科研论文

首页 > 科学研究  > 科研管理 > 科研论文
2017年学院期刊论文(SCI、EI、CCF)发表情况表
2018年08月28日14时 人评论
2017年学院期刊论文(CCF、SCI、EI)情况表







序号论文名称第一作者所有作者来源期刊检索分类CCF分类
1Exploring   Representativeness and Informativeness for Active Learning 杜博Du,   Bo; Wang, Zengmao; Zhang, Lefei; Zhang, Liangpei; Liu, Wei; Shen, Jialie;   Tao, DachengIEEE   Transactions on Cybernetics  SCI一区
    EI
B刊
2Parametric   and adaptive encryption of feature-based computer-aided design models for   cloud-based collaboration 蔡贤涛Cai,   X. T.; Wang, S.; Lu, X.; Li, W. D.; Liang, Y. W.INTEGRATED   COMPUTER-AIDED ENGINEERING  SCI一区
    EI

3An   efficient approach to directly compute the exact Hausdorff distance for 3D   point sets 张德军
    (何发智)
Zhang,   Dejun; He, Fazhi; Han, Soonhung; Zou, Lu; Wu, Yiqi; Chen, YilinINTEGRATED   COMPUTER-AIDED ENGINEERING  SCI一区
4Efficient   and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against   Internal Adversaries何德彪He,   Debiao; Kumar, Neeraj; Zeadally, Sherali; Vinel, Alexey; Yang, Laurence T.IEEE   TRANSACTIONS ON SMART GRID  SCI一区
    EI

5Large-scale   block adjustment without use of ground control points based on the   compensation of geometric calibration for ZY-3 images杨波Yang,   Bo; Wang, Mi; Xu, Wen; Li, Deren; Gong, Jianya; Pi, YingdongISPRS   JOURNAL OF PHOTOGRAMMETRY AND REMOTE SENSINGSCI一区
    EI

6Cost-Aware   Region-Level Data Placement in Multi-Tiered Parallel I/O Systems 何水兵 He, Shuibing; Wang, Yang; Li, Zheng; Sun,   Xian-He; Xu, ChenzhongIEEE   Transactions on Parallel and Distributed Systems(TPDS)SCI二区
    EI
A刊
7Using   MinMax-Memory Claims to Improve In-Memory Workflow Computations in the   Cloud 何水兵He,   Shuibing; Wang, Yang; Sun, Xian-He; Xu, ChengzhongIEEE   Transactions on Parallel and Distributed Systems(TPDS)SCI二区
    EI
A刊
8Multi-Layer   Quantization Control for Quality-Constrained H.265/HEVC 潘翔
    (陈震中)
Pan,   Xiang; Chen, ZhenzhongIEEE   Transactions on Image Processing(TIP)SCI二区
    EI
A刊
9Nodes'   Evolution Diversity and Link Prediction in Social Networks 王欢
    (胡文斌)
Wang,   Huan; Hu, Wenbin; Qiu, Zhenyu; Du, BoIEEE   Transactions on Knowledge and Data Engineering(TKDE)SCI二区
    EI
A刊
10Facilitating   Cloud Process Family Co-Evolution by Reusable Process Plug-in: An Open-source   Prototype冯在文Feng,   Zaiwen;Chiu, Dickson K. W.; Peng, Rong; Gong, Ping; He, Keqing;Huang, YiwangIEEE   Transactions on Services  ComputingSCI二区B刊
11Insecurity   of an identity-based public auditing protocol for the outsourced data in   cloud storage 何德彪He,   Debiao; Wang, Huaqun; Zhang, Jianhong; Wang, LinaInformation   Sciences  SCI二区
    EI
B刊
12Real-time   traffic jams prediction inspired by Biham, Middleton and Levine (BML)   model 胡文斌Hu,   Wenbin; Yan, Liping; Wang, Huan; Du, Bo; Tao, DachengInformation   SciencesSCI二区
    EI
B刊
13A   transition-based joint model for disease named entity recognition and   normalization娄银霞
    (姬东鸿)
Lou,   Yinxia; Zhang, Yue; Qian, Tao; Li, Fei; Xiong, Shufeng; Ji, DonghongBioinformaticsSCI二区B刊
14A   Novel Semisupervised Active-Learning Algorithm for Hyperspectral Image   Classification 王增茂
    (杜博)
Wang,   Zengmao; Du, Bo; Zhang, Lefei; Zhang, Liangpei; Jia, XiupingIEEE   Transactions on Geoscience and Remote Sensing  SCI二区B刊
15Real-time   tracking based on weighted compressive tracking and a cognitive memory model杜博Du,   Bo; Sun, Yujia; Wu, Chen; Zhang, Lefei; Zhang, LiangpeiSignal   Processing  SCI二区
    EI
C刊
16An   uncertainty and density based active semi-supervised learning scheme for   positive unlabeled multivariate time series classification 何国良He,   Guoliang; Li, Yifei; Zhao, WenKnowledge-Based   Systems  SCI二区
    EI
C刊
17SoC-constrained   team formation with self-organizing mechanism in social networks 史玉玲
    (彭智勇)
Shi,   Yuling; Peng, Zhiyong; Hong, Liang; Yu, QianKnowledge-Based   Systems  SCI二区
    EI
C刊
18Efficient   and secure identity-based encryption scheme with equality test in cloud   computing 吴黎兵Wu,   Libing; Zhang, Yubo; Choo, Kim-Kwang Raymond; He, DebiaoFuture   Generation Computer Systems SCI二区
    EI
C刊
19A   Joint Control-Communication Design for Reliable Vehicle Platooning in Hybrid   Traffic 刘冰艺
    (吴黎兵)
Liu,   Bingyi; Jia, Dongyao; Lu, Kejie; Ngoduy, Dong;Wang, Jianping; Wu, Libing IEEE TRANSACTIONS ON VEHICULAR   TECHNOLOGY  SCI二区
    EI

20Cloud-Assisted   Safety Message Dissemination in VANET-Cellular Heterogeneous Wireless   Network 刘冰艺
    (吴黎兵)
Liu,   Bingyi; Jia, Dongyao; Wang, Jianping; Lu, Kejie; Wu, Libing IEEE SYSTEMS JOURNAL  SCI二区
    EI

21Privacy-Preserving   Outsourced Feature Extractions in the Cloud: A Survey 王敬军
    (马于涛)
Wang,   Jingjun; Hu, Shengshan; Wang, Qian; Ma, YutaoIEEE   NETWORK  SCI二区
    EI

