序号 | 论文题目 | 所有作者 | 刊名, 年, 卷(期): 起止页码 | 论文类别 |
sci-I收录论文1篇 | ||||
1 | Cluster validation method for determining the number of clusters in categorical sequences | 陈黎飞,郭躬德,姜青山,叶艳芳 | IEEE Transactions on Neural Networks and Learning Systems | sci-I |
sci-II收录论文21篇 | ||||
2 | A generalization of the HSS-based sequential two-stage method for solving non-Hermitian saddle point problems | 马昌凤,陈彩荣 | Numerical Algorithms | sci-II |
3 | The dimensional splitting iteration methods for solving saddle point problems arising from time-harmonic eddy current models | 马昌凤,柯艺芬 | Applied Mathematics and Computation | sci-II |
4 | SOR-like iteration method for solving absolute value equations | 马昌凤,柯艺芬 | Applied Mathematics and Computation | sci-II |
5 | An inexact modified relaxed splitting preconditioner for the generalized saddle point problems from the incompressible Navier-Stokes equations | 马昌凤,柯艺芬 | Numerical Algorithms | sci-II |
6 | Picard splitting method and Picard CG method for solving the absolute value equation | 马昌凤,吕长青 | Journal of Nonlinear Sciences and Applications | sci-II |
7 | Symmetric least squares solution of a class of Sylvester matrix equations via MINIRES algorithm | 马昌凤,马昌凤 | Journal of the Franklin Institute | sci-II |
8 | The parameterized upper and lower triangular splitting methods for saddle point problems | 马昌凤,李景涛 | Numerical Algorithms | sci-II |
9 | Multimodal learning for topic sentiment analysis in microblogging | 黄发良 | Neurocomputing | sci-II |
10 | Eigenvalue estimate and gap theorems for submanifolds in the hyperbolic space | 林和子 | Nonlinear Analysis: Theory, Methods & Applications 148 (2017), 126–137. | sci-II |
11 | Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks | 许力,方禾 | Applied Mathematics and Computation | sci-II |
12 | Vanishing theorems for f-harmonic forms on smooth metric measure spaces | 林和子,韩英波 | Nonlinear Analysis: Theory, Methods & Applications | sci-II |
13 | Toward Better DataVeracity in Mobile Cloud Computing: A Context-Aware and Incentive-Based Reputation Mechanism. | 林晖 | information sciences | sci-II |
14 | A class of accelerated parameterized inexact Uzawa algorithms for complex symmetric linear systems | 马昌凤,郑青青 | Applied Mathematics and Computation | sci-II |
15 | Can Likert scales be treated as interval scales? - A simulation study | 吴慧萍,Shing-On Leung | Journal of Social Service Research | sci-II |
16 | A Variant of Password Authenticated Key Exchange Protocol | Abdulhameed Alelaiwi,伍玮,项阳,Abdulhameed Alelaiwi | Future Generation Computer Systems | sci-II |
17 | A Levenberg-Marquardt method for solving semi-symmetric tensor equations | 马昌凤,吕长青 | Journal of Computational and Applied Mathematics, 2018, 332:13–25 | sci-II |
