2017年学院期刊论文(CCF、SCI、EI)情况表 | ||||||
序号 | 论文名称 | 第一作者 | 所有作者 | 来源期刊 | 检索分类 | CCF分类 |
1 | Exploring Representativeness and Informativeness for Active Learning | 杜博 | Du, Bo; Wang, Zengmao; Zhang, Lefei; Zhang, Liangpei; Liu, Wei; Shen, Jialie; Tao, Dacheng | IEEE Transactions on Cybernetics | SCI一区 EI | B刊 |
2 | Parametric and adaptive encryption of feature-based computer-aided design models for cloud-based collaboration | 蔡贤涛 | Cai, X. T.; Wang, S.; Lu, X.; Li, W. D.; Liang, Y. W. | INTEGRATED COMPUTER-AIDED ENGINEERING | SCI一区 EI | |
3 | An efficient approach to directly compute the exact Hausdorff distance for 3D point sets | 张德军 (何发智) | Zhang, Dejun; He, Fazhi; Han, Soonhung; Zou, Lu; Wu, Yiqi; Chen, Yilin | INTEGRATED COMPUTER-AIDED ENGINEERING | SCI一区 | |
4 | Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries | 何德彪 | He, Debiao; Kumar, Neeraj; Zeadally, Sherali; Vinel, Alexey; Yang, Laurence T. | IEEE TRANSACTIONS ON SMART GRID | SCI一区 EI | |
5 | Large-scale block adjustment without use of ground control points based on the compensation of geometric calibration for ZY-3 images | 杨波 | Yang, Bo; Wang, Mi; Xu, Wen; Li, Deren; Gong, Jianya; Pi, Yingdong | ISPRS JOURNAL OF PHOTOGRAMMETRY AND REMOTE SENSING | SCI一区 EI | |
6 | Cost-Aware Region-Level Data Placement in Multi-Tiered Parallel I/O Systems | 何水兵 | He, Shuibing; Wang, Yang; Li, Zheng; Sun, Xian-He; Xu, Chenzhong | IEEE Transactions on Parallel and Distributed Systems(TPDS) | SCI二区 EI | A刊 |
7 | Using MinMax-Memory Claims to Improve In-Memory Workflow Computations in the Cloud | 何水兵 | He, Shuibing; Wang, Yang; Sun, Xian-He; Xu, Chengzhong | IEEE Transactions on Parallel and Distributed Systems(TPDS) | SCI二区 EI | A刊 |
8 | Multi-Layer Quantization Control for Quality-Constrained H.265/HEVC | 潘翔 (陈震中) | Pan, Xiang; Chen, Zhenzhong | IEEE Transactions on Image Processing(TIP) | SCI二区 EI | A刊 |
9 | Nodes' Evolution Diversity and Link Prediction in Social Networks | 王欢 (胡文斌) | Wang, Huan; Hu, Wenbin; Qiu, Zhenyu; Du, Bo | IEEE Transactions on Knowledge and Data Engineering(TKDE) | SCI二区 EI | A刊 |
10 | Facilitating Cloud Process Family Co-Evolution by Reusable Process Plug-in: An Open-source Prototype | 冯在文 | Feng, Zaiwen;Chiu, Dickson K. W.; Peng, Rong; Gong, Ping; He, Keqing;Huang, Yiwang | IEEE Transactions on Services Computing | SCI二区 | B刊 |
11 | Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage | 何德彪 | He, Debiao; Wang, Huaqun; Zhang, Jianhong; Wang, Lina | Information Sciences | SCI二区 EI | B刊 |
12 | Real-time traffic jams prediction inspired by Biham, Middleton and Levine (BML) model | 胡文斌 | Hu, Wenbin; Yan, Liping; Wang, Huan; Du, Bo; Tao, Dacheng | Information Sciences | SCI二区 EI | B刊 |
13 | A transition-based joint model for disease named entity recognition and normalization | 娄银霞 (姬东鸿) | Lou, Yinxia; Zhang, Yue; Qian, Tao; Li, Fei; Xiong, Shufeng; Ji, Donghong | Bioinformatics | SCI二区 | B刊 |
14 | A Novel Semisupervised Active-Learning Algorithm for Hyperspectral Image Classification | 王增茂 (杜博) | Wang, Zengmao; Du, Bo; Zhang, Lefei; Zhang, Liangpei; Jia, Xiuping | IEEE Transactions on Geoscience and Remote Sensing | SCI二区 | B刊 |
15 | Real-time tracking based on weighted compressive tracking and a cognitive memory model | 杜博 | Du, Bo; Sun, Yujia; Wu, Chen; Zhang, Lefei; Zhang, Liangpei | Signal Processing | SCI二区 EI | C刊 |
16 | An uncertainty and density based active semi-supervised learning scheme for positive unlabeled multivariate time series classification | 何国良 | He, Guoliang; Li, Yifei; Zhao, Wen | Knowledge-Based Systems | SCI二区 EI | C刊 |
17 | SoC-constrained team formation with self-organizing mechanism in social networks | 史玉玲 (彭智勇) | Shi, Yuling; Peng, Zhiyong; Hong, Liang; Yu, Qian | Knowledge-Based Systems | SCI二区 EI | C刊 |
18 | Efficient and secure identity-based encryption scheme with equality test in cloud computing | 吴黎兵 | Wu, Libing; Zhang, Yubo; Choo, Kim-Kwang Raymond; He, Debiao | Future Generation Computer Systems | SCI二区 EI | C刊 |
19 | A Joint Control-Communication Design for Reliable Vehicle Platooning in Hybrid Traffic | 刘冰艺 (吴黎兵) | Liu, Bingyi; Jia, Dongyao; Lu, Kejie; Ngoduy, Dong;Wang, Jianping; Wu, Libing | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY | SCI二区 EI | |
20 | Cloud-Assisted Safety Message Dissemination in VANET-Cellular Heterogeneous Wireless Network | 刘冰艺 (吴黎兵) | Liu, Bingyi; Jia, Dongyao; Wang, Jianping; Lu, Kejie; Wu, Libing | IEEE SYSTEMS JOURNAL | SCI二区 EI | |
21 | Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey | 王敬军 (马于涛) | Wang, Jingjun; Hu, Shengshan; Wang, Qian; Ma, Yutao | IEEE NETWORK | SCI二区 EI | |
22 | H-PARAFAC: Hierarchical Parallel Factor Analysis of Multidimensional Big Data | 陈丹 | Chen, Dan; Hu, Yangyang; Wang, Lizhe; Zomaya, Albert Y.; Li, Xiaoli | IEEE Transactions on Parallel and Distributed Systems(TPDS) | SCI二区 EI | A刊 |
23 | Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks | 陈晶 | Chen, Jing; He, Kun; Yuan, Quan; Xue, Guoliang; Du, Ruiying; Wang, Lina | IEEE Transactions on Mobile Computing(TMC) | SCI二区 EI | A刊 |
24 | Robust and Discriminative Labeling for Multi-Label Active Learning Based on Maximum Correntropy Criterion | 杜博 | Du, Bo; Wang, Zengmao; Zhang, Lefei; Zhang, Liangpei; Tao, Dacheng | IEEE Transactions on Image Processing(TIP) | SCI二区 EI | A刊 |
25 | Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System | 何德彪 | He, Debiao; Kumar, Neeraj; Choo, Kim-Kwang Raymond; Wu, Wei | IEEE Transactions on Information Forensics & Security(TIFS) | SCI二区 EI | A刊 |
26 | Super-Resolution Person Re-Identification With Semi-Coupled Low-Rank Discriminant Dictionary Learning | 荆晓远 | Jing, Xiao-Yuan; Zhu, Xiaoke; Wu, Fei; Hu, Ruimin; You, Xinge; Wang, Yunhong; Feng, Hui; Yang, Jing-Yu | IEEE Transactions on Image Processing(TIP) | SCI二区 EI | A刊 |