22H-PARAFAC:   Hierarchical Parallel Factor Analysis of Multidimensional Big Data陈丹Chen,   Dan; Hu, Yangyang; Wang, Lizhe; Zomaya, Albert Y.; Li, XiaoliIEEE   Transactions on Parallel and Distributed Systems(TPDS)SCI二区
    EI
A刊
23Batch   Identification Game Model for Invalid Signatures in Wireless Mobile Networks陈晶Chen,   Jing; He, Kun; Yuan, Quan; Xue, Guoliang; Du, Ruiying; Wang, LinaIEEE   Transactions on Mobile Computing(TMC)SCI二区
    EI
A刊
24Robust   and Discriminative Labeling for Multi-Label Active Learning Based on Maximum   Correntropy Criterion杜博Du,   Bo; Wang, Zengmao; Zhang, Lefei; Zhang, Liangpei; Tao, DachengIEEE   Transactions on Image Processing(TIP)SCI二区
    EI
A刊
25Efficient   Hierarchical Identity-Based Signature With Batch Verification for Automatic   Dependent Surveillance-Broadcast System何德彪He,   Debiao; Kumar, Neeraj; Choo, Kim-Kwang Raymond; Wu, WeiIEEE   Transactions on Information Forensics & Security(TIFS)SCI二区
    EI
A刊
26Super-Resolution   Person Re-Identification With Semi-Coupled Low-Rank Discriminant Dictionary   Learning荆晓远Jing,   Xiao-Yuan; Zhu, Xiaoke; Wu, Fei; Hu, Ruimin; You, Xinge; Wang, Yunhong; Feng,   Hui; Yang, Jing-YuIEEE   Transactions on Image Processing(TIP)SCI二区
    EI
A刊
27AMR   Steganalysis Based on Second-Order Difference of Pitch Delay任延珍Ren,   Yanzhen; Yang, Jing; Wang, Jinwei; Wang, LinaIEEE   Transactions on Information Forensics & Security(TIFS)SCI二区
    EI
A刊
28Publicly   Verifiable Computation of Polynomials Over Outsourced Data With Multiple   Sources宋伟Song,   Wei; Wang, Bing; Wang, Qian; Shi, Chengliang; Lou, Wenjing; Peng, ZhiyongIEEE   Transactions on Information Forensics & Security(TIFS)SCI二区
    EI
A刊
29THEMIS:   Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply王骞Wang,   Qian; Sun, Qihang; Ren, Kui; Jia, XiaohuaIEEE   Transactions on Mobile Computing(TMC)SCI二区
    EI
A刊
30Illumination   Decomposition for Photograph With Multiple Light Sources张玲
    (肖春霞)
Zhang,   Ling; Yan, Qingan; Liu, Zheng; Zou, Hua; Xiao, ChunxiaIEEE   Transactions on Image Processing(TIP)SCI二区
    EI
A刊
31Palette-Based   Image Recoloring Using Color Decomposition Optimization张青
    (肖春霞)
Zhang,   Qing; Xiao, Chunxia; Sun, Hanqiu; Tang, FengIEEE   Transactions on Image Processing(TIP)SCI二区
    EI
A刊
32Robust   Dual Clustering with Adaptive Manifold Regularization赵能文
    (张乐飞)
Zhao,   Nengwen; Zhang, Lefei; Du, Bo*; Zhang, Qian; You, Jane; Tao, DachengIEEE   Transactions on Knowledge and Data Engineering(TKDE)SCI二区
    EI
A刊
33A   local start search algorithm to compute exact Hausdorff Distance for   arbitrary point sets陈壹林
    (何发智)
Chen,   Yilin; He, Fazhi; Wu, Yiqi; Hou, NengPattern   RecognitionSCI二区
    EI
B刊
34PLTD:   Patch-Based Low-Rank Tensor Decomposition for Hyperspectral Images杜博Du,   Bo; Zhang, Mengfei; Zhang, Lefei; Hu, Ruimin; Tao, DachengIEEE   Transactions on MultimediaSCI二区
    EI
B刊
35Virtualized   Resource Sharing in Cloud Radio Access Networks Through Truthful Mechanisms谷思佳
    (李宗鹏)
Gu,   Sijia; Li, Zongpeng; Wu, Chuan; Zhang, HuyinIEEE   TRANSACTIONS ON COMMUNICATIONSSCI二区
    EI
B刊
36Secure   independent-update concise-expression access control for video on demand in   cloud何琨He,   Kun; Chen, Jing; Zhang, Yu; Du, Ruiying; Xiang, Yang; Hassan, Mohammad   Mehedi; Alelaiwi, AbdulhameedInformation   SciencesSCI二区
    EI
B刊
37An   event detection method for social networks based on link prediction胡文斌Hu,   Wenbin; Wang, Huan; Peng, Chao; Liang, Huanle; Du, BoInformation   SystemsSCI二区
    EI
B刊
38Coding-based   cooperative caching in on-demand data broadcast environments姬厚灵
    (毋国庆)
Ji,   Houling; Lee, Victor C. S.; Chow, Chi-Yin; Liu, Kai; Wu, GuoqingInformation   SciencesSCI二区
    EI
B刊
39Infrastructure-Assisted   Message Dissemination for Supporting Heterogeneous Driving Patterns刘冰艺
    (吴黎兵)
Liu,   Bingyi;Jia, Dongyao; Lu, Lu, Kejie; Chen, Haibo; Yang, Rongwei; Wang,   Jianping; Barnard, Yvonne; Wu, LibingIEEE   Transactions on Intelligent Transportation Systems  SCI二区
    EI
B刊
40Tell   me the truth: Practically public authentication for outsourced databases with   multi-user modification宋伟Song,   Wei; Wang, Bing; Wang, Qian; Peng, Zhiyong; Lou, WenjingInformation   SciencesSCI二区
    EI
B刊
41Combining   local and global: Rich and robust feature pooling for visual recognition熊维
    (杜博)
Xiong,   Wei; Zhang, Lefei; Du, Bo; Tao, DachengPattern   RecognitionSCI二区
    EI
B刊
42Context   Neighbor Recommender: Integrating contexts via neighbors for recommendations郑麟
    (朱福喜)
Zheng,   Lin; Zhu, Fuxi; Huang, Sheng; Xie, JinInformation   SciencesSCI二区
    EI
B刊
43Local   Pattern Collocations Using Regional Co-occurrence Factorization邹勤Zou,   Qin; Ni, Lihao; Wang, Qian; Hu, Zhongwen; Li, Qingquan; Wang, SongIEEE   Transactions on MultimediaSCI二区
    EI
B刊
44Action   recognition by saliency-based dense sampling徐增敏
    (胡瑞敏)
Xu,   Zengmin; Hu, Ruimin; Chen, Jun; Chen,Chen, Chen; Chen, Huafeng; Li, Hongyang;   Sun, Qingquan Neurocomputing  SCI二区
    EI
C刊
45Anonymous   Authentication for Wireless Body Area Networks With Provable Security何德彪He,   Debiao; Zeadally, Sherali; Kumar, Neeraj;Lee, Jong-HyoukIEEE   SYSTEMS JOURNAL  SCI二区
    EI

46A   Multiobjective Box-Covering Algorithm for Fractal Modularity on Complex   Networks吴泓润
    (王峰)
Hongrun   Wu, Li Kuang, Feng Wang, Qi Rao, Maoguo Gong, Yuanxiang LiApplied   Soft ComputingSCI二区
    EI