18 | Blow-up phenomena for a nonlinear pseudo-parabolic equation with nonlocal source | 龙群飞 | APPLIED MATHEMATICS LETTERS | sci-II |
19 | Laws of the iterated logarithm for symmetric jump processes | 王健,Kim Panki,Takashi Kumagai | Bernoulli | sci-II |
20 | Overlapping Community Detection for Multimedia Social Networks | 黄发良 | IEEE Transactions on Multimedia | sci-II |
21 | An examination of Chinese preservice and inservice early childhood teachers’ perspectives on the importance and feasibility of the implementation of key characteristics of quality inclusion | 吴慧萍,Bi Ying Hu | International Journal of Inclusive Education | sci-II |
22 | Stability andbifurcation analysis in the coupled HR neurons with delayed synaptic connection | 郑艳红,王海侠 | NONLINEAR DYNAMICS | sci-II |
23 | Efficient Sequential Data Migration Scheme Considering Dying Data for HDD/SSD Hybrid Storage Systems | 林铭炜 | IEEE ACCESS | sci-III |
24 | Semi-convergence analysis of parameterized ULT splitting iteration methods for singular saddle point problems | 马昌凤,李景涛 | Computers & Mathematics with Applications | sci-III |
25 | Positive definite and semi-definite splitting methods for non-hermitian positive definite linear systems | 马昌凤,黄娜 | Journal of Computational Mathematics, 2016, 34(3): 300-316 | sci-III |
26 | Minimum-norm Hamiltonian solutions of a class of generalized Sylvester-conjugate matrix equations | 马昌凤,胡晶晶 | Computers & Mathematics with Applications | sci-III |
27 | An alternating direction method for nonnegative solutions of the matrix equation AX+YB = C | 马昌凤,柯艺芬 | Computational & Applied Mathematics | sci-III |
28 | Alternating direction methods for solving a class of Sylvester-like matrix equations (AXB, CXD) = (G, H) | 马昌凤,柯艺芬 | Linear & Multilinear Algebra | sci-III |
29 | A matrix CRS iterative method for solving a class of coupled Sylvester-transpose matrix equations | 马昌凤,陈彩荣 | Computers & Mathematics with Applications | sci-III |
30 | On the least squares generalized Hamiltonian solution of generalized coupled Sylvester-conjugate matrix equations | 马昌凤,马昌凤 | Computers & Mathematics with Applications | sci-III |
31 | SIGN-CHANGING SOLUTIONS FOR ELLIPTIC EQUATIONS WITH FAST INCREASING WEIGHT AND CONCAVE-CONVEX NONLINEARITIES | 钱晓涛 | ELECTRONIC JOURNAL OF DIFFERENTIAL EQUATIONS | sci-III |
32 | EXISTENCE OF MULTIPLE POSITIVE WEAK SOLUTIONS AND ESTIMATES FOR EXTREMAL VALUES FOR A CLASS OF CONCAVE-CONVEX ELLIPTIC PROBLEMS WITH AN INVERSE-SQUARE POTENTIAL | 陈耀苹 | COMMUNICATIONS ON PURE AND APPLIED ANALYSIS | sci-III |
33 | Global well-posedness of 2D nonlinear Boussinesq equations with mixed partial viscosity and thermal diffusivity | 陈超 | MATHEMATICAL METHODS IN THE APPLIED SCIENCES | sci-III |
34 | Exponential attractors for the strongly damped wave equations with critical exponent | 钟延生 | Boundary Value Problems (2016) 2016:36 | sci-III |
