, 电子与信息学报, 2008.8.

23.     林晖, 许力. IMS中一种新的SIP压缩机制, 计算机应用, 2008.3.

24.     陈建伟, 许力, 黄丹芸. 自组网中基于填充设计的组密钥更新策略,电子与信息学报,2008,30(8).

25.     柯品惠, 张胜元. Construction of vector output Boolean functions with High Generalized Nonlinearity, The Journal of China Universities of Posts and Telecommunications, 2008.6.

26.     常祖领, 柯品惠, 张颉, 温巧燕. 高非线性度多输出布尔函数的构造, 电子学报, 2008.1.

27.     林富春, 柯品惠, 张胜元. A Note on Pair-interleaving Construction for LCZ and ZCZ Sequence Sets, IET, 2008.10.

28.     Guo, G., Huang, Y. A Minimal Coverage-based Classification Method and Its Application in Predictive Toxicology Data Mining, 2008 IEEE SMC, Singapore, IEEE press, 2008.10

29.     Huang, Y., Guo, G., Chen, H., Huang, TQ. Dynamic partial coverage based feature selection method, in Proc. of FSKD 2008, IEEE press, 2008.10

30.     Chen, H., Guo, G., Huang, Y., Huang TQ,  A spatial overlapping based similarity measure applied to hierarchical clustering, in Proc. of FSKD2008, IEEE press, 2008.10

31.     Zhao, C., Guo, G., Huang, XM., Neagu, D., Huang TQ. Data reduaction and classification based on multiple classifier behavior. in Proc. of DMIN 2008, USA CSREA Press, 2008.7

32.     Yu, YQ., Huang, TQ., Guo, G., Li, K. Semi-supervised Clustering Algorithm for Multi-density and  Complex Shape Dataset. in Proc. of CCPR 2008, IEEE press, 2008.10. 

33.     Huang, Y., Guo, G., Chen, H., Huang, TQ. Dynamic partial coverage based feature selection method, in Proc. of FSKD 2008,(accepted), IEEE press, 2008.

34.     Chen, H., Guo, G., Huang, Y., Huang TQ.  A spatial overlapping based similarity measure applied to hierarchical clustering, in Proc. of FSKD2008, (accepted), IEEE press, 2008.

35.     Zhao, C., Guo, G., Huang, XM., Neagu, D., Huang TQ. Data reduaction and classification based on multiple classifier behavior. in Proc. of DMIN 2008, USA CSREA Press, 2008.

36.     Yu, YQ., Huang, TQ., Guo, G., Li, K. Semi-supervised Clustering Algorithm for Multi-density and  Complex Shape Dataset. in Proc. of CCPR 2008, IEEE press, pp. 30-35, 2008.

37.     Fang Lin and Yongqing LiMultiplicity of solutions for a noncooperative elliptic system with critical Sobolev exponentZ. angew. Math. Phys. 2008

38.     Shuting Cai and Yongqing Li, Multiple solutions for a system of equations with p-Laplacian, J. Differential Equations 245 (2008) 2504–2521

39.     陈红, 郭躬德, 黄彧, 黄添强. 基于空间覆盖关系相识性度量的层次聚类算法, 计算机科学, vol.35 No.8A:258-261, 2008.8.

40.     卓飞豹, 郭躬德, 黄添强. 移动对象轨迹的双重插值, 福建师范大学学报, 2008.5.

41.     李凯, 黄添强, 郭躬德, 余养强. 基于少量标签的高维数据半监督聚类, 南京师范大学学报, 2008.12

42.     Rijing Pan, Zhiqiang Yao. Biorthogonal nonuniform B-spline wavelets based on a discrete norm. Computer Aided Geometric Design, 2008.

43.     Rijing Pan, Bin Weng. Recursive representation and application of transformation matrices of B-spline bases, Computer Aided Geometric Design, 2009,26 (1):82-93.

44.     林子植, 潘日晶. 基于轮廓数据的B样条曲面重建, 计算机工程与应用, 2008. 7.

45.     林子植, 潘日晶. B样条曲线逼近的一种新方法, 福建师范大学学报(自然科学版), 2008.4.

46.     郑峰松, 潘日晶. 基于Messay遗传算法B样条闭曲线拟合, 福建师范大学学报(自然科学版), 2008.1.

47.     翁彬, 潘日晶. 一种参数曲线的离散化算法,中国计算机辅助设计与图形学, 2008.7.

48.     翁彬, 潘日晶, 姚志强, 冯小青, 杨善超. 圆域B样条曲线的降阶逼近, 第三届数字娱乐与艺术暨数字家庭交互应用技术与设计进展(DEA’2008, 2008.11.