47A   Novel Nonlinear Parameter Estimation Method of Soft Tissues童倩倩
    (袁志勇)
Tong,   Qianqian; Yuan, Zhiyong; Zheng, Mianlun; Liao, Xiangyun; Zhu, Weixu; Zhang,   GuianGENOMICS   PROTEOMICS & BIOINFORMATICSSCI   Q1
48HARL:   Optimizing Parallel File Systems with Heterogeneity-Aware Region-Level Data   Layout 何水兵He,   Shuibing; Wang, Yang; Sun, Xian-He; Xu, ChengzhongIEEE   Transactions on Computers(TOC)SCI三区
    EI
A刊
49An   event detection method for social networks based on hybrid link prediction   and quantum swarm intelligent 胡文斌Hu,   Wenbin; Wang, Huan; Qiu, Zhenyu; Nie, Cong; Yan, Liping; Du, BoWorld   Wide Web Journal  SCI三区B刊
50False   data separation for data security in smart grids 黄浩Huang,   Hao; Yan, Qian; Zhao, Yao; Lu, Wei; Liu, Zhenguang;Li, ZongpengKnowledge   and Information Systems  SCI三区B刊
51Volume   preserving mesh parameterization based on optimal mass transportation 苏科华Su,   Kehua; Chen, Wei; Lei, Na; Zhang, Junwei; Qian, Kun; Gu, XianfengComputer-Aided   DesignSCI三区B刊
52Dynamic   sampling of text streams and its application in text analysis 田纲Tian,   Gang; Huang, Jiajia; Peng, Min; Zhu, Jiahui; Zhang, YanchunKnowledge   and Information Systems  SCI三区B刊
53Exploring   mutual information-based sentimental analysis with kernel-based extreme   learning machine for stock prediction 王峰Wang,   Feng; Zhang, Yongquan; Rao, Qi; Li, Kangshun; Zhang, HaoSoft   ComputingSCI三区
    EI
C刊
54Cost-effective   barrier coverage formation in heterogeneous wireless sensor networks 王志波Wang,   Zhibo; Cao, Qing; Qi, Hairong; Chen, Honglong; Wang, QianAd   hoc NetworksSCI三区
    EI
C刊
55Predicting   potential drug-drug interactions by integrating chemical, biological,   phenotypic and network data 章文Zhang,   Wen; Chen, Yanlin; Liu, Feng; Luo, Fei; Tian, Gang; Li, XiaohongBMC   BioinformaticsSCI三区
    EI
C刊
56Predicting   drug-disease interactions by semi-supervised graph cut algorithm and   three-layer data integration吴光生
    (刘娟)
Wu,   Guangsheng; Liu, Juan; Wang, CaihuaBMC   MEDICAL GENOMICSSCI三区
57A   unified frame of predicting side effects of drugs by using linear   neighborhood similarity章文Zhang,   Wen; Yue, Xiang; Liu, Feng; Chen, Yanlin; Tu, Shikui; Zhang, XiningBMC   SYSTEMS BIOLOGY  SCI三区
58Drug-target   interaction prediction through label propagation with linear neighborhood   information章文Wen   Zhang, Yanlin Chen, Dingfang LiMoleculesSCI三区
59Predicting   human splicing branchpoints by combining sequence-derived features and   multi-label learning methods 章文Zhang,   Wen; Zhu, Xiaopeng; Fu, Yu; Tsuji, Junko; Weng, ZhipingBMC   BIOINFORMATICSSCI三区
    EI

60Keyword   Search for Building Service-Based Systems何强He,   Qiang; Zhou, Rui; Zhang, Xuyun; Wang, Yanchun; Ye, Dayong; Chen, Feifei;   Grundy, John C.; Yang, YunIEEE   Transactions on Software Engineering(TSE)SCI三区
    EI
A刊
61Heterogeneity-Aware   Collective I/O for Parallel I/O Systems with Hybrid HDD/SSD Servers何水兵He,   Shuibing; Wang, Yang; Sun, Xian-He; Huang, Chuanhe; Xu, ChenzhongIEEE   Transactions on Computers(TOC)SCI三区
    EI
A刊
62An   Improved SDA Based Defect Prediction Framework for Both Within-Project and   Cross-Project Class-Imbalance Problems荆晓远Jing,   Xiao-Yuan; Wu, Fei; Dong, Xiwei; Xu, BaowenIEEE   Transactions on Software Engineering(TSE)SCI三区
    EI
A刊
63Nopol:   Automatic Repair of Conditional Statement Bugs in Java Programs玄跻峰Xuan,   Jifeng; Martinez, Matias; DeMarco, Favio; Clement, Maxime; Lamelas Marcote,   Sebastian; Durieux, Thomas; Le Berre, Daniel; Monperrus, MartinIEEE   Transactions on Software Engineering(TSE)SCI三区
    EI
A刊
64An   encryption approach for product assembly models蔡贤涛Cai,   X. T.; Wang, S.; Lu, X.; Li, W. D.Advanced   Engineering InformaticsSCI三区
    EI
B刊
65Analysis   of handover authentication protocols for mobile wireless networks using   identity-based public key cryptography何德彪He,   Debiao; Zeadally, Sherali; Wu, Libing; Wang, HuaqunComputer   Networks  SCI三区
    EI
B刊
66A   probabilistic method for emerging topic tracking in Microblog stream黄佳佳
    (彭敏)
Huang,   Jiajia*; Peng, Min; Wang, Hua; Cao, Jinli; Gao, Wang; Zhang, XiuzhenWorld   Wide Web Journal  SCI三区
    EI
B刊
67A   string-wise CRDT algorithm for smart and large-scale collaborative editing   systems吕晓
    (何发智)
Lv,   Xiao; He, Fazhi; Cai, Weiwei; Cheng, YuanAdvanced   Engineering Informatics  SCI三区
    EI
B刊
68Software   effort estimation based on open source projects: Case study of Github齐富民
    (荆晓远)
Qi,   Fumin; Jing, Xiao-Yuan; Zhu, Xiaoke; Xie, Xiaoyuan; Xu, Baowen; Ying, ShiInformation   and Software Technology  SCI三区
    EI
B刊
69DRank:   A semi-automated requirements prioritization method based on preferences and   dependencies邵飞
    (彭蓉)
Shao,   Fei; Peng, Rong; Lai, Han; Wang, BangchaoJournal   of Systems and SoftwareSCI三区
    EI
B刊
70A   privacy-preserved full-text retrieval algorithm over encrypted data for cloud   storage applications宋伟Song,   Wei; Wang, Bing; Wang, Qian; Peng, Zhiyong; Lou, Wenjing; Cui, YihuiJournal   of Parallel and Distributed Computing SCI三区
    EI
B刊
71deExploit:   Identifying misuses of input data to diagnose memory-corruption exploits at   the binary level汪润
    (王丽娜)
Wang,   Run; Liu, Pei; Zhao, Lei; Cheng, Yueqiang; Wang, LinaJournal   of Systems and SoftwareSCI三区
    EI
B刊
72Achieving   location error tolerant barrier coverage for wireless sensor networks王志波Wang,   Zhibo; Chen, Honglong; Cao, Qing; Qi, Qi, Hairong; Wang, Zhi; Wang, QianComputer   NetworksSCI三区
    EI
B刊
73An   industrial case study on an architectural assumption documentation framework杨晨
    (梁鹏)
Yang,   Chen; Liang, Peng; Avgeriou, Paris; Eliasson, Ulf; Heldal, Rogardt;   Pelliccione, Patrizio; Bi, TingtingJournal   of Systems and SoftwareSCI三区
    EI
B刊
74The   Bayesian Network based program dependence graph and its application to fault   localization余啸
    (刘进)
Yu,   Xiao; Liu, Jin; Yang, Zijiang; Liu, XiaoJournal   of Systems and SoftwareSCI三区
    EI
B刊
75A   General Framework to Design Secure Cloud Storage Protocol Using Homomorphic   Encryption Scheme张健Jian   Zhang, Yang Yang, Yanjiao Chen, Jing Chen, Qian ZhangComputer   NetworksSCI三区
    EI
B刊
76Video   Shadow Removal Using Spatio-temporal Illumination Transfer张玲
    (肖春霞)
Zhang,   Ling; Zhu, Yao; Liao, Bin; Xiao, ChunxiaComputer   Graphics ForumSCI三区
    EI
B刊
77Opposition-based   particle swarm optimization with adaptive mutation strategy董文永Dong,   Wenyong; Kang, Lanlan; Zhang, WenshengSoft   ComputingSCI三区
    EI
C刊
78Efficient   certificateless anonymous multi-receiver encryption scheme for mobile devices何德彪He,   Debiao; Wang, Huaqun; Wang, Lina; Shen, Jian; Yang, XianzhaoSoft   ComputingSCI三区
    EI
C刊
79A   neural joint model for entity and relation extraction from biomedical text李霏
    (姬东鸿)
Li,   Fei; Zhang, Meishan; Fu, Guohong; Ji, DonghongBMC   Bioinformatics  SCI三区
    EI
C刊
80Long   short-term memory RNN for biomedical named entity recognition吕晨
    (姬东鸿)
Lyu,   Chen; Chen, Bo; Ren, Yafeng; Ji, DonghongBMC   BioinformaticsSCI三区
    EI
C刊
81FIR   digital filter design using improved particle swarm optimization based on   refraction principle邵鹏
    (吴志健)
Shao,   Peng; Wu, Zhijian; Zhou, Xuanyu; Dang Cong TranSoft   Computing  SCI三区
    EI
C刊
82Comprehensive   Association Rules Mining of Health Examination Data with an Extended   FP-Growth Method王博薇
    (陈丹)
   