35 | A new form for the differential of the constraint functional in strictly convex reflexive Banach spaces | 钟延生,李永青 | Journal of Mathematical Analysis and Applications | sci-III |
36 | Minimal mass non-scattering solutions of the focusing L 2-critical Hartree equations with radial data | 高燕芳,王智勇 | Discrete and Continuous Dynamical Systems. Series A | sci-III |
37 | Infinite solutions having a prescribed number of nodes for a Schr?dinger problem | 曾晶,无 | BOUNDARY VALUE PROBLEMS | sci-III |
38 | The Reliability Analysis Based on Subsystems of (n, k)-Star Graph | 周书明,李小旺,王大进,林丽美,胥翔 | IEEE TRANSACTIONS ON RELIABILITY, | sci-III |
39 | Cryptanalysis of Controlled Bidirectional Quantum Secure Direct Communication Network Using Classical XOR Operation and Quantum Entanglement | 林崧,郭躬德,刘晓芬,蔡彬彬 | IEEE Communications Letters | sci-III |
40 | Dynamical behaviors of a diffusive predator-prey model with Beddington-DeAngelis functional response and disease in the prey | 杨文生 | International Journal of Biomathematics | sci-III |
41 | Towards Secure and Cost-Effective fuzzy Access Control in Mobile Cloud Computing | 伍玮 | Soft Computing | sci-III |
42 | Uncertain random spectra_ a new metric for assessing the survivability of mobile wireless sensor networks | 许力,王大进,伍玮,章静 | Soft Computing | sci-III |
43 | Self-adaptive trust management based on game theory in fuzzy large-scale networks | 许力,方禾,黄欣沂 | Soft Computing | sci-III |
44 | A Straight Skeleton Based Connectivity Restoration Strategy in the Presence of Obstacles for WSNs | 许力,汪晓丁,周书明 | Sensors | sci-III |
45 | An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks | 许力,方禾,李颉 | Computer Communications | sci-III |
46 | Bowen Lemma in the Countable Symbolic Space | 李名田 | Entropy | sci-III |
47 | Analysis on inexact block diagonal preconditioners for elliptic PDE -constrained optimization problems | 马昌凤,黄娜 | Computers & Mathematics with Applications, 2017, 74, 2423–2437 | sci-III |
48 | Universally Composable RFID Mutual Authentication | 黄欣沂,苏春华,Robert Deng,Yingjiu Li,Bagus Santoso | IEEE Transactions on Dependable and Secure Computing | sci-III |
49 | DMRS: An Efficient Dynamic Multi-keyword Ranked Search over Encrypted Cloud Data | 陈兰香,邱林冰 | Soft Computing | sci-III |
50 | Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom | 王丽丽 | Quantum Information Processing | sci-III |
51 | Rate Functions for Symmetric Markov Processes via Heat Kernel | 王健,Yuichi Shiozawa | Potential Anal | sci-III |
52 | Weighted Poincare Inequalities for Non-local Dirichlet Forms | 王健,陈昕 | Journal of Theoretical Probability | sci-III |
53 | Reliability Assessment of Multiprocessor System Based on (n, k)-Star Network | 周书明,王大进,李金强,李小旺 | IEEE TRANSACTIONS ON RELIABILITY, | sci-III |