27 | AMR Steganalysis Based on Second-Order Difference of Pitch Delay | 任延珍 | Ren, Yanzhen; Yang, Jing; Wang, Jinwei; Wang, Lina | IEEE Transactions on Information Forensics & Security(TIFS) | SCI二区 EI | A刊 |
28 | Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources | 宋伟 | Song, Wei; Wang, Bing; Wang, Qian; Shi, Chengliang; Lou, Wenjing; Peng, Zhiyong | IEEE Transactions on Information Forensics & Security(TIFS) | SCI二区 EI | A刊 |
29 | THEMIS: Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply | 王骞 | Wang, Qian; Sun, Qihang; Ren, Kui; Jia, Xiaohua | IEEE Transactions on Mobile Computing(TMC) | SCI二区 EI | A刊 |
30 | Illumination Decomposition for Photograph With Multiple Light Sources | 张玲 (肖春霞) | Zhang, Ling; Yan, Qingan; Liu, Zheng; Zou, Hua; Xiao, Chunxia | IEEE Transactions on Image Processing(TIP) | SCI二区 EI | A刊 |
31 | Palette-Based Image Recoloring Using Color Decomposition Optimization | 张青 (肖春霞) | Zhang, Qing; Xiao, Chunxia; Sun, Hanqiu; Tang, Feng | IEEE Transactions on Image Processing(TIP) | SCI二区 EI | A刊 |
32 | Robust Dual Clustering with Adaptive Manifold Regularization | 赵能文 (张乐飞) | Zhao, Nengwen; Zhang, Lefei; Du, Bo*; Zhang, Qian; You, Jane; Tao, Dacheng | IEEE Transactions on Knowledge and Data Engineering(TKDE) | SCI二区 EI | A刊 |
33 | A local start search algorithm to compute exact Hausdorff Distance for arbitrary point sets | 陈壹林 (何发智) | Chen, Yilin; He, Fazhi; Wu, Yiqi; Hou, Neng | Pattern Recognition | SCI二区 EI | B刊 |
34 | PLTD: Patch-Based Low-Rank Tensor Decomposition for Hyperspectral Images | 杜博 | Du, Bo; Zhang, Mengfei; Zhang, Lefei; Hu, Ruimin; Tao, Dacheng | IEEE Transactions on Multimedia | SCI二区 EI | B刊 |
35 | Virtualized Resource Sharing in Cloud Radio Access Networks Through Truthful Mechanisms | 谷思佳 (李宗鹏) | Gu, Sijia; Li, Zongpeng; Wu, Chuan; Zhang, Huyin | IEEE TRANSACTIONS ON COMMUNICATIONS | SCI二区 EI | B刊 |
36 | Secure independent-update concise-expression access control for video on demand in cloud | 何琨 | He, Kun; Chen, Jing; Zhang, Yu; Du, Ruiying; Xiang, Yang; Hassan, Mohammad Mehedi; Alelaiwi, Abdulhameed | Information Sciences | SCI二区 EI | B刊 |
37 | An event detection method for social networks based on link prediction | 胡文斌 | Hu, Wenbin; Wang, Huan; Peng, Chao; Liang, Huanle; Du, Bo | Information Systems | SCI二区 EI | B刊 |
38 | Coding-based cooperative caching in on-demand data broadcast environments | 姬厚灵 (毋国庆) | Ji, Houling; Lee, Victor C. S.; Chow, Chi-Yin; Liu, Kai; Wu, Guoqing | Information Sciences | SCI二区 EI | B刊 |
39 | Infrastructure-Assisted Message Dissemination for Supporting Heterogeneous Driving Patterns | 刘冰艺 (吴黎兵) | Liu, Bingyi;Jia, Dongyao; Lu, Lu, Kejie; Chen, Haibo; Yang, Rongwei; Wang, Jianping; Barnard, Yvonne; Wu, Libing | IEEE Transactions on Intelligent Transportation Systems | SCI二区 EI | B刊 |
40 | Tell me the truth: Practically public authentication for outsourced databases with multi-user modification | 宋伟 | Song, Wei; Wang, Bing; Wang, Qian; Peng, Zhiyong; Lou, Wenjing | Information Sciences | SCI二区 EI | B刊 |
41 | Combining local and global: Rich and robust feature pooling for visual recognition | 熊维 (杜博) | Xiong, Wei; Zhang, Lefei; Du, Bo; Tao, Dacheng | Pattern Recognition | SCI二区 EI | B刊 |
42 | Context Neighbor Recommender: Integrating contexts via neighbors for recommendations | 郑麟 (朱福喜) | Zheng, Lin; Zhu, Fuxi; Huang, Sheng; Xie, Jin | Information Sciences | SCI二区 EI | B刊 |
43 | Local Pattern Collocations Using Regional Co-occurrence Factorization | 邹勤 | Zou, Qin; Ni, Lihao; Wang, Qian; Hu, Zhongwen; Li, Qingquan; Wang, Song | IEEE Transactions on Multimedia | SCI二区 EI | B刊 |
44 | Action recognition by saliency-based dense sampling | 徐增敏 (胡瑞敏) | Xu, Zengmin; Hu, Ruimin; Chen, Jun; Chen,Chen, Chen; Chen, Huafeng; Li, Hongyang; Sun, Qingquan | Neurocomputing | SCI二区 EI | C刊 |
45 | Anonymous Authentication for Wireless Body Area Networks With Provable Security | 何德彪 | He, Debiao; Zeadally, Sherali; Kumar, Neeraj;Lee, Jong-Hyouk | IEEE SYSTEMS JOURNAL | SCI二区 EI | |
46 | A Multiobjective Box-Covering Algorithm for Fractal Modularity on Complex Networks | 吴泓润 (王峰) | Hongrun Wu, Li Kuang, Feng Wang, Qi Rao, Maoguo Gong, Yuanxiang Li | Applied Soft Computing | SCI二区 EI | |
47 | A Novel Nonlinear Parameter Estimation Method of Soft Tissues | 童倩倩 (袁志勇) | Tong, Qianqian; Yuan, Zhiyong; Zheng, Mianlun; Liao, Xiangyun; Zhu, Weixu; Zhang, Guian | GENOMICS PROTEOMICS & BIOINFORMATICS | SCI Q1 | |
48 | HARL: Optimizing Parallel File Systems with Heterogeneity-Aware Region-Level Data Layout | 何水兵 | He, Shuibing; Wang, Yang; Sun, Xian-He; Xu, Chengzhong | IEEE Transactions on Computers(TOC) | SCI三区 EI | A刊 |
49 | An event detection method for social networks based on hybrid link prediction and quantum swarm intelligent | 胡文斌 | Hu, Wenbin; Wang, Huan; Qiu, Zhenyu; Nie, Cong; Yan, Liping; Du, Bo | World Wide Web Journal | SCI三区 | B刊 |
50 | False data separation for data security in smart grids | 黄浩 | Huang, Hao; Yan, Qian; Zhao, Yao; Lu, Wei; Liu, Zhenguang;Li, Zongpeng | Knowledge and Information Systems | SCI三区 | B刊 |
51 | Volume preserving mesh parameterization based on optimal mass transportation | 苏科华 | Su, Kehua; Chen, Wei; Lei, Na; Zhang, Junwei; Qian, Kun; Gu, Xianfeng | Computer-Aided Design | SCI三区 | B刊 |
52 | Dynamic sampling of text streams and its application in text analysis | 田纲 | Tian, Gang; Huang, Jiajia; Peng, Min; Zhu, Jiahui; Zhang, Yanchun | Knowledge and Information Systems | SCI三区 | B刊 |
53 | Exploring mutual information-based sentimental analysis with kernel-based extreme learning machine for stock prediction | 王峰 | Wang, Feng; Zhang, Yongquan; Rao, Qi; Li, Kangshun; Zhang, Hao | Soft Computing | SCI三区 EI | C刊 |