Wang,   Bowei;Chen, Dan; Shi, Benyun; Zhang, Jindong; Duan, Yifu; Chen, Jingying ;   Hu, RuiminMOBILE   NETWORKS & APPLICATIONSSCI三区
    EI
C刊
83Secure   public data auditing scheme for cloud storage in smart city吴黎兵Wu,   Libing; Wang, Jing; Kumar, Neeraj; He, DebiaoPersonal   and Ubiquitous Computing  SCI三区
    EI
C刊
84Comparative   network stratification analysis for identifying functional interpretable   network biomarkers张传超
    (刘娟)
Zhang,   Chuanchao; Liu, Juan; Shi, Qianqian; Zeng, Tao; Chen, LuonanBMC   BioinformaticsSCI三区
    EI
C刊
85A   Three-Stage Matting Method陈晓
    (何发智)
Chen,   Xiao; He, Fazhi; Yu, HaipingIEEE   ACCESSSCI三区
    EI

86A   Supervised Learning and Control Method to Improve Particle Swarm Optimization   Algorithms董文永Dong,   Wenyong; Zhou, Zhou, MengChuIEEE   TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS  SCI三区
    EI

87Extracting   Fine-Grained Location with Temporal Awareness in Tweets: A Two-Stage Approach李晨亮Li,   Chenliang; Sun, AixinJOURNAL   OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY SCI三区
    EI

88Security   Analysis of Two Password-Authenticated Multi-Key Exchange Protocols罗敏Luo,   Min; Zhou, Xiaotong; Li, Li; Choo, Kim-Kwang Raymond; He, DebiaoIEEE   ACCESS  SCI三区
    EI

89A   Web Service Discovery Approach Based on Common Topic Groups Extraction王健Wang,   Jian; Gao, Panpan; Ma, Yutao; He, Keqing; Hung, Patrick C. K.IEEE   ACCESS  SCI三区
    EI

90Influence   of trust in the spreading of information吴泓润
    (马于涛)
Wu,   Hongrun; Arenas, Alex; Gomez, SergioPHYSICAL   REVIEW ESCI三区
    EI

91Enhancing   Topic Modeling for Short Texts with Auxiliary
    Word Embeddings
李晨亮Li,   Chenliang; Duan, Yu; Wang, Haoran ;Zhang, Zhiqian;Sun, Aixin;Ma, ZongyangACM   Transactions on Information SystemsSCI四区
    EI
A刊
92PFD-A   Flexible Higher-Order Masking Scheme唐明Tang,   Ming; Guo, Zhipeng; Heuser, Annelie; Ren, Yanzhen; Li, Jie; Danger, Jean-LucIEEE   Transactions On Computer-Aided Design Of Integrated Circuits And System(TCAD)SCI四区
    EI
A刊
93Brain   big data processing with massively parallel computing technology: challenges   and opportunities陈丹Chen,   Dan; Hu, Yangyang; Cai, Chang; Zeng, Ke; Li, XiaoliSoftware:   Practice and Experience  SCI四区B刊
94A   cloud-based taxi trace mining framework for smart city 刘进Liu,   Jin; Yu, Xiao; Xu, Zheng; Choo, Kim-Kwang Raymond; Hong, Liang; Cui, XiaohuiSoftware:   Practice and ExperienceSCI四区B刊
95A   sensitive object-oriented approach to big surveillance data compression for   social security applications in smart cities肖晶Xiao,   Jing; Wang, Zhongyuan; Chen, Yu; Liao, Liang; Xiao, Jun; Zhan, Gen; Hu,   RuiminSoftware:   Practice and ExperienceSCI四区B刊
96Developer   recommendation on bug commenting: a ranking approach for the developer   crowd 玄跻峰Xuan,   Jifeng; Jiang, He; Zhang, Hongyu; Ren, ZhileiScience   China Information SciencesSCI四区
    EI
B刊
97Attribute   and Global Boosting: A Rating Prediction Method in Context-Aware   Recommendation郑麟
    (朱福喜)
Zheng,   Lin; Zhu, Fuxi; Mohammed, AlshahraniThe   Computer JournalSCI四区
    EI
B刊
98Lightweight   Data Aggregation Scheme against Internal Attackers in Smart Grid Using   Elliptic Curve Cryptography 何德彪He,   Debiao; Zeadally, Sherali; Wang, Huaqun; Liu, QinWireless   Communications & Mobile Computing  SCI四区C刊
99Filament-based   realistic turbulent wake synthesis廖祥云
    (袁志勇)
Liao,   Xiangyun; Si, Weixin; Xu, Biao; Yuan, Zhiyong; Wang, Qiong; Heng, Pheng-AnnComputer   Animation and Virtual Worlds  SCI四区C刊
100An   Efficient Particle Swarm Optimization for Large-Scale Hardware/Software   Co-Design System (vol 26, 1742001, 2017)鄢小虎
    (何发智)
Yan,   Xiaohu; He, Fazhi; Hou, Neng; Ai, HaojunINTERNATIONAL   JOURNAL OF COOPERATIVE INFORMATION SYSTEMSSCI四区C刊
101Improving   Cross-Company Defect Prediction with Data Filtering余啸
    (刘进)
Yu,   Xiao; Liu, Jin; Peng, Weiqiang; Peng, XingyuINTERNATIONAL   JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERINGSCI四区C刊
102Collaborator   recommendation in heterogeneous bibliographic networks using random walks周星
    (丁立新)
Zhou,   Xing; Ding, Lixin; Li, Zhaokui; Wan, Wan, RunzeInformation   RetrievalSCI四区C刊
103Efficient   MapReduce algorithms for triangle listing in billion-scale graphs 祝园园Zhu,   Yuanyuan; Zhang, Hao; Qin, Lu; Cheng, HongDistributed   and Parallel Databases  SCI四区
    EI
C刊
104Sorting   realization of well-ordered sets based on pi-calculus卜浩Bu,   Hao; Zhu, Rong; Chen, Shihong; Tan, XiaoqiongJOURNAL   OF INTELLIGENT & FUZZY SYSTEMS  SCI四区
    EI

105Action   Recognition with Temporal Scale-Invariant Deep Learning Framework陈华锋
    (胡瑞敏)
Chen,   Huafeng; Chen, Jun; Hu, Ruimin; Chen, Chen; Wang, ZhongyuanCHINA   COMMUNICATIONS  SCI四区
106Introduction   to the Special Section on Security and Privacy in Wearable and Embedded   Technologies何德彪He,   Debiao; Choo, Kim-Kwang Raymond;Kumar, NeerajCOMPUTERS   & ELECTRICAL ENGINEERINGSCI四区
    EI