54 | An accelerated augmented Lagrangian method for linearly constrained convex programming with the rate of convergence O(1/k^2) | 马昌凤,柯艺芬 | Applied Mathematics-A Journal of Chinese Universities, 2017,32(1):117-126 | sci-IIII |
55 | The alternating direction methods for solving the Sylvester-type matrix equation AXB+CX^TD = E | 马昌凤,柯艺芬 | Journal of Computational Mathematics | sci-IIII |
56 | Role-based signature and its security proof | 林昌露,林昌露 | Journal of Information Science and Engineering | sci-IIII |
57 | Autocorrelation of the Modified Binary Two-prime Sidelnikov Sequence | 柯品惠,周正春 | International Journal of Foundations of Computer Science | sci-IIII |
58 | Uniform quasi-differentiabilityof semigroup to nonlinear reaction-diffusion equations with supercritical exponent | 钟延生,孙春友 | Acta Mathematica Scientia | sci-IIII |
59 | Nonexceptional functions and normal families of zero-free meromorphic functions | 陈俊凡 | Filomat | sci-IIII |
60 | Reliability of Complete Cubic Networks under the Condition of g-Good-Neighbor | 周书明,胥翔,李金强 | The Computer Journal | sci-IIII |
61 | The g-good-neighbor diagnosability of (n, k)-star graphs | 周书明,胥翔,李小旺 | Theoretical Computer Science | sci-IIII |
62 | Multi-party quantum key agreement with teleportation | 林崧,蔡彬彬,郭躬德 | Modern Physics Letters B | sci-IIII |
63 | Multi-party Quantum Key Agreement without Entanglement | 林崧,蔡彬彬,郭躬德 | International Journal of Theoretical Physics | sci-IIII |
64 | High-throughput Fat Quantifications of Hematoxylin-Eosin Stained Liver Histopathological Images Based on Pixel-wise Clustering | 时鹏 | SCIENCE CHINA-INFORMATION SCIENCES | sci-IIII |
65 | A Road-Network Based Privacy-Preserving Approach in Trajectory Publishing | 叶阿勇 | Journal of Internet Technology | sci-IIII |
66 | Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks | 许力,章静,黄欣沂,项阳 | Wireless Personal Communications | sci-IIII |
67 | A NOTE ON WEYL-TYPE THEOREMS AND RESTRICTIONS | 苏维钢,陈俐宏 | Annals of FunctionalAnalysis | sci-IIII |
68 | Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks | 许力,汪晓丁,周书明,伍玮 | Scientific Programming | sci-IIII |
69 | Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability | 许力,王峰 | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | sci-IIII |
70 | Evolutionarily stable opportunistic spectrum access in cognitive radio networks | 许力,方禾,林志伟 | IET Communications | sci-IIII |
71 | Hypersurfaces in nearly Kaehler manifold S^3xS^3 | 杨标桂,朱晴晴 | Proceedings - Mathematical Sciences | sci-IIII |
72 | bpCMon:A rule-based monitoring framework for business processes compliance | 龚平 | International journal of web services research | sci-IIII |
73 | Relaxation Oscillations in Singularly Perturbed Generalized Lienard Systems with Non-Generic Turning Points | 沈建和,胡欢 | MATHEMATICAL MODELLING AND ANALYSIS | sci-IIII |
