发布时间:2019-05-23   浏览次数:503


[1]  Wai-Kong, L. , C.-W., P. R. , Bok-Min, G. , Lanxiang, C. , Xiujun, Z. , & Naixue, X. Parallel and High Speed Hashing in GPU for Telemedicine Applications[J]. IEEE Access, 2018:1-1. (SCI-II )
[2]  Li J , Chen L , Lu Y , et al. Anonymous Certificate-based Broadcast Encryption with Constant Decryption Cost[J]. Information Sciences, 2018:454-455: 110-127. (SCI-II )
[3]  Lin H , Hu J , Xu C , et al. DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing[J]. Future Generation Computer s ystems, 2018:(83), 293-302. (SCI-II )
[4]  Ruliang X , Runxi C , Mingwei L , et al. SOMDNCD: Image Change Detection Based on Self-Organizing Maps and Deep Neural Networks[J]. IEEE Access, 2018:(6):35915-35925. (SCI-II )
[5]  Jinbo Xiong, Xiuhua Chen, Youliang Tian, Rong Ma, Lei Chen, Zhiqiang Yao.MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing[J]. IEEE Access 2018:6: 65384-65396. (SCI-II )
[6]  He Fang, Li Xu, Yulong Zou, Xianbin Wang, Kim-Kwang Raymond Choo: Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication[J]. IEEE Trans. Vehicular Technology,2018:67(11): 10788-10799.( SCI-II)
[7]  Fang H , Xu L , Wang X . Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme[J]. IEEE Transactions on Information Forensics and Security, 2018:13(1):197-209. (SCI-II )
[8]  Lin L , Xu L , Wang D , et al. The -Good-Neighbor Conditional Diagnosability of Arrangement Graphs[J]. IEEE Transactions on Dependable and Secure Computing, 2018:15(3), 542-548. (SCI-II )
[9]  Yang S J, Huang X. Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID[J]. Future Generation Computer s ystems, 2018:(6),582-590. (SCI-II )
[10] Li J , Zhou S , Li X , et al. An insertion–deletion–compensation model with Poisson process for scale-free networks[J]. Future Generation Computer s ystems, 2018:83,425-430. (SCI-II )
[11] Ye A , Chen Q , Xu L , et al. The flexible and privacy-preserving proximity detection in mobile social network[J]. Future Generation Computer s ystems, 2018:79,271-283. (SCI-II )
[12] Chen L , Zhang N , Li K C , et al. Improving file locality in multi-keyword top-k search based on clustering[J]. Soft Computing, 2018:22(9),3111-3121. (SCI-III )
[13] Chen, Lanxiang. A framework to enhance security of physically unclonable functions using chaotic circuits[J]. Physics Letters A, 2018:382(18),1195-1201. (SCI-III )
[14] Xingfu Y , Changlu L , Rongxing L , et al. Design of Secret Reconstruction with Optimal Communication Efficiency[J]. IEEE Communications Letters, 2018:22(8):1556-1559. (SCI-III )
[15] Lanxiang Chen,Linbing Qiu,Kuan-Ching Li,Shuming Zhou . A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack[J] . Journal of Internet Technology , 2018:19(1) ,167-176. (SCI-IIII)
[16] Pinhui Ke,Yueqin Jiang, Zhixiong Chen. On the Linear Complexities of Two Classes of Quaternary Sequences of Even Length With Optimal Autocorrelation[J]. Advances in Mathematics of Communications, 2018:12(3),525-539.( SCI-IIII )
[17] Pinhui K E , Zhifan Y E , Shengyuan Z , et al. On the Cross-Correlation Distribution of d -Ary Generalized Legendre-Sidelnikov Sequences [J]. 电子学报(英文),2018,27(2):287-291. (SCI-IIII )
[18] Yuyan Guo, Jiguo Li, Yang Lu, Yichen Zhang, Futai Zhang.Provably secure certificate-based encryption with leakage resilience [J]. Theoretical Computer Science, 2018:711: 1-10. (SCI-IIII )
[19] Jiguo Li, Shengzhou Hu, and Yichen Zhang.Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key [J]. Security and Communication Networks 2018: 8738960:1-8738960:10.( SCI-IIII )
[20] Wei Wu,Chen-Li Huang,Shiuan-Tung Chen,Hung-Min Sun. An Integration s ystem of Communication App on Image Recognition[J]. Journal of Internet Technology , 2018:19(2) ,556-564. (SCI-IIII)
[21] Fei Zhu、Xiaoling Tao、Chao Lin、Wei Wu. A Proxy Transitive Signature Scheme[J]. Journal of Internet Technology , 2018:19(4) ,1273-1284. (SCI-IIII)
