云顶4008网站科研论著统计

发布日期:2016-01-05      浏览次数:49

在国内外重要的学术期刊和学术会议上发表论文300多篇,其中被SCI、EI和ISTP收录论文近200篇。近几年申请国家发明专利10余项,获软件著作权登记3项,在世界顶级出版社出版学术专著及章节10余部。

代表性论文如下

1Transaction的文章

[1] 李玮玮,温蜜,苏洲,张宽, Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023

[2] 李春林,李晋国,张凯,闫芫,宁建廷, Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy, IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023

[3] 邓敏俊,张凯,Pengfei Wu,温蜜,宁建廷, DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes ,IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023

[4] 卢芳芳,张志浩,赵帅,林先田,张正宇,金杯,顾卫燕,陈菁菁,吴晓鑫, CMM: A CNN-MLP Model for COVID-19 Lesion Segmentation and Diagnosis Grading, IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2023

[5] 郎济林,张传林,夏飞,王国栋,王翔宇,   Self-Disciplined Nonsmooth Coordination Control for Battery Energy Storage System in Autonomous DC Microgrids Towards Large-Signal Stability, IEEE TRANSACTIONS ON SMART GRID, 2023

[6] 董鑫,张传林,冒建亮,Yunda Yan,Jun Yang, Generalized Dynamic Predictive Control for Nonlinear Systems Subject to Mismatched Disturbances With Application to PMSM Drives, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023

[7] 徐江伟,王亮亮,温蜜,龙宇,陈克非, DPB-MA: Low-latency Message Authentication Scheme based on Distributed Verification and Priority in Vehicular Ad Hoc Network, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023

[8] 张凯,王羲文,宁建廷,温蜜,Rongxing Lu, Multi-Client Boolean File Retrieval with Adaptable Authorization Switching for Secure Cloud Search Services, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023

[9] 张凯,王羲文,宁建廷,巩俊卿,黄欣沂, Secure Cloud-Assisted Data Pub/Sub Service with Fine-grained Bilateral Access Control, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023

[10] 张凯,王羲文,宁建廷,黄欣沂, Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023

[11] 栗风永,裴振家,张新鹏,秦川, Image manipulation localization using multi-scale feature fusion and adaptive edge supervision, IEEE TRANSACTIONS ON MULTIMEDIA, 2022

[12] 栗风永,裴振家,张新鹏,秦川, JPEG Reversible Data Hiding Using Dynamic Distortion Optimizing with Frequency Priority Reassignment, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022

[13] 董鑫,张传林,杨天骁,杨俊, Nonsmooth Dynamic Tracking Control for Nonlinear Systems with Mismatched Disturbances: Algorithm and Practice, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2022

[14] 王啸宇,董鑫,牛玺童,张传林,崔承刚,黄晶晶,林鹏峰, Toward Balancing Dynamic Performance and System Stability for DC Microgrids: A New Decentralized Adaptive Control Strategy, IEEE TRANSACTIONS ON SMART GRID,     2022

[15] 王真,章国发,刘鹏,叶靖,江建慧, Accurate Reliability Boundary Evaluation of Approximate Arithmetic Circuit, IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2022

[16] 张凯,姜哲,宁建廷,黄欣沂, Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022

[17] 田秀霞,李灿,赵波, A Novel Classification Model SA-MPCNN for Power Equipment Defect Text, ACM TRANSACTIONS ON ASIAN AND LOW-RESOURCE LANGUAGE INFORMATION PROCESSING, 2021

[18] Lv, Huanhuan,温蜜,Lu, Rongxing,李晋国, An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021

[19] 张凯,温蜜,Rongxing Lu,陈克非, Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-enforced Authorization, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021

[20] 毕忠勤,马园园,杨小贤,周平, Research on wireless robot path planning under edge computing considering multistep searching and inflection points, TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021

[21] 曹渝昆,胡清清,施慧,张艳丽, Prediction of wind power generation base on neural network in consideration of the fault time, IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2019

[22]  Fengyong LiK.Wu, J.S.Lei, M.Wen, Z.Q.Bi, C.H.Gu, Steganalysis over Large-scale Social Networks with High-order Joint Features and Clustering Ensembles, accepted by Transactions on Information Forensics & Security2015.