107A   GPU-based Tabu Search for Very Large Hardware/ Software Partitioning with   Limited Resource Usage侯能
    (何发智)
Neng   HOU, Fazhi HE, Yi ZHOU and Haojun AIJournal   of Advanced Mechanical Design, Systems, and Manufacturing SCI四区
108RECENT   DEVELOPMENT OF SPEECH AND AUDIO SIGNAL PROCESSING IN NETWORK COMMUNICATION胡瑞敏Hu,   Ruimin; Bao, Changchun; Zhao, Qingwei; Unoki, Masashi; Shin, Jong WonCHINA   COMMUNICATIONS  SCI四区
109Query   Expansion via Intent Predicting黄箐
    (毋国庆)
Huang,   Qing; Yang, Yangrui; Wang, Xudong; Wan, Hongyan; Wang, Rui; Wu, GuoqingINTERNATIONAL   JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERINGSCI四区
110Cryptanalysis   of a Key Exchange Protocol Based on Commuting Matrices 贾建卫
    (张焕国)
Jia   Jianwei; Liu Jinhui; Zhang HuanguoCHINESE   JOURNAL OF ELECTRONICS  SCI四区
111PBWA:   A Provenance-Based What-If Analysis Approach for Data Mining Processes柯洁
    (董红斌)
Ke   Jie; Dong Hongbin; Tan Chengyu; Liang YiwenCHINESE   JOURNAL OF ELECTRONICS  SCI四区
112A   correlative classifiers approach based on particle filter and sample set for   tracking occluded target李康
    (何发智)
Li,   Kang; He, Fa-zhi; Yu, Hai-ping; Chen, XiaoAPPLIED   MATHEMATICS-A JOURNAL OF CHINESE UNIVERSITIES SERIES BSCI四区
113Cryptanalysis   of Schemes Based on Polynomial Symmetrical Decomposition刘金会
    (张焕国)
Liu   Jinhui; Zhang Huanguo; Jia JianweiCHINESE   JOURNAL OF ELECTRONICS  SCI四区
114A   Two-Stage Service Replica Strategy for Business Process Efficiency   Optimization in Community Cloud 罗浩宇
    (刘进)
Luo   Haoyu; Liu Jin; Liu XiaoCHINESE   JOURNAL OF ELECTRONICS  SCI四区
115Enhancing   Differential Evolution with Commensal Learning and Uniform Local Search彭虎
    (吴志健)
Peng   Hu; Wu Zhijian; Deng ChangshouCHINESE   JOURNAL OF ELECTRONICS  SCI四区
116Feedback   Learning Based Dead Write Termination for Energy Efficient STT-RAM   Caches 沈凡凡
    (何炎祥)
Shen   Fanfan; He Yanxiang; Zhang Jun; Jiang Nan; Li Qing'an; Li JianhuaCHINESE   JOURNAL OF ELECTRONICS  SCI四区
117A   Novel Sparse Penalty for Singular Value Decomposition王才华
    (刘娟)
Wang   Caihua; Liu Juan; Min Wenwen; Qu AipingCHINESE   JOURNAL OF ELECTRONICS  SCI四区
118An   Efficient Multi-hop Broadcast Protocol for Emergency Messages Dissemination   in VANETs 吴黎兵Wu   Libing; Nie Lei; Fan Jing; He Yanxiang; Liu Qin; Wu DanCHINESE   JOURNAL OF ELECTRONICS  SCI四区
119Collaborative   CAD Synchronization Based on a Symmetric and Consistent Modeling Procedure吴亦奇
    (何发智)
Wu,   Yiqi; He, He, Fazhi; Han, SoonhungSYMMETRY-BASELSCI四区
120High   Quality Audio Object Coding Framework Based on Non-Negative Matrix   Factorization 武庭照
    (胡瑞敏)
Wu,   Tingzhao; Hu, Ruimin; Wang, Xiaochen; Ke, Shanfa; Wang, JinshanCHINA   COMMUNICATIONS  SCI四区
121Q-Learning   Based Interference-Aware Channel Handoff for Partially Observable Cognitive   Radio Ad Hoc Networks徐宁
    (张沪寅)
Xu   Ning; Zhang Huyin; Xu Fang; Wang ZhiyongCHINESE   JOURNAL OF ELECTRONICSSCI四区
1223D   Audio Coding Approach Based on Spatial Perception Features杨乘
    (胡瑞敏)
Yang,   Cheng; Hu, Ruimin; Wang, Xiaochen;Yang, Yuhong; Zhang, Maosheng; Chen, WeiCHINA   COMMUNICATIONSSCI四区
123Parallelization   of Massive Textstream Compression Based on Compressed Sensing彭敏Peng,   Min; Gao, Wang; Wang, Hua; Zhang, Yanchun; Huang, Jiajia; Xie, Qianqian; Hu,   Gang; Tian, GangACM   TRANSACTIONS ON INFORMATION SYSTEMSSCI四区
    EI
A刊
124A   Generic Table Recomputation-Based Higher-Order Masking唐明Tang,   Ming; Qiu, Zhenlong; Guo, Zhipeng; Mu, Yi; Huang, Xinyi; Danger, Jean-LucIEEE   Transactions On Computer-Aided Design Of Integrated Circuits And System(TCAD)SCI四区
    EI
A刊
125Software   systems for data-centric smart city applications陈丹Chen,   Dan; Wang, Lizhe; Zhou, SuipingSoftware:   Practice and ExperienceSCI四区
    EI
B刊
126A   Reverse Auction Framework for Hybrid Access in Femtocell Network陈艳姣Chen,   Yan-Jiao;Yin, Xiao-Yan; Zhang, JinJournal   of Computer Science and TechnologySCI四区
    EI
B刊
127Anonymous   handover authentication protocol for mobile wireless networks with   conditional privacy preservation何德彪He,   Debiao; Wang, Ding; Xie, Qi; Chen, KefeiScience   China Information SciencesSCI四区
    EI
B刊
128Cryptanalysis   of a lattice based key exchange protocol毛少武
    (张焕国)
Mao,   Shaowu; Zhang, Pei; Wang, Houzhen; Zhang, Huanguo; Wu, WanqingScience   China Information SciencesSCI四区
    EI
B刊
129A   Novel Hardware/Software Partitioning Method Based on Position Disturbed   Particle Swarm Optimization with Invasive Weed Optimization鄢小虎
    (何发智)
Yan,   Xiao-Hu; He, Fa-Zhi; Chen, Yi-LinJournal   of Computer Science and TechnologySCI四区
    EI
B刊
130A   Prior-Free Spectrum Auction for Approximate Revenue Maximization应称
    (黄浩)
Ying,   Chen; Huang, Hao; Gopinathan, Ajay; Li, ZongpengThe   Computer Journal  SCI四区
    EI
B刊
131Differential   function analysis: identifying structure and activation variations in   dysregulated pathways张传超
    (刘娟)
Zhang,   Chuanchao; Liu, Juan; Shi, Qianqian; Zeng, Tao; Chen, LuonanScience   China Information Sciences  SCI四区
    EI
B刊
132Dynamic   strategy based parallel ant colony optimization on GPUs for TSPs周毅
    (何发智)
Zhou,   Yi; He, Fazhi; Qiu, YiminScience   China Information SciencesSCI四区
    EI
B刊
133A   novel face super resolution approach for noisy images using contour feature   and standard deviation prior陈亮
    (胡瑞敏)
Chen,   Liang; Hu, Ruimin; Liang, Chao; Li, Qing; Han, ZhenMultimedia   Tools and Applications  SCI四区
    EI
C刊
134Face   super resolution based on parent patch prior for VLQ scenarios陈亮
    (胡瑞敏)
Chen,   Liang; Hu, Ruimin; Han, Zhen; Li, Qing; Lu, ZhengMultimedia   Tools and ApplicationsSCI四区
    EI
C刊
135HRM   graph constrained dictionary learning for face image super-resolution黄克斌
    (陈世鸿)
Huang,   Kebin; Hu, Ruimin; Jiang, Junjun; Han, Zhen; Wang, FengMultimedia   Tools and ApplicationsSCI四区
    EI
C刊
136CHAOS:   An SDN-Based Moving Target Defense System石源
    (张焕国)
Shi,   Yuan; Zhang, Huanguo; Wang, Juan; Xiao, Feng; Huang, Jianwei; Zha, Daochen;   Hu, Hongxin; Yan, Fei; Zhao, BoSecurity   and Communication Networks  SCI四区
    EI
C刊
137A   New Method to Analyze the Security of Protocol Implementations Based on Ideal   Trace吴福生
    (张焕国)
Wu,   Fusheng; Zhang, Huanguo; Wang, Wengqing; Jia, Jianwei; Yuan, ShiSecurity   and Communication NetworksSCI四区
    EI
C刊
138A   secure and efficient public auditing scheme using RSA algorithm for cloud   storage许芷岩
    (吴黎兵)
Xu,   Zhiyan; Wu, Libing; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; He,   DebiaoThe   Journal of Supercomputing  SCI四区
    EI
C刊
139Security   analysis of a publicly verifiable data possession scheme for remote storage许芷岩
    (吴黎兵)
Xu,   Zhiyan; Wu, Libing; He, Debiao; Khan, Muhammad KhurramThe   Journal of SupercomputingSCI四区
    EI
C刊
140Shape-controllable   geometry completion for point cloud models杨龙
    (肖春霞)
Yang,   Long; Yan, Qingan; Xiao, ChunxiaThe   Visual Computer  SCI四区
    EI
C刊
141A   linear time algorithm for maximal clique enumeration in large sparse graphs余婷
    (刘梦赤)
Yu,   Ting; Liu, MengchiInformation   Processing Letters  SCI四区
    EI
C刊
142A   NEW APPROACH OF DYNAMIC CLUSTERING BASED ON PARTICLE SWARM OPTIMIZATION AND   APPLICATION IN IMAGE SEGMENTATIONDang   Cong Tran
    (吴志健)
Dang   Cong Tran; Wu, ZhijianCOMPUTING   AND INFORMATICS  SCI四区
    EI