74 | Characterizations of the Vertex Operator Algebras and V-L(T) and V-L(O) | 林贤祖 | Algebras and Representation Theory | sci-IIII |
75 | Aclass of simple Lie algebras attached to unit forms | 陈正新,陈金晶 | Frontier of mathematics in China | sci-IIII |
76 | THE STRONG IRREDUCIBILITY OF A CLASS OF COWEN–DOUGLAS OPERATORS ON BANACH SPACES | 张云南,林丽琼 | Bulletin of the Australian Mathematical Society | sci-IIII |
77 | Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, andAnonymous Design | 伍玮,黄欣沂,陈晓峰,许力,伍玮 | ACM Transactions on Embedded Computing Systems | sci-IIII |
78 | Uniqueness of meromorphic functions sharing two finite sets | 陈俊凡 | Open Mathematics | sci-IIII |
79 | Exposing video inter-frame forgery by Zernike opponent chromaticity moments and coarseness analysis | 黄添强,刘雨青 | Multimedia System | sci-IIII |
80 | A Novel Location Privacy-Preserving Scheme Based on l-Queries for Continuous LBS | 叶阿勇 | Computer Communications | ei收录论文核心版 |
81 | A Robust Location Fingerprint Based on Differential Signal Strength and Dynamic Linear Interpolation | 叶阿勇 | Security & Communication Networks | ei收录论文核心版 |
82 | A novel video forgery detection algorithm for blue screen compositing based on 3-stage foreground analysis and tracking | 黄添强,刘雨青 | Multimedia Tools and Applications | ei收录论文核心版 |
83 | Workload-aware page-level flash translation layer for NAND flash-based storage systems | 林铭炜,王慧冰,林铭炜 | Lecture Notes in Computer Science | ei收录论文核心版 |
84 | An improved block-based matching algorithm of copy-move forgery detection | 黄添强,赖玥聪,卢贺楠,林晶 | Multimedia Tools and Applications | ei收录论文核心版 |
85 | RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data | 熊金波,张媛媛,李璇 | Mobile Networks and Applications | ei收录论文核心版 |
86 | A secure data deduplication scheme based on differential privacy | 熊金波,任君 | IEEE ICPADS | ei收录论文核心版 |
87 | Multi-attribute group decision-making under probabilistic uncertain linguistic environment | 林铭炜 | Journal of the Operational Research Society | ei收录论文核心版 |
88 | Approach to Estimating Energy Consumption for Mobile Software Based on AADL Language | 杜欣 | 软件学报 | ei收录论文核心版 |
89 | Surrogate model assisted multi-objective differential evolution algorithm for performance optimization at software architecture level | 杜欣 | Asia-Pacific Conference on Simulated Evolution and Learning 2017(SEAL2017) | ei收录论文核心版 |
90 | An Evolutionary Algorithm for Performance Optimization at Software Architecture Level | 杜欣 | 2015 Annual Conference on Genetic and Evolutionary Computation | ei收录论文核心版 |
91 | Achieving proof of shared ownership for the shared file in collaborative cloud applications | 熊金波,张媛媛,王丽丽,林铭炜,李璇 | IEEE ICCCS | ei收录论文核心版 |