54 | Cost-effective barrier coverage formation in heterogeneous wireless sensor networks | 王志波 | Wang, Zhibo; Cao, Qing; Qi, Hairong; Chen, Honglong; Wang, Qian | Ad hoc Networks | SCI三区 EI | C刊 |
55 | Predicting potential drug-drug interactions by integrating chemical, biological, phenotypic and network data | 章文 | Zhang, Wen; Chen, Yanlin; Liu, Feng; Luo, Fei; Tian, Gang; Li, Xiaohong | BMC Bioinformatics | SCI三区 EI | C刊 |
56 | Predicting drug-disease interactions by semi-supervised graph cut algorithm and three-layer data integration | 吴光生 (刘娟) | Wu, Guangsheng; Liu, Juan; Wang, Caihua | BMC MEDICAL GENOMICS | SCI三区 | |
57 | A unified frame of predicting side effects of drugs by using linear neighborhood similarity | 章文 | Zhang, Wen; Yue, Xiang; Liu, Feng; Chen, Yanlin; Tu, Shikui; Zhang, Xining | BMC SYSTEMS BIOLOGY | SCI三区 | |
58 | Drug-target interaction prediction through label propagation with linear neighborhood information | 章文 | Wen Zhang, Yanlin Chen, Dingfang Li | Molecules | SCI三区 | |
59 | Predicting human splicing branchpoints by combining sequence-derived features and multi-label learning methods | 章文 | Zhang, Wen; Zhu, Xiaopeng; Fu, Yu; Tsuji, Junko; Weng, Zhiping | BMC BIOINFORMATICS | SCI三区 EI | |
60 | Keyword Search for Building Service-Based Systems | 何强 | He, Qiang; Zhou, Rui; Zhang, Xuyun; Wang, Yanchun; Ye, Dayong; Chen, Feifei; Grundy, John C.; Yang, Yun | IEEE Transactions on Software Engineering(TSE) | SCI三区 EI | A刊 |
61 | Heterogeneity-Aware Collective I/O for Parallel I/O Systems with Hybrid HDD/SSD Servers | 何水兵 | He, Shuibing; Wang, Yang; Sun, Xian-He; Huang, Chuanhe; Xu, Chenzhong | IEEE Transactions on Computers(TOC) | SCI三区 EI | A刊 |
62 | An Improved SDA Based Defect Prediction Framework for Both Within-Project and Cross-Project Class-Imbalance Problems | 荆晓远 | Jing, Xiao-Yuan; Wu, Fei; Dong, Xiwei; Xu, Baowen | IEEE Transactions on Software Engineering(TSE) | SCI三区 EI | A刊 |
63 | Nopol: Automatic Repair of Conditional Statement Bugs in Java Programs | 玄跻峰 | Xuan, Jifeng; Martinez, Matias; DeMarco, Favio; Clement, Maxime; Lamelas Marcote, Sebastian; Durieux, Thomas; Le Berre, Daniel; Monperrus, Martin | IEEE Transactions on Software Engineering(TSE) | SCI三区 EI | A刊 |
64 | An encryption approach for product assembly models | 蔡贤涛 | Cai, X. T.; Wang, S.; Lu, X.; Li, W. D. | Advanced Engineering Informatics | SCI三区 EI | B刊 |
65 | Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography | 何德彪 | He, Debiao; Zeadally, Sherali; Wu, Libing; Wang, Huaqun | Computer Networks | SCI三区 EI | B刊 |
66 | A probabilistic method for emerging topic tracking in Microblog stream | 黄佳佳 (彭敏) | Huang, Jiajia*; Peng, Min; Wang, Hua; Cao, Jinli; Gao, Wang; Zhang, Xiuzhen | World Wide Web Journal | SCI三区 EI | B刊 |
67 | A string-wise CRDT algorithm for smart and large-scale collaborative editing systems | 吕晓 (何发智) | Lv, Xiao; He, Fazhi; Cai, Weiwei; Cheng, Yuan | Advanced Engineering Informatics | SCI三区 EI | B刊 |
68 | Software effort estimation based on open source projects: Case study of Github | 齐富民 (荆晓远) | Qi, Fumin; Jing, Xiao-Yuan; Zhu, Xiaoke; Xie, Xiaoyuan; Xu, Baowen; Ying, Shi | Information and Software Technology | SCI三区 EI | B刊 |
69 | DRank: A semi-automated requirements prioritization method based on preferences and dependencies | 邵飞 (彭蓉) | Shao, Fei; Peng, Rong; Lai, Han; Wang, Bangchao | Journal of Systems and Software | SCI三区 EI | B刊 |
70 | A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications | 宋伟 | Song, Wei; Wang, Bing; Wang, Qian; Peng, Zhiyong; Lou, Wenjing; Cui, Yihui | Journal of Parallel and Distributed Computing | SCI三区 EI | B刊 |
71 | deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level | 汪润 (王丽娜) | Wang, Run; Liu, Pei; Zhao, Lei; Cheng, Yueqiang; Wang, Lina | Journal of Systems and Software | SCI三区 EI | B刊 |
72 | Achieving location error tolerant barrier coverage for wireless sensor networks | 王志波 | Wang, Zhibo; Chen, Honglong; Cao, Qing; Qi, Qi, Hairong; Wang, Zhi; Wang, Qian | Computer Networks | SCI三区 EI | B刊 |
73 | An industrial case study on an architectural assumption documentation framework | 杨晨 (梁鹏) | Yang, Chen; Liang, Peng; Avgeriou, Paris; Eliasson, Ulf; Heldal, Rogardt; Pelliccione, Patrizio; Bi, Tingting | Journal of Systems and Software | SCI三区 EI | B刊 |
74 | The Bayesian Network based program dependence graph and its application to fault localization | 余啸 (刘进) | Yu, Xiao; Liu, Jin; Yang, Zijiang; Liu, Xiao | Journal of Systems and Software | SCI三区 EI | B刊 |
75 | A General Framework to Design Secure Cloud Storage Protocol Using Homomorphic Encryption Scheme | 张健 | Jian Zhang, Yang Yang, Yanjiao Chen, Jing Chen, Qian Zhang | Computer Networks | SCI三区 EI | B刊 |
76 | Video Shadow Removal Using Spatio-temporal Illumination Transfer | 张玲 (肖春霞) | Zhang, Ling; Zhu, Yao; Liao, Bin; Xiao, Chunxia | Computer Graphics Forum | SCI三区 EI | B刊 |
77 | Opposition-based particle swarm optimization with adaptive mutation strategy | 董文永 | Dong, Wenyong; Kang, Lanlan; Zhang, Wensheng | Soft Computing | SCI三区 EI | C刊 |
78 | Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices | 何德彪 | He, Debiao; Wang, Huaqun; Wang, Lina; Shen, Jian; Yang, Xianzhao | Soft Computing | SCI三区 EI | C刊 |
79 | A neural joint model for entity and relation extraction from biomedical text | 李霏 (姬东鸿) | Li, Fei; Zhang, Meishan; Fu, Guohong; Ji, Donghong | BMC Bioinformatics | SCI三区 EI | C刊 |
80 | Long short-term memory RNN for biomedical named entity recognition | 吕晨 (姬东鸿) | Lyu, Chen; Chen, Bo; Ren, Yafeng; Ji, Donghong | BMC Bioinformatics | SCI三区 EI | C刊 |
81 | FIR digital filter design using improved particle swarm optimization based on refraction principle | 邵鹏 (吴志健) | Shao, Peng; Wu, Zhijian; Zhou, Xuanyu; Dang Cong Tran | Soft Computing | SCI三区 EI | C刊 |