143Zombie   Fans Detection in Sina Microblog a Machine Learning Approach程斌林
    (傅建明)
Cheng,   Binlin; Fu, JianmingJOURNAL   OF INTERNET TECHNOLOGY  SCI四区
    EI

144A   MULTI-INTERSECTION MODEL AND SIGNAL TIMING PLAN ALGORITHM FOR URBAN TRAFFIC   SIGNAL CONTROL胡文斌Hu,   Wenbin; Wang, Huan; Du, Bo; Yan, LipingTRANSPORTSCI四区
    EI

145Exploring   Situation-Aware Method Based on Ontology Analysis for Semantic Social Network胡文斌Hu,   Wenbin; Wang, Huan; Qiu, Zhenyu; Yan, Liping; Du, BoJOURNAL   OF INTERNET TECHNOLOGYSCI四区
    EI

146A   secure and efficient identity-based mutual authentication scheme with smart   card using elliptic curve cryptography罗敏Luo,   Min; Zhang, Yunru; Khan, Muhammad Khurram; He, DebiaoINTERNATIONAL   JOURNAL OF COMMUNICATION SYSTEMS  SCI四区
    EI

147An   efficient chaos-based 2-party key agreement protocol with provable security罗敏Luo,   Min; Zhang, Yunru; Khan, Muhammad Khurram; He, DebiaoINTERNATIONAL   JOURNAL OF COMMUNICATION SYSTEMS  SCI四区
    EI

148An   Approach of Role Updating in Context-Aware Role Mining王健Wang,   Jian; Zhu, Zejin; Liu, Junju; Wang, Chong; Xu, YouweiINTERNATIONAL   JOURNAL OF WEB SERVICES RESEARCHSCI四区
    EI

149Probabilistic   object deputy model for uncertain data and lineage management王梁
    (王黎维)
Wang,   Liang; Wang, Liwei; Peng, ZhiyongDATA   & KNOWLEDGE ENGINEERINGSCI四区
    EI

150An   Efficient and Secure Identity-Based Authentication and Key Agreement Protocol   with User Anonymity for Mobile Devices吴黎兵Wu,   Libing; Zhang, Yubo; Xie, Yong; Alelaiw, Abdulhameed; Shen, JianWIRELESS   PERSONAL COMMUNICATIONS  SCI四区
    EI

151An   Improved Authentication and Key Agreement scheme for Session Initial Protocol吴黎兵Wu,   Libing; Fan, Jing; Xie, Yong; Wang, JingKSII   TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS  SCI四区
    EI

152Cryptanalysis   of an identity-based public auditing protocol for cloud storage吴黎兵Wu,   Li-bing; Wang, Jing; He, De-biao; Khan, Muhammad-KhurramFRONTIERS   OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERINGSCI四区
    EI

153Efficient   Certificate-Based Signature Scheme for Electronic Commerce Security Using   Bilinear Pairing吴黎兵Wu,   Libing; Zhang, Yubo; Ren, Yongjun; He, DebiaoJOURNAL   OF INTERNET TECHNOLOGY  SCI四区
    EI

154Efficient   location-based conditional privacy-preserving authentication scheme for   vehicle ad hoc networks吴黎兵Wu,   Libing; Fan, Jing; Xie, Yong; Wang, Jing; Liu, QinINTERNATIONAL   JOURNAL OF DISTRIBUTED SENSOR NETWORKS  SCI四区
    EI

155Analysis   and Improvement of a Privacy-Aware Handover Authentication Scheme for   Wireless Network谢永
    (吴黎兵)
Xie,   Yong; Wu, Libing; Kumar, Neeraj; Shen, JianWIRELESS   PERSONAL COMMUNICATIONS  SCI四区
    EI

156EIAS-CP:   new efficient identity-based authentication scheme with conditional   privacy-preserving for VANETs谢永
    (吴黎兵)
Xie,   Yong; Wu, LiBing; Shen, Jian; Alelaiwi, AbdulhameedTELECOMMUNICATION   SYSTEMS  SCI四区
    EI

157A   Private User Data Protection Mechanism in TrustZone Architecture Based on   Identity Authentication赵波Zhao,   Bo; Xiao, Yu; Huang, Yuqing; Cui, XiaoyuTSINGHUA   SCIENCE AND TECHNOLOGY  SCI四区
    EI

158A   fast mass spring model solver for high-resolution elastic objects郑棉仑
    (袁志勇)
Zheng,   Mianlun; Yuan, Zhiyong; Zhu, Weixu; Zhang, GuianSIMULATION-TRANSACTIONS   OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL  SCI四区
    EI