[23]  Xiuxia Tian, Ling Huang, Tony Wu, Xiaoling Wang, Aoying Zhou. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework. accepted by IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), DOI:10.1109/TKDE. 2015.2457903.

[24]  Weimin Wei, Shuozhong Wang, Xinpeng Zhang and Zhenjun Tang. Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Trans. on Information Forensics and Security, 2010, 5(3): 507-517.

[25]  M.Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, PaRQ: A Privacy- preserving Range Query Scheme over Encrypted Metering Data for Smart Grid, accepted by IEEE Transactions on Emerging Topics in Computing.


2、SCI收录论文:

[21]  Lin Zhu, Longbing Cao, Jie Yang,Jingsheng Lei,Evolving Soft Subspace Clustering,Applied Soft Computing, 2014, 14(1): 210-228.

[22]  Jingsheng Lei, Yanghui Rao, Qing Li, Towards Building a Social Emotion Detection System for Online News, Future Generation Computer Systems,37, pp. 438-448, 2014.

[23]  Yanghui Rao, Jingsheng Lei, Qing Li, Building emotional dictionary for sentiment analysisof online news, World Wide Web, 16(12):1-12,2013.

[24]  Ting Jin, Haoran Xie, Jingsheng Lei, Qing Li, Xiaodong Li, Xudong Mao, and Yanghui Rao, Finding Dominating Set from Verbal Contextual Graph for Personalized Search in Folksonomy, WI 2013, IEEE CS,2013.

[25]  Jiuchuan Jiang, Darong Lai, Yungui Zhang, Jingsheng Lei, A tag-based solution for datasensing conflicts in multiple sensing agent systems, Advances in Engineering Software, 47(2),pp 170-177, 2012.

[26]  Yao Lu, Xingliang Ni, Jingsheng Lei, Xiaojun Quan, Wenyin Liu and Yinlong Xu, Semantic Link Analysis for Finding Answer Experts, Journal of Information Science and Engineering, 27(2), pp 197-211, 2011.

[27]  Jian Yu, Shuigeng Zhou, Lipo Wang, Jingsheng Lei, Advances in fuzzy sets and knowledge discovery, Computers & Mathematics with Applications, 57(6) , 2009, 865-876.

[28]  Yingxu Wang, Jason Huang, Jingsheng Lei, The Formal Design Models of a Universal Array (UA) and its Implementation, IJSSCI , 3(3): 69-89 (2011).

[29]  Jingtao Yao, Qingfu Zhang, Jingsheng Lei, Recent developments in natural computation, Neurocomputing, 72(13-15) , 2009, 2833-2839.

[30]  Zhumin Chen,Jingsheng Lei, A Cross-Language Focused Crawling Algorithm Basedon Multiple Relevance Prediction Strategies, Computers & Mathematics with Applications,57(6), 2009, 1057-1072.

[31]  B. Sun,X.M. Shan,K. Wu,Y. Xiao,Anomaly detection based secure in-network aggregation for wireless sensor networks,IEEE Systems Journal,2013,7(1):13-25 ,

[32]  Y. Yuan,K. Wu,W.J. Jia,On the queueing behavior of inter-flow asynchronous network coding,Elsevier International Journal of Computer Communications(COMCOM),2012,35(13):1535-1548 .

[33]  X.M. Wang, K. Wu, J.P. Wang, and Y.L. Xu, Cape: coded anycast packet forwarding for wireless mesh networks, ACM/Springer Wireless Networks (WINET) Journal, 17(5), pp. 1273-1285, July 2011.

[34]  Jing Ren, Kejie Lu, Sheng Wang, Xiong Wang, Shizhong Xu, Lemin Li, and Shucheng Liu, VICN: A Versatile Deployment Framework for Information-Centric Networks, IEEE Network, Vol. 28, No. 3, pp. 26–34, 2014.