49.     Fuchun Guo, Yi Mu, Zhide Chen. Identity-based online/offline encryption, Springer, 2008.1.

50.     Fuchun Guo, Yi Mu, Zhide Chen. Multi-Identity Management for Identity-Based Cryptography, Journal of Discrete Mathematical Sciences & Cryptography, 2008.6

51.     Fuchun Guo, Yi Mu, Zhide Chen, Efficient Batch Verification of Short Signatures for A Single-signer Setting Without Random Oracles, IWSEC 2008, Lecture Notes in Computer Science, Springer Verlag, 2008.11

52.     Zhou ShumingZheng Shuxia, Xu Li. The Fault Diagnosability of Alternating group graphs, Journal of Information & Computational Science, 2008.1.

53.     Zhou ShumingZheng Shuxia,The t/t-diagnosability of the m-Ary n-Cubes, International Journal of Systems and Control, No.1(2008), 1-6.

54.     Zhou Shuming, The Fault Diagnosis of Alternating group graphs under the Comparison Model,IEEE Proceedings of the second international conference on Computer Science & Education (ICCSE’ 2008), Xiamen University Press, 629-635. 2008.7

55.     周书明,冒泡排序网络的系统级诊断能力分析,《计算机科学》, Vol.35, 10(2008)(专刊), 2731.

56.     陈宝兴, 杜妮, 周书明. 有向双环网络的宽直径公式, 厦门大学学报, 2008.12.

57.     周书明. 冒泡排序网络的系统级诊断能力分析, 计算机科学, 2008.10.

58.     张美平.Linux管理与应用》课程教学探索与新构想, 福建师范大学学报(自然科学版), 2008.5.

59.     张美平, 许力. 基于Xscale与嵌入式linux的无线多跳网络实验床的设计与实现, 计算机技术与发展, 2008.10.

60.     张美平, 许力, 沈金波. 基于嵌入式linux的无线自组织网络实验床设计, 计算机系统应用, 2008.12.

61.     叶阿勇, 马建峰. 一种移动自组网中信任评估模型的设计, 计算机研究与发展, 2008.5.

62.     叶阿勇, 马建峰. 一种容忍攻击的无线传感器网络定位算法, 武汉理工大学学报, 2008.7.

63.     林惠, 吴秀锦. 无线传感器网络仿真模拟技术, 中国新通信, 2008.6.

64.     吴建宁. Kernel-Based Feature Extraction for Automated Gait Classification Using Kinetics Data, Proceedings of Fourth International Conference on Natural Computation, 2008.1.

65.     吴建宁. 应用小波分析消除脑电信号中的肌电伪迹, 《海峡科学》增刊, 2008.5.

66.     陈黎飞. Cluster Validation for Subspace Clustering on High Dimensional Data, Proceeding of the IEEE Asia Pacific Conference on Circuits and Systems, 2008.12.

67.     陈黎飞. A Probability Model for Projective Clustering on High Dimensional Data, Proceeding of the IEEE International Conference on Data Mining, 2008.12.

68.     李伯阳, 姜青山, 陈黎飞. A Heuristically Weighting K-Means Algorithm for Subspace Clustering, Proceeding of the International Conference on Anti-counterfeiting, Security and Identification, 2008.8.

69.     陈高琳, 徐超. 基于TTCN-3的协议性能测试框架的研究, 黄石理工学院学报, 2008.6.

70.     林昌露, 李勇, 张秋璞, 叶顶锋. Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting, IEICE Transactions on Fundamentals of Electronics,  Communications and Computer Sciences, 2008.12.

71.     孔祥增, 姚志强. 具有篡改定位功能的3D网格模型脆弱水印算法, 电子工业出版社, 2008.7.

72.     蒋建民, 舒红平. Assembly, Disassembly, Adaptation and Replacement of Software Components, Proceedings of the 2008 International Conference on Computer Science and Software Engineering, 2008.12

73.     张仕, 黄林鹏. 基于FJ的多版本类动态更新演算, 软件学报, 2008.10.

74.     张仕, 赖会霞, 黄林鹏. 类动态更新事物研究. 计算机科学, 2008.11

75.     张仕, 黄林鹏. 基于OSGi的服务动态演化. 软件学报, 2008.5

76.     张仕, 赖会霞. 多线程可动态演化程序的设计, 福建师范大学学报, 2008.5

77.     袁曼丽, 宋考, 陈高琳. 采用数据挖掘技术的数据库审计系统, 中国新通信, 2008.9

78.     唐朝晖. Way to Deal With Replay Attack on WAPI3rd, 计算机科学, 2008.8

79.     吴海燕. 基于遗忘理论和效用的多Agent多问题协商, 广西师范大学学报, 2008.3

80.     陈荔聪, 林崧.一种基于自同步技术的音频水印, 福建师范大学学报, 2008.7

81.     陈荔聪. 基于时域同步和分块嵌入的音频水印算法, 现代电子技术, 2008.11

82.     刘建华, 樊晓平, 瞿志华. The Progressive Analysis of Particle Swarm Optimization, Journal of Computational Information Systems, 2008.7

83.     刘建华, 樊晓平, 瞿志华. A New Interestingness Measure of Association Rule, Second International Conference on Genetic and Evolutionary Computing, 2008.9