82 | Comprehensive Association Rules Mining of Health Examination Data with an Extended FP-Growth Method | 王博薇 (陈丹) | Wang, Bowei;Chen, Dan; Shi, Benyun; Zhang, Jindong; Duan, Yifu; Chen, Jingying ; Hu, Ruimin | MOBILE NETWORKS & APPLICATIONS | SCI三区 EI | C刊 |
83 | Secure public data auditing scheme for cloud storage in smart city | 吴黎兵 | Wu, Libing; Wang, Jing; Kumar, Neeraj; He, Debiao | Personal and Ubiquitous Computing | SCI三区 EI | C刊 |
84 | Comparative network stratification analysis for identifying functional interpretable network biomarkers | 张传超 (刘娟) | Zhang, Chuanchao; Liu, Juan; Shi, Qianqian; Zeng, Tao; Chen, Luonan | BMC Bioinformatics | SCI三区 EI | C刊 |
85 | A Three-Stage Matting Method | 陈晓 (何发智) | Chen, Xiao; He, Fazhi; Yu, Haiping | IEEE ACCESS | SCI三区 EI | |
86 | A Supervised Learning and Control Method to Improve Particle Swarm Optimization Algorithms | 董文永 | Dong, Wenyong; Zhou, Zhou, MengChu | IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | SCI三区 EI | |
87 | Extracting Fine-Grained Location with Temporal Awareness in Tweets: A Two-Stage Approach | 李晨亮 | Li, Chenliang; Sun, Aixin | JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY | SCI三区 EI | |
88 | Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols | 罗敏 | Luo, Min; Zhou, Xiaotong; Li, Li; Choo, Kim-Kwang Raymond; He, Debiao | IEEE ACCESS | SCI三区 EI | |
89 | A Web Service Discovery Approach Based on Common Topic Groups Extraction | 王健 | Wang, Jian; Gao, Panpan; Ma, Yutao; He, Keqing; Hung, Patrick C. K. | IEEE ACCESS | SCI三区 EI | |
90 | Influence of trust in the spreading of information | 吴泓润 (马于涛) | Wu, Hongrun; Arenas, Alex; Gomez, Sergio | PHYSICAL REVIEW E | SCI三区 EI | |
91 | Enhancing Topic Modeling for Short Texts with Auxiliary Word Embeddings | 李晨亮 | Li, Chenliang; Duan, Yu; Wang, Haoran ;Zhang, Zhiqian;Sun, Aixin;Ma, Zongyang | ACM Transactions on Information Systems | SCI四区 EI | A刊 |
92 | PFD-A Flexible Higher-Order Masking Scheme | 唐明 | Tang, Ming; Guo, Zhipeng; Heuser, Annelie; Ren, Yanzhen; Li, Jie; Danger, Jean-Luc | IEEE Transactions On Computer-Aided Design Of Integrated Circuits And System(TCAD) | SCI四区 EI | A刊 |
93 | Brain big data processing with massively parallel computing technology: challenges and opportunities | 陈丹 | Chen, Dan; Hu, Yangyang; Cai, Chang; Zeng, Ke; Li, Xiaoli | Software: Practice and Experience | SCI四区 | B刊 |
94 | A cloud-based taxi trace mining framework for smart city | 刘进 | Liu, Jin; Yu, Xiao; Xu, Zheng; Choo, Kim-Kwang Raymond; Hong, Liang; Cui, Xiaohui | Software: Practice and Experience | SCI四区 | B刊 |
95 | A sensitive object-oriented approach to big surveillance data compression for social security applications in smart cities | 肖晶 | Xiao, Jing; Wang, Zhongyuan; Chen, Yu; Liao, Liang; Xiao, Jun; Zhan, Gen; Hu, Ruimin | Software: Practice and Experience | SCI四区 | B刊 |
96 | Developer recommendation on bug commenting: a ranking approach for the developer crowd | 玄跻峰 | Xuan, Jifeng; Jiang, He; Zhang, Hongyu; Ren, Zhilei | Science China Information Sciences | SCI四区 EI | B刊 |
97 | Attribute and Global Boosting: A Rating Prediction Method in Context-Aware Recommendation | 郑麟 (朱福喜) | Zheng, Lin; Zhu, Fuxi; Mohammed, Alshahrani | The Computer Journal | SCI四区 EI | B刊 |
98 | Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography | 何德彪 | He, Debiao; Zeadally, Sherali; Wang, Huaqun; Liu, Qin | Wireless Communications & Mobile Computing | SCI四区 | C刊 |
99 | Filament-based realistic turbulent wake synthesis | 廖祥云 (袁志勇) | Liao, Xiangyun; Si, Weixin; Xu, Biao; Yuan, Zhiyong; Wang, Qiong; Heng, Pheng-Ann | Computer Animation and Virtual Worlds | SCI四区 | C刊 |
100 | An Efficient Particle Swarm Optimization for Large-Scale Hardware/Software Co-Design System (vol 26, 1742001, 2017) | 鄢小虎 (何发智) | Yan, Xiaohu; He, Fazhi; Hou, Neng; Ai, Haojun | INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS | SCI四区 | C刊 |
101 | Improving Cross-Company Defect Prediction with Data Filtering | 余啸 (刘进) | Yu, Xiao; Liu, Jin; Peng, Weiqiang; Peng, Xingyu | INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING | SCI四区 | C刊 |
102 | Collaborator recommendation in heterogeneous bibliographic networks using random walks | 周星 (丁立新) | Zhou, Xing; Ding, Lixin; Li, Zhaokui; Wan, Wan, Runze | Information Retrieval | SCI四区 | C刊 |
103 | Efficient MapReduce algorithms for triangle listing in billion-scale graphs | 祝园园 | Zhu, Yuanyuan; Zhang, Hao; Qin, Lu; Cheng, Hong | Distributed and Parallel Databases | SCI四区 EI | C刊 |
104 | Sorting realization of well-ordered sets based on pi-calculus | 卜浩 | Bu, Hao; Zhu, Rong; Chen, Shihong; Tan, Xiaoqiong | JOURNAL OF INTELLIGENT & FUZZY SYSTEMS | SCI四区 EI | |
105 | Action Recognition with Temporal Scale-Invariant Deep Learning Framework | 陈华锋 (胡瑞敏) | Chen, Huafeng; Chen, Jun; Hu, Ruimin; Chen, Chen; Wang, Zhongyuan | CHINA COMMUNICATIONS | SCI四区 | |
106 | Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies | 何德彪 | He, Debiao; Choo, Kim-Kwang Raymond;Kumar, Neeraj | COMPUTERS & ELECTRICAL ENGINEERING | SCI四区 EI | |
107 | A GPU-based Tabu Search for Very Large Hardware/ Software Partitioning with Limited Resource Usage | 侯能 (何发智) | Neng HOU, Fazhi HE, Yi ZHOU and Haojun AI | Journal of Advanced Mechanical Design, Systems, and Manufacturing | SCI四区 | |
108 | RECENT DEVELOPMENT OF SPEECH AND AUDIO SIGNAL PROCESSING IN NETWORK COMMUNICATION | 胡瑞敏 | Hu, Ruimin; Bao, Changchun; Zhao, Qingwei; Unoki, Masashi; Shin, Jong Won | CHINA COMMUNICATIONS | SCI四区 | |
109 | Query Expansion via Intent Predicting | 黄箐 (毋国庆) | Huang, Qing; Yang, Yangrui; Wang, Xudong; Wan, Hongyan; Wang, Rui; Wu, Guoqing | INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING | SCI四区 | |
110 | Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices | 贾建卫 (张焕国) | Jia Jianwei; Liu Jinhui; Zhang Huanguo | CHINESE JOURNAL OF ELECTRONICS | SCI四区 | |