[35]  Huan Li, Kejie Lu, and Shicong Meng, BigProvision: A Provisioning Framework for Big Data Analytics, IEEE Network, to appear, 2015.

[36]  Hui Guo, Rose Qingyang Hu, Kejie Lu, and Yi Qian, Backbone construction with relay node placement for energy-efficient wireless sensor networks, Wireless Communications and Mobile Computing, Vol. 14, No. 9, pp. 922-936,2014.

[37]  Zeyu Zheng, Shengli Fu, Kejie Lu, Jianping Wang, Biao Chen, On the relay selection for cooperative wireless networks with physical-layer network coding, Springer Wireless Networks, Vol. 18, No. 6, pp. 653-665, 2012

[38]  Xun Xiao, Shucheng Liu, Kejie Lu, Jianping Wang, MaxDiv: an optimal randomized spectrum access with maximum diversity scheme for cognitive radio networks, International Journal of Communication Systems, Vol. 25, No. 7, pp.832-848, 2012.

[39]  Shengli Fu, Kejie Lu, Tao Zhang, Yi Qian, and Haisao-Hwa Chen, Cooperative wireless networks based on physical layer network coding, IEEE Wireless Communications, Vol. 17, No. 6, pp. 86-95, 2010.

[40]  Jianping Wang, Chunming Qiao, Yan Li, and Kejie Lu, On Guaranteed VoD Services in Next Generation Optical Access Networks, IEEE Journal on Selected Areas in Communications, Vol. 28, No. 6, pp. 875-888, 2010.

[41]  Bo Rong, Yi Qian, Kejie Lu, Rose Qingyang Hu, and Kadoch Michel, Multipath Routing over Wireless Mesh Networks for Multiple Description Video Transmission, IEEE Journal on Selected Areas in Communications, Vol. 28, No.3, pp. 321-331, 2010.

[42]  M.Wen, Jingsheng. Lei,Zhongqin Bi, SSE: a secure searchable encryption scheme for urban sensing and querying, International Journal of Distributed Sensor Network, accepted, 2013

[43]  M.Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing, Security and Communication Networks, published online, DOI: 10.1002/sec.699. (SCI)

[44]  M.Wen, K. Zhang, J. Lei, X. Liang, R. Deng, and X. Shen, CIT: A Credit-based Incentive Tariff Scheme with Fraud-traceability for Smart Grid, Security and Communication Networks , published online, DOI: 10.1002/sec.895.

[45]  Mi Wen, Jingsheng Lei, Zhongqin Bi, Jing Li. EAPA: An efficient authentication protocol against pollution attack for smart grid. Peer-to-Peer Networking and Applications. Published online, (SCI) 8(6), pp:1082-1089,2015.

[46]  Hongwei Li, Yi Yang, Mi Wen, Hongwei Luo, and Rongxing Lu, EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market, KSII Transactions on Internet and Information Systems, 2014, vol. 8, no. 11: 3937- 3954 .

[47]  M.Wen, YF.Zheng, WJun.Ye , KF.Chen, WDong.Qiu, A key management protocol with robust continuity for sensor networks, Computer Standards & Interfaces, 31(4), pp: 642-647,2009.

[48]  M.Wen, L.Dong, YF.Zheng and KF.Chen, Towards provable security for Data Transmission Protocols in Sensor Network, Journal of Information Science and Engineering, 25(1), pp:319-333. 2009.

[49]  Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha, Xiaoling Wang. DualAcE: fine-grained dual access control enforcement with multi‐privacy guarantee in DaaS. Security and Communication Networks, 8(8):1494–1508,2015

[50]  Jinguo Li, Yaping Lin, Gang Wang, Rui Li, Bo Yin. Privacy and Integrity Preserving Skyline Queries in Tiered Sensor Networks. Security and Communication Networks, 2013, 7(7): 1177-1188.

[51]  Lin Zhu. Evolving Soft Subspace Clustering, Applied Soft Computing, 2014, 14(1): 210-228.

[52]  Lin Zhu. Generalized Fuzzy C-Means Clustering Algorithm with Improved Fuzzy Partitions. IEEE Trans. on Cybernetics, 2009, 39(3): 578-591.