92 | Smooth representation clustering based on kernelized random walks | 陈丽萍,郭躬德,陈黎飞 | 1st Asia-Pacific Web and Web-Age Information Management Joint Conference on Web and Big Data, APWeb-WAIM 2017 held in Conjuction with the International Workshop on Mobile Web Data Analytics, MWDA 2017, International Workshop on Hot Topics in Big Spatial Data and Urban Computing | ei收录论文核心版 |
93 | A Multi-objective Evolutionary Algorithm for Rule-based Performance Optimization at Software Architecture Level | 杜欣 | 17th Genetic and Evolutionary Computation Conference | ei收录论文核心版 |
94 | Linear complexity of a class of pseudorandom sequences over a general finite field | 柯品惠,叶琪,沈剑 | Soft Computing | ei收录论文核心版 |
95 | Authenticated Data Redaction with Fine-Grained Control | 伍玮,黄欣沂,项阳,伍玮 | IEEE Transactions on Emerging Topics in Computing | ei收录论文核心版 |
96 | Trust Enhancement over Range Search for Encrypted Data | Ting-Ting Lee,黄欣沂,Joseph K. Liu,Ting-Ting Lee | IEEE International Conference on Trust, Security and Privacy in Computing and Communications | ei收录论文核心版 |
97 | Diagnosabilities of regular networks under three-valued comparison models | 周书明,胥翔,许力 | Int. J. High Performance Computing and Networking | ei收录论文核心版 |
98 | Bot detection using unsupervised machine learning | 伍玮,Hung-Ming Sun,Jaime Alvarez | Microsystem Technologies | ei收录论文核心版 |
99 | An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control | 伍玮,伍玮 | Green, Pervasive, and Cloud Computing | ei收录论文核心版 |
100 | Automated quantitative image analysis of hematoxylin-eosin staining slides in lymphoma based on hierarchical Kmeans clustering | 时鹏 | Proceedings - 2016 8th International Conference on Information Technology in Medicine and Education, ITME 2016 | ei收录论文核心版 |
101 | A trajectory privacy-preserving algorithm based on road networks in continuous location-based services | 叶阿勇 | 2017 IEEE Trustcom | ei收录论文核心版 |
102 | Perceptual Video Signal Compression Method Based on Structure Analysis | 叶锋,陈家祯,许力,李承欣,门爱东 | 北京邮电大学学报 | ei收录论文核心版 |
103 | An Adaptive Error Concealment Algorithm Based on Partition Model | 许力,李承欣,陈家祯,叶锋 | Advances in Image and Graphics Technologies | ei收录论文核心版 |
104 | A Privacy-Preserving Approach Based on Graph Partition for Uncertain Trajectory Publishing | 许力,肖剑川,汪晓丁,林丽美 | International Symposium on Parallel and Distributed Computing | ei收录论文核心版 |
105 | A Defense Mechanism Against Location Cheating Attack in Social Network | 叶阿勇 | 2017 IEEE Second International Conference on Data Science in Cyberspace | ei收录论文核心版 |
106 | Efficient monitoring framework for business process compliance | 龚平 | 计算机集成制造系统 | ei收录论文核心版 |
107 | The flexible and privacy-preserving Proximity Detection in Mobile Social Network | 叶阿勇 | Future Generation Computer Systems | ei收录论文核心版 |
108 | A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems | 林晖 | IEEE CPSCom 2016 | ei收录论文核心版 |