111 | PBWA: A Provenance-Based What-If Analysis Approach for Data Mining Processes | 柯洁 (董红斌) | Ke Jie; Dong Hongbin; Tan Chengyu; Liang Yiwen | CHINESE JOURNAL OF ELECTRONICS | SCI四区 | |
112 | A correlative classifiers approach based on particle filter and sample set for tracking occluded target | 李康 (何发智) | Li, Kang; He, Fa-zhi; Yu, Hai-ping; Chen, Xiao | APPLIED MATHEMATICS-A JOURNAL OF CHINESE UNIVERSITIES SERIES B | SCI四区 | |
113 | Cryptanalysis of Schemes Based on Polynomial Symmetrical Decomposition | 刘金会 (张焕国) | Liu Jinhui; Zhang Huanguo; Jia Jianwei | CHINESE JOURNAL OF ELECTRONICS | SCI四区 | |
114 | A Two-Stage Service Replica Strategy for Business Process Efficiency Optimization in Community Cloud | 罗浩宇 (刘进) | Luo Haoyu; Liu Jin; Liu Xiao | CHINESE JOURNAL OF ELECTRONICS | SCI四区 | |
115 | Enhancing Differential Evolution with Commensal Learning and Uniform Local Search | 彭虎 (吴志健) | Peng Hu; Wu Zhijian; Deng Changshou | CHINESE JOURNAL OF ELECTRONICS | SCI四区 | |
116 | Feedback Learning Based Dead Write Termination for Energy Efficient STT-RAM Caches | 沈凡凡 (何炎祥) | Shen Fanfan; He Yanxiang; Zhang Jun; Jiang Nan; Li Qing'an; Li Jianhua | CHINESE JOURNAL OF ELECTRONICS | SCI四区 | |
117 | A Novel Sparse Penalty for Singular Value Decomposition | 王才华 (刘娟) | Wang Caihua; Liu Juan; Min Wenwen; Qu Aiping | CHINESE JOURNAL OF ELECTRONICS | SCI四区 | |
118 | An Efficient Multi-hop Broadcast Protocol for Emergency Messages Dissemination in VANETs | 吴黎兵 | Wu Libing; Nie Lei; Fan Jing; He Yanxiang; Liu Qin; Wu Dan | CHINESE JOURNAL OF ELECTRONICS | SCI四区 | |
119 | Collaborative CAD Synchronization Based on a Symmetric and Consistent Modeling Procedure | 吴亦奇 (何发智) | Wu, Yiqi; He, He, Fazhi; Han, Soonhung | SYMMETRY-BASEL | SCI四区 | |
120 | High Quality Audio Object Coding Framework Based on Non-Negative Matrix Factorization | 武庭照 (胡瑞敏) | Wu, Tingzhao; Hu, Ruimin; Wang, Xiaochen; Ke, Shanfa; Wang, Jinshan | CHINA COMMUNICATIONS | SCI四区 | |
121 | Q-Learning Based Interference-Aware Channel Handoff for Partially Observable Cognitive Radio Ad Hoc Networks | 徐宁 (张沪寅) | Xu Ning; Zhang Huyin; Xu Fang; Wang Zhiyong | CHINESE JOURNAL OF ELECTRONICS | SCI四区 | |
122 | 3D Audio Coding Approach Based on Spatial Perception Features | 杨乘 (胡瑞敏) | Yang, Cheng; Hu, Ruimin; Wang, Xiaochen;Yang, Yuhong; Zhang, Maosheng; Chen, Wei | CHINA COMMUNICATIONS | SCI四区 | |
123 | Parallelization of Massive Textstream Compression Based on Compressed Sensing | 彭敏 | Peng, Min; Gao, Wang; Wang, Hua; Zhang, Yanchun; Huang, Jiajia; Xie, Qianqian; Hu, Gang; Tian, Gang | ACM TRANSACTIONS ON INFORMATION SYSTEMS | SCI四区 EI | A刊 |
124 | A Generic Table Recomputation-Based Higher-Order Masking | 唐明 | Tang, Ming; Qiu, Zhenlong; Guo, Zhipeng; Mu, Yi; Huang, Xinyi; Danger, Jean-Luc | IEEE Transactions On Computer-Aided Design Of Integrated Circuits And System(TCAD) | SCI四区 EI | A刊 |
125 | Software systems for data-centric smart city applications | 陈丹 | Chen, Dan; Wang, Lizhe; Zhou, Suiping | Software: Practice and Experience | SCI四区 EI | B刊 |
126 | A Reverse Auction Framework for Hybrid Access in Femtocell Network | 陈艳姣 | Chen, Yan-Jiao;Yin, Xiao-Yan; Zhang, Jin | Journal of Computer Science and Technology | SCI四区 EI | B刊 |
127 | Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation | 何德彪 | He, Debiao; Wang, Ding; Xie, Qi; Chen, Kefei | Science China Information Sciences | SCI四区 EI | B刊 |
128 | Cryptanalysis of a lattice based key exchange protocol | 毛少武 (张焕国) | Mao, Shaowu; Zhang, Pei; Wang, Houzhen; Zhang, Huanguo; Wu, Wanqing | Science China Information Sciences | SCI四区 EI | B刊 |
129 | A Novel Hardware/Software Partitioning Method Based on Position Disturbed Particle Swarm Optimization with Invasive Weed Optimization | 鄢小虎 (何发智) | Yan, Xiao-Hu; He, Fa-Zhi; Chen, Yi-Lin | Journal of Computer Science and Technology | SCI四区 EI | B刊 |
130 | A Prior-Free Spectrum Auction for Approximate Revenue Maximization | 应称 (黄浩) | Ying, Chen; Huang, Hao; Gopinathan, Ajay; Li, Zongpeng | The Computer Journal | SCI四区 EI | B刊 |
131 | Differential function analysis: identifying structure and activation variations in dysregulated pathways | 张传超 (刘娟) | Zhang, Chuanchao; Liu, Juan; Shi, Qianqian; Zeng, Tao; Chen, Luonan | Science China Information Sciences | SCI四区 EI | B刊 |
132 | Dynamic strategy based parallel ant colony optimization on GPUs for TSPs | 周毅 (何发智) | Zhou, Yi; He, Fazhi; Qiu, Yimin | Science China Information Sciences | SCI四区 EI | B刊 |
133 | A novel face super resolution approach for noisy images using contour feature and standard deviation prior | 陈亮 (胡瑞敏) | Chen, Liang; Hu, Ruimin; Liang, Chao; Li, Qing; Han, Zhen | Multimedia Tools and Applications | SCI四区 EI | C刊 |
134 | Face super resolution based on parent patch prior for VLQ scenarios | 陈亮 (胡瑞敏) | Chen, Liang; Hu, Ruimin; Han, Zhen; Li, Qing; Lu, Zheng | Multimedia Tools and Applications | SCI四区 EI | C刊 |
135 | HRM graph constrained dictionary learning for face image super-resolution | 黄克斌 (陈世鸿) | Huang, Kebin; Hu, Ruimin; Jiang, Junjun; Han, Zhen; Wang, Feng | Multimedia Tools and Applications | SCI四区 EI | C刊 |
136 | CHAOS: An SDN-Based Moving Target Defense System | 石源 (张焕国) | Shi, Yuan; Zhang, Huanguo; Wang, Juan; Xiao, Feng; Huang, Jianwei; Zha, Daochen; Hu, Hongxin; Yan, Fei; Zhao, Bo | Security and Communication Networks | SCI四区 EI | C刊 |
137 | A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace | 吴福生 (张焕国) | Wu, Fusheng; Zhang, Huanguo; Wang, Wengqing; Jia, Jianwei; Yuan, Shi | Security and Communication Networks | SCI四区 EI | C刊 |
138 | A secure and efficient public auditing scheme using RSA algorithm for cloud storage | 许芷岩 (吴黎兵) | Xu, Zhiyan; Wu, Libing; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; He, Debiao | The Journal of Supercomputing | SCI四区 EI | C刊 |