[22] Liu H , Wei X , Xiao R , et al. OPRCP: approximate nearest neighbor binary search algorithm for hybrid data over WMSN blockchain[J]. EURASIP Journal on Wireless Communications and Networking, 2018(1). (SCI-IIII)
[23] Xiong J , Ma R , Chen L , et al. Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services[J]. Wireless Communications and Mobile Computing, 2018(3):1-12. (SCI-IIII)
[24] Wang D , Xu L , Wang F , et al. An anonymous batch handover authentication protocol for big flow wireless mesh networks[J]. EURASIP Journal on Wireless Communications and Networking, 2018(1):200. (SCI-IIII)
[25] Li Xu,Chi-Yao Weng,Lun-Pin Yuan,Mu-En Wu,Raylin Tso,Hung-Min Sun. A shareable keyword search over encrypted data in cloud computing[J]. The Journal of Supercomputing, 2018:74(3),1-23. (SCI-IIII)
[26] Wang F , Xu L , Wang H , et al. Identity-based non-repudiable dynamic provable data possession in cloud storage[J]. Computers & Electrical Engineering, 2018:69,521-533. (SCI-IIII)
[27] Yang ShaoJun,Shi FuGui. BASES AND CIRCUITS OF FUZZIFYING MATROIDS[J]. Iranian Journal of Fuzzy s ystems,2018:15(2),41-52. (SCI-IIII)
[28] Shao-Jun Yang, Fu-Gui Shi.M-fuzzifying independence spaces. Journal of Intelligent and Fuzzy s ystems[J].2018,34(1): 11-21. (SCI-IIII)
[29] Ayong Y , Jianfei S , Li X , et al. Local HMM for indoor positioning based on fingerprinting and displacement ranging[J]. IET Communications, 2018: 12(10):1163-1170. (SCI-IIII)
[30] Ye A , Yang X , Li Q , et al. A novel adaptive radio map for RSS-based indoor positioning[J]. Concurrency and Computation: Practice and Experience, 2018:e4486. (EI)
[31] Chen L , Zhang N . Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud[C]// International Conference on Cloud Computing International Conference on Security and Privacy in New Computing Environments. 2018,173-183. (EI)
[32] Wu W , Alvarez J , Liu C , et al. Bot detection using unsupervised machine learning[J]. Micros ystem Technologies, 2018:24(1),209-217. (EI)
[33] 陈兰香,陈振朝.一种基于相似搜索平衡二叉树的多关键词排序密文检索方案[J].密码学报,2018,5(3):271-285. (A类)
[34] 林晖,于孟洋,田有亮, 等.移动云计算中基于动态博弈和可靠推荐的传递信誉机制[J].通信学报,2018,39(5):85-93. (A类)
[35] 熊金波,马蓉,牛犇,郭云川,林立. 移动群智感知中基于用户联盟匹配的隐私保护激励机制[J]. 计算机研究与发展, 2018, 55(7): 1359-1370. (A类)
[36] 叶锋, 洪斯婷, 陈家祯, et al. 基于多特征扩散方法的显著性物体检测[J].电子与信息学报,2018,40(5):1210-1218. (A类)
[37] 柯品惠, 胡电芬, 常祖领. 柯品惠,胡电芬,常祖领.周期为p2的完备高斯整数序列的新构造[J].工程数学学报,2018,35(3):319-328. (B类)
[38] 韩宸望,林晖,饶绪黎, 黄川.基于代理模式的SQL注入过滤方法[J].计算机系统应用,2018,27(1):98-105. (B类)
[39] 于孟洋,林晖,田有亮.移动云计算中一种新的跨层信誉机制[J].网络与信息安全学报,2018,4(3):51-58.  (B类)
[40] 马蓉,陈秀华,刘慧, 等.移动群智感知中用户隐私度量与隐私保护研究[J].信息网络安全,2018,(8):64-72. (B类)
[41] 马蓉,冯盛源,熊金波, 等.基于安全博弈模型的隐私保护方法[J].武汉大学学报(理学版),2018,64(2):165-174. (B类)
[42] 王敏燊,熊金波,林倩, 等.基于密钥分发和密文抽样的云数据确定性删除方案[J].计算机应用,2018,38(1):194-200.  (B类)
[43] 翟亚飞, 许力, 林丽美. (n,k)-星图网络的t/m-诊断度及诊断算法[J]. 高校应用数学学报A辑, 2018, 33(03):82-91. (B类)
[44] 李晴,叶阿勇,姚志强, 等.基于AP指纹的RAP检测方法[J].网络与信息安全学报,2018,4(5):55-61. (B类)
[45] 叶阿勇,李晴,金俊林, 等.无线网络接入中用户身份和位置的双重隐身机制研究[J].信息网络安全,2018,(7):29-35.  (B类)
[46] 叶锋,欧阳智超,陈威彪, 等.基于机器学习的智能出租车预测系统[J].计算机系统应用,2018,27(9):61-67. (B类)
[47] 张美平,丁文才,许友泽.IPv6物联网接入网关的设计实践[J].计算机系统应用,2018,27(2):112-116.  (B类)
[48] 许力,王栋城,苏彬庭, 等.基于身份盲签名的无线Mesh网络匿名切换认证方案[J].工程科学与技术,2018,50(2):148-153. (CSCD类)
[49] 李婉茹,叶锋,陈家祯, 等.一种基于偏压场的水平集图像快速分割算法[J].福建师范大学学报(自然科学版),2018,34(3):1-7.  (CSCD类)
[50] Zheng M , Yang S J , Wu W , et al. A New Design of Online/Offline Signatures Based on Lattice[C]// International Conference on Information Security Practice and Experience. Springer, Cham, 2018.(会议论文)
[51] 李婉茹,叶锋,陈家祯,郑子华. The optimized level set image segmentation based on a saliency maps. Proceedings of 2018 International Conference on Image and Graphics Processing, ICIGP 2018. (会议论文) 

  

 
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学)  
邮编:350007  联系电话:0591-83456050转406   
访问量:
158962020年11月04日