109 | Privacy Protection-oriented Mobile Crowdsensing Analysis Based on Game Theory | 熊金波,马蓉,林铭炜 | IEEE TrustCom | ei收录论文核心版 |
110 | A multi-replica associated deleting scheme in cloud | 熊金波,张媛媛,李璇 | IEEE CISIS | ei收录论文核心版 |
111 | A secure access and associate deleting scheme for multi-replica in multi-cloud environment | 熊金波,李素萍,李璇 | International Journal of High Performance Systems Architecture | ei收录论文核心版 |
112 | A measure of biological robustness in microbial metabolic systems and its approximated estimation | 叶剑雄,李安 | Proceedings of the 36th Chinese Control Conference, CCC 2017 | ei收录论文核心版 |
113 | New construction of low-hit-zone frequency hopping sequence sets with optimal partial hamming correlation | 柯品惠,李正谦 | LNCS | ei收录论文核心版 |
114 | Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud | 陈兰香,张楠 | International Conference on Security and Privacy in New Computing Environments | ei收录论文核心版 |
115 | 采用局部强度顺序模式的图像复制—粘贴篡改检测算法 | 黄添强,林晶,林玲鹏 | 通信学报 | A类刊物 |
116 | 面向云数据的隐私度量研究进展 | 熊金波,王敏燊,田有亮,林铭炜,马蓉 | 软件学报 | A类刊物 |
117 | 共享所有权证明:协作云数据安全去重新方法 | 熊金波,张媛媛,李素萍,李璇 | 通信学报 | A类刊物 |
118 | 可修订数字签名研究综述 | 黄欣沂,伍玮,黄欣沂 | 计算机研究与发展 | A类刊物 |
119 | 基于显著性区域检测和水平集的图像快速分割算法 | 叶锋,陈家祯,郑子华,李婉茹 | 电子与信息学报 | A类刊物 |
120 | 离散半马氏风险模型中的期望罚金函数 | 刘海燕,陈密 | 应用概率统计 | A类刊物 |
121 | 基于群签名的无线Mesh网络匿名切换认证方案 | 王峰,许力,王峰 | 通信学报 | A类刊物 |
122 | 三维物体多重菲涅耳计算全息水印与无干扰可控重建方法 | 陈家祯,叶锋,连桂仁,许力,郑子华 | 物理学报 | A类刊物 |
123 | 可加Lévy 噪声驱动随机微分方程的强Feller 性与指数遍历性 | 王健,梁明杰 | 应用数学学报 | A类刊物 |
124 | p-框架, Hilbert-Schauder框架与σ-框架算子 | 张云南,林丽琼,朱玉灿 | 中国科学 数学 | A类刊物 |
125 | 半参数变系数空间误差回归模型的估计 | 陈建宝 | 数量经济技术经济研究 | A类刊物 |
126 | 随机效应变系数空间自回归面板模型的估计 | 陈建宝,孙林 | 统计研究 | A类刊物 |
127 | 基于动态阈值的帧复制粘贴篡改检测 | 黄添强,卢贺楠,林晶 | 计算机系统应用 | B类刊物 |
128 | 融合前景判别和圆形搜索的目标跟踪算法 | 黄添强,林玲鹏,林晶 | 计算机应用 | B类刊物 |
129 | 基于非负张量分解的视频篡改检测方法 | 黄添强,张雪莉 | 网络与信息安全学报 | B类刊物 |
130 | 基于光流周期特性的视频帧率上转篡改检测 | 黄添强,林晶,林玲鹏 | 计算机系统应用 | B类刊物 |
131 | 一类带大参数的二维生物模型的快慢动力学与松弛振动 | 周哲彦 | 生物数学学报 | B类刊物 |
132 | 基于随机搜索规则的软件体系结构层性能演化优化方法 | 倪友聪 | 计算机科学 | B类刊物 |
133 | 基于马尔科夫模型的就餐人数预测 | 江育娥,徐彭娜 | 计算机系统应用 | B类刊物 |
134 | 基于多因素加法模型的中期电力负荷预测 | 江育娥,翁金芳 | 计算机系统应用 | B类刊物 |
135 | 云环境下软件错误报告自动分类算法改进 | 江育娥,黄伟 | 计算机应用 | B类刊物 |
136 | 针对 QSP 算法的研究与分析 | 林劼,李莉 | 计算机系统应用 | B类刊物 |
137 | 基于分布式架构的时间序列局部相似检测算法 | 林劼,林炀 | 计算机应用 | B类刊物 |
138 | 基于GPU的实时素描风格渲染算法 | 吴献,高山晓 | 计算机应用 | B类刊物 |
139 | 融合信任用户的协同过滤推荐算法 | 黄波,严宣辉,黄波 | 计算机系统应用 | B类刊物 |
140 | 椭圆PDE约束优化问题的一个预条件子 | 马昌凤,柯艺芬 | 计算数学 | B类刊物 |
141 | 基于稳态过程的多重分形Web日志仿真生成算法 | 彭行雄,彭行雄 | 计算机应用 | B类刊物 |
142 | 带双调和记忆项的四阶非线性伪抛物方程解的整体存在性和不存在性 | 龙群飞 | 数学进展 | B类刊物 |
143 | 优先关联的Web日志数据逼真生成算法 | 丘志鹏,丘志鹏 | 计算机系统应用 | B类刊物 |
144 | 基于相邻请求的动态时间阈值会话识别算法 | 曾令,曾令 | 计算机应用 | B类刊物 |
145 | 逼真生成表格式数据的非时间属性关联模型 | 张锐,张锐 | 计算机应用 | B类刊物 |
146 | 基于LASSO回归模型的网贷借款成功影响因素挖掘 | 王开军,李海超 | 计算机系统应用 | B类刊物 |
147 | 广义特征值问题与两线性流形之间夹角的计算 | 张圣贵 | 工程数学学报 | B类刊物 |