139 | Security analysis of a publicly verifiable data possession scheme for remote storage | 许芷岩 (吴黎兵) | Xu, Zhiyan; Wu, Libing; He, Debiao; Khan, Muhammad Khurram | The Journal of Supercomputing | SCI四区 EI | C刊 |
140 | Shape-controllable geometry completion for point cloud models | 杨龙 (肖春霞) | Yang, Long; Yan, Qingan; Xiao, Chunxia | The Visual Computer | SCI四区 EI | C刊 |
141 | A linear time algorithm for maximal clique enumeration in large sparse graphs | 余婷 (刘梦赤) | Yu, Ting; Liu, Mengchi | Information Processing Letters | SCI四区 EI | C刊 |
142 | A NEW APPROACH OF DYNAMIC CLUSTERING BASED ON PARTICLE SWARM OPTIMIZATION AND APPLICATION IN IMAGE SEGMENTATION | Dang Cong Tran (吴志健) | Dang Cong Tran; Wu, Zhijian | COMPUTING AND INFORMATICS | SCI四区 EI | |
143 | Zombie Fans Detection in Sina Microblog a Machine Learning Approach | 程斌林 (傅建明) | Cheng, Binlin; Fu, Jianming | JOURNAL OF INTERNET TECHNOLOGY | SCI四区 EI | |
144 | A MULTI-INTERSECTION MODEL AND SIGNAL TIMING PLAN ALGORITHM FOR URBAN TRAFFIC SIGNAL CONTROL | 胡文斌 | Hu, Wenbin; Wang, Huan; Du, Bo; Yan, Liping | TRANSPORT | SCI四区 EI | |
145 | Exploring Situation-Aware Method Based on Ontology Analysis for Semantic Social Network | 胡文斌 | Hu, Wenbin; Wang, Huan; Qiu, Zhenyu; Yan, Liping; Du, Bo | JOURNAL OF INTERNET TECHNOLOGY | SCI四区 EI | |
146 | A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography | 罗敏 | Luo, Min; Zhang, Yunru; Khan, Muhammad Khurram; He, Debiao | INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS | SCI四区 EI | |
147 | An efficient chaos-based 2-party key agreement protocol with provable security | 罗敏 | Luo, Min; Zhang, Yunru; Khan, Muhammad Khurram; He, Debiao | INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS | SCI四区 EI | |
148 | An Approach of Role Updating in Context-Aware Role Mining | 王健 | Wang, Jian; Zhu, Zejin; Liu, Junju; Wang, Chong; Xu, Youwei | INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH | SCI四区 EI | |
149 | Probabilistic object deputy model for uncertain data and lineage management | 王梁 (王黎维) | Wang, Liang; Wang, Liwei; Peng, Zhiyong | DATA & KNOWLEDGE ENGINEERING | SCI四区 EI | |
150 | An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices | 吴黎兵 | Wu, Libing; Zhang, Yubo; Xie, Yong; Alelaiw, Abdulhameed; Shen, Jian | WIRELESS PERSONAL COMMUNICATIONS | SCI四区 EI | |
151 | An Improved Authentication and Key Agreement scheme for Session Initial Protocol | 吴黎兵 | Wu, Libing; Fan, Jing; Xie, Yong; Wang, Jing | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | SCI四区 EI | |
152 | Cryptanalysis of an identity-based public auditing protocol for cloud storage | 吴黎兵 | Wu, Li-bing; Wang, Jing; He, De-biao; Khan, Muhammad-Khurram | FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING | SCI四区 EI | |
153 | Efficient Certificate-Based Signature Scheme for Electronic Commerce Security Using Bilinear Pairing | 吴黎兵 | Wu, Libing; Zhang, Yubo; Ren, Yongjun; He, Debiao | JOURNAL OF INTERNET TECHNOLOGY | SCI四区 EI | |
154 | Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks | 吴黎兵 | Wu, Libing; Fan, Jing; Xie, Yong; Wang, Jing; Liu, Qin | INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | SCI四区 EI | |
155 | Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network | 谢永 (吴黎兵) | Xie, Yong; Wu, Libing; Kumar, Neeraj; Shen, Jian | WIRELESS PERSONAL COMMUNICATIONS | SCI四区 EI | |
156 | EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs | 谢永 (吴黎兵) | Xie, Yong; Wu, LiBing; Shen, Jian; Alelaiwi, Abdulhameed | TELECOMMUNICATION SYSTEMS | SCI四区 EI | |
157 | A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication | 赵波 | Zhao, Bo; Xiao, Yu; Huang, Yuqing; Cui, Xiaoyu | TSINGHUA SCIENCE AND TECHNOLOGY | SCI四区 EI | |
158 | A fast mass spring model solver for high-resolution elastic objects | 郑棉仑 (袁志勇) | Zheng, Mianlun; Yuan, Zhiyong; Zhu, Weixu; Zhang, Guian | SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL | SCI四区 EI | |
159 | A Collaborative Routing Method with Internet of Vehicles for City Cars | 吴黎兵 | Wu, Li-Bing; Fan, Jing; Nie, Lei; Cui, Jian-Qun; Zou, Yi-Fei | Jisuanji Xuebao/Chinese Journal of Computers | EI | |
160 | A Deep Learning Model Enhanced with Emotion Semantics for Microblog Sentiment Analysis | 何炎祥 | He, Yan-Xiang; Sun, Song-Tao; Niu, Fei-Fei; Li, Fei | Jisuanji Xuebao/Chinese Journal of Computers | EI | |
161 | A Fast Distance Regularized Level Set Method for Segmentation Based on Multi-features | 于海平 (何发智) | Yu, Hai-Ping; He, Fa-Zhi; Pan, Yi-Teng; Chen, Xiao | Tien Tzu Hsueh Pao/Acta Electronica Sinica | EI | |
162 | A k-Nearest Neighbor Query Algorithm for Density Grid-Based Index | 章登义 | Zhang, Deng-Yi; Li, Xiang | Tien Tzu Hsueh Pao/Acta Electronica Sinica | EI | |
163 | A method for pedestrian detection by combining textual and visual information | 周炫余 (刘娟) | Zhou, Xuan-Yu; Liu, Juan; Lu, Xiao; Shao, Peng; Luo, Fei | Tien Tzu Hsueh Pao/Acta Electronica Sinica | EI | |
164 | A Method of Constructing the Model of Trusted Virtual Machine Migration | 石源 (张焕国) | Shi, Yuan; Zhang, Huanguo; Wu, Fusheng | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
165 | A Method of Node Importance Measurement in Software Network Based on the Variations of h-Index | 丁沂 (李兵) | Ding, Yi; Li, Bing; Cheng, Can; Zhao, Yuqi | Gongcheng Kexue Yu Jishu/Advanced Engineering Science | EI | |
166 | A multi-objective ant colony algorithm for deployment optimization of service-oriented application | 李琳 (应时) | Li, Lin; Ying, Shi; Dong, Bo | Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology) | EI | |
167 | A New Transfer Learning Model for Cross-Domain Recommendation | 李响 (李石君) | Wang, Jun; Li, Shi-Jun; Yang, Sha; Jin, Hong; Yu, Wei | Jisuanji Xuebao/Chinese Journal of Computers | EI | |