159A   Collaborative Routing Method with Internet of Vehicles for City Cars吴黎兵Wu,   Li-Bing; Fan, Jing; Nie, Lei; Cui, Jian-Qun; Zou, Yi-FeiJisuanji   Xuebao/Chinese Journal of ComputersEI
160A   Deep Learning Model Enhanced with Emotion Semantics for Microblog Sentiment   Analysis何炎祥He,   Yan-Xiang; Sun, Song-Tao; Niu, Fei-Fei; Li, FeiJisuanji   Xuebao/Chinese Journal of ComputersEI
161A   Fast Distance Regularized Level Set Method for Segmentation Based on   Multi-features于海平
    (何发智)
Yu,   Hai-Ping; He, Fa-Zhi; Pan, Yi-Teng; Chen, XiaoTien   Tzu Hsueh Pao/Acta Electronica SinicaEI
162A   k-Nearest Neighbor Query Algorithm for Density Grid-Based Index章登义Zhang,   Deng-Yi; Li, XiangTien   Tzu Hsueh Pao/Acta Electronica SinicaEI
163A   method for pedestrian detection by combining textual and visual information周炫余
    (刘娟)
Zhou,   Xuan-Yu; Liu, Juan; Lu, Xiao; Shao, Peng; Luo, FeiTien   Tzu Hsueh Pao/Acta Electronica SinicaEI
164A   Method of Constructing the Model of Trusted Virtual Machine Migration石源
    (张焕国)
Shi,   Yuan; Zhang, Huanguo; Wu, FushengJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
165A   Method of Node Importance Measurement in Software Network Based on the   Variations of h-Index丁沂
    (李兵)
Ding,   Yi; Li, Bing; Cheng, Can; Zhao, YuqiGongcheng   Kexue Yu Jishu/Advanced Engineering ScienceEI
166A   multi-objective ant colony algorithm for deployment optimization of   service-oriented application李琳
    (应时)
Li,   Lin; Ying, Shi; Dong, BoZhongnan   Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science   and Technology)EI
167A   New Transfer Learning Model for Cross-Domain Recommendation李响
    (李石君)
Wang,   Jun; Li, Shi-Jun; Yang, Sha; Jin, Hong; Yu, WeiJisuanji   Xuebao/Chinese Journal of ComputersEI
168A   Novel Semisupervised Active-Learning Algorithm for Hyperspectral Image   Classification王增茂
    (杜博)
Wang,   Zengmao; Du, Bo; Zhang, Lefei; Zhang, Liangpei; Jia, XiupingIEEE   Transactions on Geoscience and Remote SensingEI
169A   Parallel Genetic Algorithm with Dispersion Correction for HW/SW Partitioning   on Multi-Core CPU and Many-Core GPU侯能
    (何发智)
Hou,   Neng; He, Fazhi; Zhou, Yi; Chen, Yilin; Yan, XiaohuIEEE   AccessEI
170A   Virtual Machine Introspection Triggering Mechanism Based on VMFUNC刘维杰
    (王丽娜)
Liu,   Weijie; Wang, Lina; Tan, Cheng; Xu, LaiJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
171Adaptive   Estimation of Student's t-Distribution Algorithm for Large-Scale Global   Optimization王豫峰
    (董文永)
Wang,   Yufeng; Dong, Wenyong; Dong, Xueshi; Wang, HaoJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
172An   Access Control Method Supporting Multi-User Collaborative Edit in Cloud   Storage史姣丽
    (黄传河)
Shi,   Jiaoli; Huang, Chuanhe; He, Kai; Shen, Xieyang; Hua, ChaoJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
173An   Adaptive Video Motion Vector Steganography Based on Macroblock Complexity王丽娜Wang,   Li-Na; Xu, Yi-Bo; Zhai, Li-Ming; Ren, Yan-ZhenJisuanji   Xuebao/Chinese Journal of ComputersEI
174An   Audience Targeting Algorithm Based on Neighbor Choosing Strategy周孟
    (朱福喜)
Zhou,   Meng; Zhu, FuxiJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
175An   efficient approach to directly compute the exact Hausdorff distance for 3D   point sets张德军
    (何发智)
Zhang,   Dejun; He, Fazhi; Han, Soonhung; Zou, Lu; Wu, Yiqi; Chen, YilinIntegrated   Computer-Aided EngineeringEI
176An   efficient provably-secure identity-based authentication scheme using bilinear   pairings for Ad hoc network吴黎兵Wu,   Libing; Wang, Jing; Raymond Choo, Kim-Kwang; Li, Yuangang; He, DebiaoJournal   of Information Security and ApplicationsEI
177An   Event Detection Method for Social Networks Based on Evolution Fluctuations of   Nodes王欢
    (胡文斌)
Wang,   Huan; Hu, Wenbin; Qiu, Zhenyu; Wu, BiIEEE   AccessEI
178An   event detection method for social networks based on hybrid link prediction   and quantum swarm intelligent胡文斌Hu,   Wenbin; Wang, Huan; Qiu, Zhenyu; Nie, Cong; Yan, Liping; Du, BoWorld   Wide WebEI
179Backtracking   Based Method for On-line Trajectory Simplification of Moving Objects李想
    (章登义)
Li,   Xiang; Zhang, DengyiHunan   Daxue Xuebao/Journal of Hunan University Natural SciencesEI
180Big-data   platform based on open source ecosystem雷军
    (何炎祥)
Lei,   Jun; Ye, Hangjun; Wu, Zesheng; Zhang, Peng; Xie, Long; He, YanxiangJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
181Block-adjustment   without GCPs for Large-scale Regions only Based on the Virtual Control Points杨波Yang,   Bo; Wang, Mi; Pi, YingdongCehui   Xuebao/Acta Geodaetica et Cartographica SinicaEI
182Convolutional   Network-Based Semantic Similarity Model of Sentences黄江平
    (姬东鸿)
Huang,   Jiang-Ping; Ji, Dong-HongHuanan   Ligong Daxue Xuebao/Journal of South China University of Technology (Natural   Science)EI
183Correlation   Filtering Target Tracking Based on Online Multi-lifespan Learning孙航
    (李晶)
Sun,   Hang; Li, Jing; Du, Bo; Xiao, Ya-Fu; Hu, Yun-LingTien   Tzu Hsueh Pao/Acta Electronica SinicaEI
184Differential   evolution algorithm using orthogonal design opposition-based learning閤大海
    (李元香)
Xia,   Dahai; Li, Yuanxiang; Zhu, JieHuazhong   Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science   and Technology (Natural Science Edition)EI
185Distributed   Dynamic Routing Method for Multi-layered Satellite Networks Based on Named   Data Networking刘迪
    (黄传河)
Liu,   Di; Huang, Chuan-He; Chen, Xi; Li, XinTien   Tzu Hsueh Pao/Acta Electronica SinicaEI
186Dual   Server Identity-Based Encryption with Equality Test for Cloud Computing吴黎兵Wu,   Libing; Zhang, Yubo; He, DebiaoJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
187Elimination   particle swarm optimization with hill climbing algorithm for solving   large-scale hardware/software partitioning problem鄢小虎
    (何发智)
Yan,   Xiaohu; He, Fazhi; Chen, YilinDongnan   Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural   Science Edition)EI
188Emergency   Message Broadcast Method Based on Huffman-Like Coding吴黎兵Wu,   Libing; Fan, Jing; Wang, Jing; Nie, Lei; Wang, HaoJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
189Event   Detection Method for Social Networks Based on Node Evolution Fluctuations胡文斌Hu,   Wen-Bin; Wang, Huan; Yan, Li-Ping; Qiu, Zhen-Yu; Nie, Cong; Du, BoRuan   Jian Xue Bao/Journal of SoftwareEI
190Fault   Detection Method of Underwater Junction Box Based on the Danger Theory of   Immune System肖振华
    (梁意文)
Xiao,   Zhenhua; Liang, Yiwen; Tan, Chengyu; Liu, Weiwei; Zhou, WenGongcheng   Kexue Yu Jishu/Advanced Engineering ScienceEI