148 | 基于FPGA和FIR滤波的数字全息零级像抑制 | 陈家祯,叶锋,连桂仁,许力,郑子华 | 网络新媒体技术 | B类刊物 |
149 | 基于直觉模糊集的灰色模型故障预测 | 王开军,林品乐 | 计算机系统应用 | B类刊物 |
150 | 一类含时滞的扩散单神经元模型的分岔分析 | 李英国 | 生物数学学报 | B类刊物 |
151 | 两类可截取签名方案的改进 | 伍玮,王敏 | 网络与信息安全学报 | B类刊物 |
152 | 支持丰富访问控制策略的群组协作密文策略属性基加密 | 伍玮,李洋 | 网络与信息安全学报 | B类刊物 |
153 | 地理信息服务于高校大学生-以福州大学城为例 | 金彪 | 计算机系统应用 | B类刊物 |
154 | 基于机器视觉的交通拥堵评估系统 | 叶锋,汪敏,张建嘉,林萧,廖茜 | 计算机系统应用 | B类刊物 |
155 | 平衡超立方体的故障容错性 | 许力,张欣欣 | 网络与信息安全学报 | B类刊物 |
156 | 基于视频分析和多传感器融合的移动式监控系统 | 叶锋,林晖,陈超意,林贵增,汪敏,廖茜 | 计算机系统应用 | B类刊物 |
157 | 政府消费与经济增长——基于MS-VECM的实证研究 | 陈建宝 | 数理统计与管理 | B类刊物 |
158 | 回归模型中哑变量的相对重要性指数 | 王开军,李海超 | 计算机应用 | B类刊物 |
159 | 自适应紧致特征的超像素目标跟踪算法 | 王开军,田健 | 中国图象图形学报 | B类刊物 |
160 | 社交网络中基于定位欺骗的隐私攻击研究 | 叶阿勇 | 信息网络安全 | B类刊物 |
161 | 基于模糊贴近度的粒子滤波故障预测 | 王开军,林品乐 | 计算机系统应用 | B类刊物 |
162 | 一种时空域结合的自适应错误隐藏算法 | 叶锋,李承欣,陈家祯,许力,林晖 | 小型微型计算机系统 | B类刊物 |
163 | 支持批量认证和隐私保护的无线Mesh网络切换认证方案 | 许力,许力 | 计算机系统应用 | B类刊物 |
164 | 部分级联特征的离线手写体汉字识别方法 | 叶锋,林晖,郑子华,邓衍晨,汪敏,廖茜 | 计算机系统应用 | B类刊物 |
165 | 中华人民共和国成立以来高考数学试题演变分析与展望 | 陈清华,郑雪静 | 数学通报 | B类刊物 |
166 | 基于ZigBee实验室智能管理系统的研究与设计 | 蔡丽萍,李汪彪,林立,陈鸿光 | 实验室研究与探索 | B类刊物 |
167 | 基于Merkle哈希树的可验证密文检索方案 | 陈兰香,邱林冰 | 信息网络安全 | B类刊物 |
168 | 云存储中基于二进制向量索引的密文云数据排序查询方法 | 陈兰香,周书明 | 计算机应用与软件 | B类刊物 |
169 | 一种高效的支持排序的关键词可搜索加密系统研究 | 陈兰香,张楠 | 信息网络安全 | B类刊物 |
170 | 面向社交网络的图片信息隐藏方法与实现 | 熊金波,张媛媛,马蓉 | 信息网络安全 | B类刊物 |
171 | 面向存储介质的数据安全删除 | 熊金波,吴莎莎,王敏燊 | 计算机系统应用 | B类刊物 |
172 | 基于测试的高中生数学抽象素养水平现状研究 | 陈清华,郑雪静 | 数学教育学报 | B类刊物 |
173 | Bayesian network modelling on data from fine needle aspiration cytology examination for breast cancer diagnosis | 丁雪梅,刘烁,杨洪钦,李毓华,翟佳,曾锦树,Liam Maguire,曹弋 | Advances in Engineering Research (AER), volume 130, ATLANTIS PRESS. The 5th International Conference on FMSMT 2017 | istp收录论文 |
174 | 基于智能手机的健身跑运动数据采集及演化建模 | 池小文,池小文 | 智能系统学报 | CSCD收录论文 |
175 | 图像矩在图像区域复制粘贴检测中的快速计算算法 | 黄添强,赖玥聪,林晶 | 中国科学技术大学学报 | CSCD收录论文 |
176 | 基于点云的SUSAN特征点检测算法在三维重建中的应用 | 吴献,庄恩泽 | 福建师范大学学报(自然科学版) | CSCD收录论文 |
177 | 一类非线性波方程的TVD数值模拟研究 | 李德梅,赖惠林 | 福建师范大学学报(自然科学版) | CSCD收录论文 |
178 | 代理模型帮助的SA层性能差分演化优化算法 | 杜欣 | 计算机科学与探索 | CSCD收录论文 |
179 | 经济集聚与地方公共品供给的内生交互作用和空间溢出效应 | 鞠芳煜,陈建宝 | 福建师范大学学报 ( 哲学社会科学版) | CSCD收录论文 |
180 | 关于投射子内射模 | 周德旭,黄智强 | 福建师范大学学报(自然科学版) | CSCD收录论文 |
181 | 基于选举标签传播的非重叠社区挖掘算法 | 黄发良,连亚飞 | 福建师范大学学报(自然科学版) | CSCD收录论文 |
182 | 对偶自同构不变模与Morita对偶 | 周德旭,黄凌娟 | 福建师范大学学报(自然科学版) | CSCD收录论文 |
183 | 加法范畴的回路范畴与η-扩张 | 陈清华 | 福建师范大学学报(自然科学版) | CSCD收录论文 |
184 | 基于产品评论情感分析的用户满意度挖掘 | 黄发良,程惠华 | 福建师范大学学报(自然科学版) | CSCD收录论文 |
185 | 广义AR-猜想与三角矩阵代数 | 陈清华,刘宏锦 | 厦门大学学报(自然科学版) | CSCD收录论文 |
186 | 软件代码的恶意行为学习与分类 | 陈黎飞,范宇杰,郭躬德 | 数据采集与处理 | CSCD收录论文 |
187 | NN算子及Weyl型定理 | 苏维钢,陈俐宏,周玮 | 应用数学 | CSCD收录论文 |
188 | 基于Adaboost与背景差分级联的室内人数统计方法 | 叶锋,陈家祯,郑子华,洪斯婷,邓衍晨,郑德城 | 福建师范大学学报(自然科学版) | CSCD收录论文 |
189 | 有限维单李代数的双导子 | 陈正新 | 福建师范大学学报(自然科学版) | CSCD收录论文 |
190 | 亚纯函数的某类非线性微分多项式的分担值 | 陈俊凡,蔡晓华 | Comm. Math. Res. | CSCD收录论文 |