168 | A Novel Semisupervised Active-Learning Algorithm for Hyperspectral Image Classification | 王增茂 (杜博) | Wang, Zengmao; Du, Bo; Zhang, Lefei; Zhang, Liangpei; Jia, Xiuping | IEEE Transactions on Geoscience and Remote Sensing | EI | |
169 | A Parallel Genetic Algorithm with Dispersion Correction for HW/SW Partitioning on Multi-Core CPU and Many-Core GPU | 侯能 (何发智) | Hou, Neng; He, Fazhi; Zhou, Yi; Chen, Yilin; Yan, Xiaohu | IEEE Access | EI | |
170 | A Virtual Machine Introspection Triggering Mechanism Based on VMFUNC | 刘维杰 (王丽娜) | Liu, Weijie; Wang, Lina; Tan, Cheng; Xu, Lai | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
171 | Adaptive Estimation of Student's t-Distribution Algorithm for Large-Scale Global Optimization | 王豫峰 (董文永) | Wang, Yufeng; Dong, Wenyong; Dong, Xueshi; Wang, Hao | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
172 | An Access Control Method Supporting Multi-User Collaborative Edit in Cloud Storage | 史姣丽 (黄传河) | Shi, Jiaoli; Huang, Chuanhe; He, Kai; Shen, Xieyang; Hua, Chao | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
173 | An Adaptive Video Motion Vector Steganography Based on Macroblock Complexity | 王丽娜 | Wang, Li-Na; Xu, Yi-Bo; Zhai, Li-Ming; Ren, Yan-Zhen | Jisuanji Xuebao/Chinese Journal of Computers | EI | |
174 | An Audience Targeting Algorithm Based on Neighbor Choosing Strategy | 周孟 (朱福喜) | Zhou, Meng; Zhu, Fuxi | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
175 | An efficient approach to directly compute the exact Hausdorff distance for 3D point sets | 张德军 (何发智) | Zhang, Dejun; He, Fazhi; Han, Soonhung; Zou, Lu; Wu, Yiqi; Chen, Yilin | Integrated Computer-Aided Engineering | EI | |
176 | An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network | 吴黎兵 | Wu, Libing; Wang, Jing; Raymond Choo, Kim-Kwang; Li, Yuangang; He, Debiao | Journal of Information Security and Applications | EI | |
177 | An Event Detection Method for Social Networks Based on Evolution Fluctuations of Nodes | 王欢 (胡文斌) | Wang, Huan; Hu, Wenbin; Qiu, Zhenyu; Wu, Bi | IEEE Access | EI | |
178 | An event detection method for social networks based on hybrid link prediction and quantum swarm intelligent | 胡文斌 | Hu, Wenbin; Wang, Huan; Qiu, Zhenyu; Nie, Cong; Yan, Liping; Du, Bo | World Wide Web | EI | |
179 | Backtracking Based Method for On-line Trajectory Simplification of Moving Objects | 李想 (章登义) | Li, Xiang; Zhang, Dengyi | Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences | EI | |
180 | Big-data platform based on open source ecosystem | 雷军 (何炎祥) | Lei, Jun; Ye, Hangjun; Wu, Zesheng; Zhang, Peng; Xie, Long; He, Yanxiang | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
181 | Block-adjustment without GCPs for Large-scale Regions only Based on the Virtual Control Points | 杨波 | Yang, Bo; Wang, Mi; Pi, Yingdong | Cehui Xuebao/Acta Geodaetica et Cartographica Sinica | EI | |
182 | Convolutional Network-Based Semantic Similarity Model of Sentences | 黄江平 (姬东鸿) | Huang, Jiang-Ping; Ji, Dong-Hong | Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science) | EI | |
183 | Correlation Filtering Target Tracking Based on Online Multi-lifespan Learning | 孙航 (李晶) | Sun, Hang; Li, Jing; Du, Bo; Xiao, Ya-Fu; Hu, Yun-Ling | Tien Tzu Hsueh Pao/Acta Electronica Sinica | EI | |
184 | Differential evolution algorithm using orthogonal design opposition-based learning | 閤大海 (李元香) | Xia, Dahai; Li, Yuanxiang; Zhu, Jie | Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) | EI | |
185 | Distributed Dynamic Routing Method for Multi-layered Satellite Networks Based on Named Data Networking | 刘迪 (黄传河) | Liu, Di; Huang, Chuan-He; Chen, Xi; Li, Xin | Tien Tzu Hsueh Pao/Acta Electronica Sinica | EI | |
186 | Dual Server Identity-Based Encryption with Equality Test for Cloud Computing | 吴黎兵 | Wu, Libing; Zhang, Yubo; He, Debiao | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
187 | Elimination particle swarm optimization with hill climbing algorithm for solving large-scale hardware/software partitioning problem | 鄢小虎 (何发智) | Yan, Xiaohu; He, Fazhi; Chen, Yilin | Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition) | EI | |
188 | Emergency Message Broadcast Method Based on Huffman-Like Coding | 吴黎兵 | Wu, Libing; Fan, Jing; Wang, Jing; Nie, Lei; Wang, Hao | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
189 | Event Detection Method for Social Networks Based on Node Evolution Fluctuations | 胡文斌 | Hu, Wen-Bin; Wang, Huan; Yan, Li-Ping; Qiu, Zhen-Yu; Nie, Cong; Du, Bo | Ruan Jian Xue Bao/Journal of Software | EI | |
190 | Fault Detection Method of Underwater Junction Box Based on the Danger Theory of Immune System | 肖振华 (梁意文) | Xiao, Zhenhua; Liang, Yiwen; Tan, Chengyu; Liu, Weiwei; Zhou, Wen | Gongcheng Kexue Yu Jishu/Advanced Engineering Science | EI | |
191 | Gender identification on microblog using tag expansion | 彭庆喜 (刘梦赤) | Peng, Qingxi | Boletin Tecnico/Technical Bulletin | EI | |
192 | Group-Based Method for Influence Maximization | 张平 (彭智勇) | Zhang, Ping; Wang, Li-Wei; Peng, Zhi-Yong; Yue, Kun; Huang, Hao | Ruan Jian Xue Bao/Journal of Software | EI | |
193 | Hybrid Algorithms for Multi-Objective Balanced Traveling Salesman Problem | 董学士 (董文永) | Dong, Xueshi; Dong, Wenyong; Wang, Yufeng | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
194 | Hybrid parallel genetic strategy with two-step adjustment for HW/SW partitioning | 侯能 (何发智) | Hou, Neng; He, Fazhi | Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) | EI | |
195 | Hyper-spectral Image Rank-Reducing and Compression Based on Tensor Decomposition | 张乐飞 | Zhang, Lefei; He, Fazhi | Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University | EI | |