191Gender   identification on microblog using tag expansion彭庆喜
    (刘梦赤)
Peng,   QingxiBoletin   Tecnico/Technical BulletinEI
192Group-Based   Method for Influence Maximization张平
    (彭智勇)
Zhang,   Ping; Wang, Li-Wei; Peng, Zhi-Yong; Yue, Kun; Huang, HaoRuan   Jian Xue Bao/Journal of SoftwareEI
193Hybrid   Algorithms for Multi-Objective Balanced Traveling Salesman Problem董学士
    (董文永)
Dong,   Xueshi; Dong, Wenyong; Wang, YufengJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
194Hybrid   parallel genetic strategy with two-step adjustment for HW/SW partitioning侯能
    (何发智)
Hou,   Neng; He, FazhiHuazhong   Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science   and Technology (Natural Science Edition)EI
195Hyper-spectral   Image Rank-Reducing and Compression Based on Tensor Decomposition张乐飞Zhang,   Lefei; He, FazhiWuhan   Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan   UniversityEI
196Joint   Routing and Scheduling in Cognitive Radio Vehicular Ad Hoc Networks张沪寅Zhang,   Huyin; Wang, Jing; Tang, XingJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
197Key   Agreement Protocols of Non-Signature Authentication Based on Binary Tree吴福生
    (张焕国)
Wu,   Fusheng; Zhang, HuanguoJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
198Multi-label   Emotion Classification for Microblog Based on CNN Feature Space孙松涛
    (何炎祥)
Sun,   Songtao; He, YanxiangGongcheng   Kexue Yu Jishu/Advanced Engineering ScienceEI
199Neighborhood   Centroid Opposition-Based Particle Swarm Optimization周凌云
    (丁立新)
Zhou,   Ling-Yun; Ding, Li-Xin; Peng, Hu; Qiang, Xiao-LiTien   Tzu Hsueh Pao/Acta Electronica SinicaEI
200New   certificateless aggregate signature scheme with universal designated verifier许芷岩
    (吴黎兵)
Xu,   Zhi-Yan; Wu, Li-Bing; Li, Li; He, De-BiaoTongxin   Xuebao/Journal on CommunicationsEI
201New   Spatial Interpolation Algorithm for Sparse AQI Based on Extended Field   Intensity Model师泽源
    (赵俭辉)
Shi,   Zeyuan; Zhao, Jianhui; Zhang, Wenyu; Hu, Yong; Wu, XiaopingWuhan   Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan   UniversityEI
202Non-inertial   opposition-based particle swarm optimization with adaptive elite mutation康岚兰
    (董文永)
Kang,   Lan-Lan; Dong, Wen-Yong; Song, Wan-Juan; Li, Kang-ShunTongxin   Xuebao/Journal on CommunicationsEI
203Overlapping   Deep Web Data Source Selection Based on Stratified Sampling江俊彦
    (吴小莹)
Jiang,   Jun-Yan; Peng, Zhi-Yong; Wu, Xiao-Ying; Peng, Cheng-Chen; Wang, MinRuan   Jian Xue Bao/Journal of SoftwareEI
204Person   re-identification based on part feature importance章登义Zhang,   Dengyi; Wang, Qian; Zhu, Bo; Wu, Xiaoping; Cao, Yu; Cai, BoWuhan   Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan   UniversityEI
205Polarity   Classification Based on Sentiment Tags周孟
    (朱福喜)
Zhou,   Meng; Zhu, Fu-XiTien   Tzu Hsueh Pao/Acta Electronica SinicaEI
206Privacy   Preserving Cluster Mining Method Based on Lattice崔一辉
    (宋伟)
Cui,   Yi-Hui; Song, Wei; Wang, Zhan-Bing; Shi, Cheng-Liang; Cheng, Fang-QuanRuan   Jian Xue Bao/Journal of SoftwareEI
207Provably   secure certificateless aggregate signature scheme in wireless roaming   authentication许芷岩
    (吴黎兵)
Xu,   Zhi-Yan; Wu, Li-Bing; Li, Li; He, De-BiaoTongxin   Xuebao/Journal on CommunicationsEI
208Research   and Implementation of Chinese Microblog Sentiment Classification李勇敢
    (张焕国)
Li,   Yong-Gan; Zhou, Xue-Guang; Sun, Yan; Zhang, Huan-GuoRuan   Jian Xue Bao/Journal of SoftwareEI
209Research   on Selection of Safety Message Broadcast Relay in VANET-Cellular吴黎兵Wu,   Li-Bing; Liu, Bing-Yi; Nie, Lei; Fan, Jing; Xie, YongJisuanji   Xuebao/Chinese Journal of ComputersEI
210Security-enhanced   live migration based on SGX for virtual machine石源
    (张焕国)
Shi,   Yuan; Zhang, Huan-Guo; Zhao, Bo; Yu, ZhaoTongxin   Xuebao/Journal on CommunicationsEI
211Self-adaptive   Planning Method of Imaging Reconnaissance Satellites Area Coverage刘华俊Liu,   Huajun; Cai, Bo; Zhu, QingWuhan   Daxue Xuebao (Xinxi Kexue Ban)/Geomatics and Information Science of Wuhan   UniversityEI
212Social   bots detection on mobile social networks程斌林
    (傅建明)
Binlin,   Cheng; Jianming, FuInternational   Journal of Network SecurityEI
213SRAM-Assisted   Wear Leveling for Emerging Non-Volatile Caches沈凡凡
    (何炎祥)
Shen,   Fan-Fan; He, Yan-Xiang; Zhang, Jun; Jiang, Nan; Li, Qing-An; Li, Jian-HuaJisuanji   Xuebao/Chinese Journal of ComputersEI
214Stacked   Convolutional Denoising Auto-Encoders for Feature Representation杜博Du,   Bo; Xiong, Wei; Wu, Jia; Zhang, Lefei; Zhang, Liangpei; Tao, DachengIEEE   Transactions on CyberneticsEI
215Survey   on Software Binary Code Reuse Technologies彭国军Peng,   Guo-Jun; Liang, Yu; Zhang, Huan-Guo; Fu, Jian-MingRuan   Jian Xue Bao/Journal of SoftwareEI
216The   Malware Detection Based on Data Breach Actions王丽娜Wang,   Lina; Tan, Cheng; Yu, Rongwei; Yin, ZhengguangJisuanji   Yanjiu yu Fazhan/Computer Research and DevelopmentEI
217The   overview of learning mechanism of covariance matrix adaptation evolution   strategy李焕哲
    (吴志健)
Li,   Huan-Zhe; Wu, Zhi-Jian; Wang, Shen-Wen; Guo, Zhao-LuTien   Tzu Hsueh Pao/Acta Electronica SinicaEI
218Topic   Representation Integrated with Event Knowledge孙锐
    (姬东鸿)
Sun,   Rui; Guo, Sheng; Ji, Dong-HongJisuanji   Xuebao/Chinese Journal of ComputersEI
219TSSP:   A session scheduling method in TrustZone architecture赵波Zhao,   Bo; Ma, Jun; Xiao, Yu; Liu, YuboGongcheng   Kexue Yu Jishu/Advanced Engineering ScienceEI
220Two-factor   wearable device authentication protocol based on PUF and IPI王俊
    (刘树波)
Wang,   Jun; Liu, Shu-Bo; Liang, Cai; Li, Yong-KaiTongxin   Xuebao/Journal on CommunicationsEI
221Verifying   integrity of exception handling in service-oriented software薛童
    (应时)
Xue,   Tong; Ying, Shi; Wu, Qing; Jia, Xiangyang; Hu, Xiaohui; Zhai, Xiaoying;   Zhang, TaoInternational   Journal of Grid and Utility ComputingEI
222Virtual   Trusted Platform Module Dynamic Trust Extension余发江Yu,   Fa-Jiang; Chen, Lie; Zhang, Huan-GuoRuan   Jian Xue Bao/Journal of SoftwareEI
223Volume   preserving mesh parameterization based on optimal mass transportation苏科华Su,   Kehua; Chen, Wei; Lei, Na; Zhang, Junwei; Qian, Kun; Gu, XianfengCAD   Computer Aided DesignEI
224vTSE:   A Solution of SGX-based vTPM Secure Enhancement严飞Yan,   Fei; Yu, Zhao; Zhang, Liqiang; Zhao, BoGongcheng   Kexue Yu Jishu/Advanced Engineering ScienceEI
225Wireless   sensor networks based on modular arithmetic陈荆亮Chen,   Jingliang; Yatskiv, Vasyl; Sachenko, Anatoly; Su, JunRadioelectronics   and Communications SystemsEI


版权所有 ©武汉大学计算机学院 | copyright © 2008-2018 School of Computer Science, Wuhan University. All Rights Reserved.