[53]  Lin Zhu . Improving the Accuracy of Predicting Disulfide Connectivity by Feature Selection. Journal of Computational Chemistry, 2010.

[54]  Lin Zhu. Multi-label Learning for Prediction of Human Protein Sub-cellular Localizations, The Protein Journal , 2009.

[55]  Fangfang Lu, Qunfei Zhao, Genke Yang. A no-reference image quality assessment approach based on steerable pyramid decomposition using natural scene statistics. Neural Computing and Applications, DOI: 10.1007/s00521-014-1699-5, 2014.

[56]  Fangfang Lu, Qunfei Zhao, Genke Yang, Nonsubsampled contourlet transform based algorithm for no-reference image quality assessment, Optical Engineering, 50(6), pp. 067010-1-067010-10, 2011.

[57]  Weimin Wei, Liping Sun, Dongjie Tang, Yan Zhao, Hongjiao Li. A Survey of Passive Image Forensics. Communications in Computer and Information Science, 2012, 345:45-55.

[58]  Yang Yindong, Guan Haibing, An Efficient Adapting Virtual Intermediate Instruction Set towards the Optimized DBT System, Journal of Central South University of Technology, (2012) 19: 3118−3128.

[59]  Yindong Yang,Erzhou Zhu, Planning for Fast DBT in Distributed Virtual Execution Environment, Scientific Research and Essays, 29 February, 2012, Vol. 7(8), pp. 939-946.  

[60]  Yindong Yang,Refine Item-Based Collaborative Filtering Algorithms With Skew Amplification,  accepted by Journal of Information Science and Engineering, 2015.

[61]  Fengyong Li,Digital image steganalysis based on local textural features and double dimensionality reduction, accepted by Security and Communication Networks,2015.

[62]  Ting Zhang, Reconstruction of porous media using multiple-point statistics with data conditioning, accepted by Stochastic Environmental Research and Risk Assessment.2015.

[63]  Ting Zhang, Stochastic simulation of patterns using ISOMAP for dimensionality reduction of training images, accepted by Computers & Geosciences,2015.

[64]  Ting Zhang, GPU-accelerated 3D reconstruction of porous media using multiple-point statistics, accepted by Computational Geosciences,2015.

[65]  Hong.Jiao. Li, S. Wang,X.X. Tian & C.C. Sun. Dynamic Remote Attestation based on System Call Sequence with Arguments. WIT Transactions on Information and Communication. Vol 65(1):1743-3517

[66]  Y. Wang,D. Gu,J. Xu,M. Wen,L. Deng,RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow,China Communications,2010,7(6):10-16

[67]  Detian Zhang, Chi-Yin Chow, Qing Li, Yukun Cao. SMashQ: A Spatial Mashup Framework for k-NN Queries in Time-Dependent Road Networks, an International Journal on Distributed and Parallel Databases (DAPD), 2012.

[68]  Haiming Li, Xiaoping Qiu,  Yajun Du. The Semantics of Lattice-valued Propositional Logic system lp(X),GESTS International Transactions on Computer Science and Engineering. 2008,30(1) pp. 152-160

[69]  Li Haiming, Qin Keyun, Xu Yang, L-fuzzy Set Categories Based on Generalized Extension Principle, The Journal of Fuzzy Mathematics, 2002, 10(2): 399-410.



3、申请的相关专利如下:

  1. 施柳,栗风永等,机密信息的游动编码隐藏方法,专利号:ZL201110171393.9 ,授权日期:2015年2月25日

  2. 温蜜,徐琳等,智能电网数据采集方法,申请号:201510421008.X

  3. 余江,张新鹏,栗风永,王朔中,程航,基于校验码的加密域无损可逆信息隐藏方法,申请号:201310198542.X

  4. 王勇等,一种基于行为特征自动机模型的软件漏洞检测方法, 国家发明专利,申请号:201210162896.4

  5. 田秀霞等,社交网络中潜在好友查询方法, 国家发明专利,申请号:201210179600.X

  6. 温蜜等,基于传感器网络中协商式组密钥建立的方法,专利号: ZL.200810201833.9

  7. 温蜜等,传感器网络中同时建立对密钥和组密钥的方法,申请号:200810201834.3

  8. 温蜜等,一种可自愈并带头节点撤销的密钥分发方法,申请号:201010504839.0

  9. 温蜜等,一种传感器网络中基于中国剩余定理的组密钥建立方法,申请号: 201210037322.0

  10. 管海兵, 梁阿磊, 杨吟冬等, 利用剖分信息生成超级块的方法, 专利号: 200810201939.9

  11. 赵群飞, 卢芳芳, 人脸检测中非特征区域图像处理的方法,2012.4, 中国, ZL201010266992.4.

  12. 魏为民等. 发明名称:数字图像缩放因子的盲检测方法, 专利号:ZL200810203981.4,授权公告日:2011 年11 月23 日.

  13. 陈轶,张新鹏,王朔中,魏为民.发明名称:基于连“1”特性的JPEG 图像再次编码检测方法,专利号:ZL200810202976.1,授权公告日:2010 年08 月18 日.


4、软件著作权:

  1. 魏为民,国家版权局计算机软件著作权登记证书, 软件名称: 基于DTMF 的按键音识别软件 V1.0。证书号: 软著登字第0604132 号, 登记号: 2013SR098370

  2. 魏为民,国家版权局计算机软件著作权登记证书, 软件名称: TrueMark 数字图像克隆检测软件 V1.0。证书号: 软著登字第0443572 号, 登记号: 2012SR075536

  3. 刘大明,国家版权局计算机软件著作权登记证书, 软件名称: 多通道数据采集及监控系统V1.0, 软件著作权,受理号:2013R11S008506


5、出版的专著及章节如下:

  1. M.Wen, Jingsheng. Lei, X. Liang, R. Lu and X. Shen, Querying over Encrypted Data in Smart Grid, Springer, In press, 2013.

  2. Y.H. Lee, K. Wu, and J.M. Chen, “Information collection and storage in wireless multimedia sensor networks,” book chapter in Handbook on Sensor Networks, Y. Xiao et al. (Eds.), World Scientific Publishing, 2010, ISBN: 978-981-283-730-1.

  3. I. Nikolaidis and K. Wu (editors), Proc. of 9th Int. Conf. on Ad Hoc Networks and Wireless (ADHOC-NOW), Aug. 2010, ISBN: 978-3642147845.

  4. F. Wang, J.C. Liu, and K. Wu, “Cooperative Overlay Networking for Streaming Media Content,” book chapter in Cooperative Networking, M.S. Obaidat and S. Misra (Eds.), Wiley, 2011, ISBN: 978-0470749159

  5. Jingsheng Lei, Fu Lee WangHepu DengDuoqian Miao, Artificial Intelligence and Computational Intelligence, Springer,  2012, ISBN 978-3-642-33477-1

  6. Fu Lee Wang, Jingsheng Lei, Zhiguo GongXiangfeng Luo ,  Web Information Systems and Mining, Springer, 2012, ISBN 978-3-642-33468-9

  7. Jingsheng Lei, Fu Lee Wang, Mo Li and Yuan Luo, Network Computing and Information Security , Springer, 2012, ISBN 978-3642352102

  8. Fu Lee Wang, Jingsheng Lei, Rynson W.H. Lau and Jingxin Zhang, Multimedia and Signal Processing, Springer, 2012, ISBN 978-3642352850

  9. Mi Wen, Shui Yu, Jinguo Li, Hongwei Li, Kejie Lu,Big Data Storage Security, to appear, Big Data Concepts, Theories and Applications, 2015. 

  10. Jian Wang, Zhen-qiang Yao, Mingde Yin, Lin Mei, Yao-jie Zhu, Quan-zhang An, Fang-fang Lu, Principles and applications of Rided-2D-A robust edge detection method in range images, Patrick S.P. Wang (ed) Pattern Recognition, Machine Intelligence and Biometrics, Beijing: Higher Education Press, pp. 139-167, 2011.