196 | Joint Routing and Scheduling in Cognitive Radio Vehicular Ad Hoc Networks | 张沪寅 | Zhang, Huyin; Wang, Jing; Tang, Xing | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
197 | Key Agreement Protocols of Non-Signature Authentication Based on Binary Tree | 吴福生 (张焕国) | Wu, Fusheng; Zhang, Huanguo | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
198 | Multi-label Emotion Classification for Microblog Based on CNN Feature Space | 孙松涛 (何炎祥) | Sun, Songtao; He, Yanxiang | Gongcheng Kexue Yu Jishu/Advanced Engineering Science | EI | |
199 | Neighborhood Centroid Opposition-Based Particle Swarm Optimization | 周凌云 (丁立新) | Zhou, Ling-Yun; Ding, Li-Xin; Peng, Hu; Qiang, Xiao-Li | Tien Tzu Hsueh Pao/Acta Electronica Sinica | EI | |
200 | New certificateless aggregate signature scheme with universal designated verifier | 许芷岩 (吴黎兵) | Xu, Zhi-Yan; Wu, Li-Bing; Li, Li; He, De-Biao | Tongxin Xuebao/Journal on Communications | EI | |
201 | New Spatial Interpolation Algorithm for Sparse AQI Based on Extended Field Intensity Model | 师泽源 (赵俭辉) | Shi, Zeyuan; Zhao, Jianhui; Zhang, Wenyu; Hu, Yong; Wu, Xiaoping | Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University | EI | |
202 | Non-inertial opposition-based particle swarm optimization with adaptive elite mutation | 康岚兰 (董文永) | Kang, Lan-Lan; Dong, Wen-Yong; Song, Wan-Juan; Li, Kang-Shun | Tongxin Xuebao/Journal on Communications | EI | |
203 | Overlapping Deep Web Data Source Selection Based on Stratified Sampling | 江俊彦 (吴小莹) | Jiang, Jun-Yan; Peng, Zhi-Yong; Wu, Xiao-Ying; Peng, Cheng-Chen; Wang, Min | Ruan Jian Xue Bao/Journal of Software | EI | |
204 | Person re-identification based on part feature importance | 章登义 | Zhang, Dengyi; Wang, Qian; Zhu, Bo; Wu, Xiaoping; Cao, Yu; Cai, Bo | Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University | EI | |
205 | Polarity Classification Based on Sentiment Tags | 周孟 (朱福喜) | Zhou, Meng; Zhu, Fu-Xi | Tien Tzu Hsueh Pao/Acta Electronica Sinica | EI | |
206 | Privacy Preserving Cluster Mining Method Based on Lattice | 崔一辉 (宋伟) | Cui, Yi-Hui; Song, Wei; Wang, Zhan-Bing; Shi, Cheng-Liang; Cheng, Fang-Quan | Ruan Jian Xue Bao/Journal of Software | EI | |
207 | Provably secure certificateless aggregate signature scheme in wireless roaming authentication | 许芷岩 (吴黎兵) | Xu, Zhi-Yan; Wu, Li-Bing; Li, Li; He, De-Biao | Tongxin Xuebao/Journal on Communications | EI | |
208 | Research and Implementation of Chinese Microblog Sentiment Classification | 李勇敢 (张焕国) | Li, Yong-Gan; Zhou, Xue-Guang; Sun, Yan; Zhang, Huan-Guo | Ruan Jian Xue Bao/Journal of Software | EI | |
209 | Research on Selection of Safety Message Broadcast Relay in VANET-Cellular | 吴黎兵 | Wu, Li-Bing; Liu, Bing-Yi; Nie, Lei; Fan, Jing; Xie, Yong | Jisuanji Xuebao/Chinese Journal of Computers | EI | |
210 | Security-enhanced live migration based on SGX for virtual machine | 石源 (张焕国) | Shi, Yuan; Zhang, Huan-Guo; Zhao, Bo; Yu, Zhao | Tongxin Xuebao/Journal on Communications | EI | |
211 | Self-adaptive Planning Method of Imaging Reconnaissance Satellites Area Coverage | 刘华俊 | Liu, Huajun; Cai, Bo; Zhu, Qing | Wuhan Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan University | EI | |
212 | Social bots detection on mobile social networks | 程斌林 (傅建明) | Binlin, Cheng; Jianming, Fu | International Journal of Network Security | EI | |
213 | SRAM-Assisted Wear Leveling for Emerging Non-Volatile Caches | 沈凡凡 (何炎祥) | Shen, Fan-Fan; He, Yan-Xiang; Zhang, Jun; Jiang, Nan; Li, Qing-An; Li, Jian-Hua | Jisuanji Xuebao/Chinese Journal of Computers | EI | |
214 | Stacked Convolutional Denoising Auto-Encoders for Feature Representation | 杜博 | Du, Bo; Xiong, Wei; Wu, Jia; Zhang, Lefei; Zhang, Liangpei; Tao, Dacheng | IEEE Transactions on Cybernetics | EI | |
215 | Survey on Software Binary Code Reuse Technologies | 彭国军 | Peng, Guo-Jun; Liang, Yu; Zhang, Huan-Guo; Fu, Jian-Ming | Ruan Jian Xue Bao/Journal of Software | EI | |
216 | The Malware Detection Based on Data Breach Actions | 王丽娜 | Wang, Lina; Tan, Cheng; Yu, Rongwei; Yin, Zhengguang | Jisuanji Yanjiu yu Fazhan/Computer Research and Development | EI | |
217 | The overview of learning mechanism of covariance matrix adaptation evolution strategy | 李焕哲 (吴志健) | Li, Huan-Zhe; Wu, Zhi-Jian; Wang, Shen-Wen; Guo, Zhao-Lu | Tien Tzu Hsueh Pao/Acta Electronica Sinica | EI | |
218 | Topic Representation Integrated with Event Knowledge | 孙锐 (姬东鸿) | Sun, Rui; Guo, Sheng; Ji, Dong-Hong | Jisuanji Xuebao/Chinese Journal of Computers | EI | |
219 | TSSP: A session scheduling method in TrustZone architecture | 赵波 | Zhao, Bo; Ma, Jun; Xiao, Yu; Liu, Yubo | Gongcheng Kexue Yu Jishu/Advanced Engineering Science | EI | |
220 | Two-factor wearable device authentication protocol based on PUF and IPI | 王俊 (刘树波) | Wang, Jun; Liu, Shu-Bo; Liang, Cai; Li, Yong-Kai | Tongxin Xuebao/Journal on Communications | EI | |
221 | Verifying integrity of exception handling in service-oriented software | 薛童 (应时) | Xue, Tong; Ying, Shi; Wu, Qing; Jia, Xiangyang; Hu, Xiaohui; Zhai, Xiaoying; Zhang, Tao | International Journal of Grid and Utility Computing | EI | |
222 | Virtual Trusted Platform Module Dynamic Trust Extension | 余发江 | Yu, Fa-Jiang; Chen, Lie; Zhang, Huan-Guo | Ruan Jian Xue Bao/Journal of Software | EI | |
223 | Volume preserving mesh parameterization based on optimal mass transportation | 苏科华 | Su, Kehua; Chen, Wei; Lei, Na; Zhang, Junwei; Qian, Kun; Gu, Xianfeng | CAD Computer Aided Design | EI | |
224 | vTSE: A Solution of SGX-based vTPM Secure Enhancement | 严飞 | Yan, Fei; Yu, Zhao; Zhang, Liqiang; Zhao, Bo | Gongcheng Kexue Yu Jishu/Advanced Engineering Science | EI | |
225 | Wireless sensor networks based on modular arithmetic | 陈荆亮 | Chen, Jingliang; Yatskiv, Vasyl; Sachenko, Anatoly; Su, Jun | Radioelectronics and Communications Systems | EI |
版权所有:贝博游戏平台|首页