1. N Huang,CF Ma(马昌凤). Modified conjugate gradient method for obtaining the minimum-norm solution of the generalized coupled Sylvester-conjugate matrix equations. Applied Mathematical Modelling, 2016, 40(2):1260-1275. ( SCI-I)
2. J Shen(沈建和).Canard limit cycles and global dynamics in a singularly perturbed predator–prey system with non-monotonic functional response. Nonlinear Analysis Real World Applications, 2016, 31:146-165. ( SCI-I)
3. A Castiglione,AD Santis,B Masucci,F Palmieri,X Huang(黄欣沂). Cryptographic Hierarchical Access Control for Dynamic Structures. IEEE Transactions on Information Forensics and Security ,2016,11(10): 2349-2364. ( SCI-II )
4. K Liang,X Huang(黄欣沂),F Guo,J Liu. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data. IEEE Transactions on Information Forensics and Security 11(10): 2365-2376, 2016. ( SCI-II )
5. YJ Xie,CF Ma(马昌凤). A modified positive-definite and skew-Hermitian splitting preconditioner for generalized saddle point problems from the Navier-Stokes equation. Numerical Algorithms, 2015, 72(1):1-16. ( SCI-II )
6. D He,S Zeadally,B Xu,X Huang(黄欣沂). An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2681-2691. ( SCI-II )
7. A Castiglione,AD Santis,B Masucci,F Palmieri,X Huang(黄欣沂). Hierarchical and Shared Access Control. IEEE Transactions on Information Forensics and Security 11(4): 850-865, 2016. ( SCI-II )
8. D He,S Zeadally,N Kumar,W Wu(伍玮). Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Transactions on Information Forensics and Security 11(9): 2052-2064, 2016. ( SCI-II )
9. KC Yuen,M Chen(陈密),KP Wat. On the expected penalty functions in a discrete semi-Markov risk model with randomized dividends. Journal of Computational & Applied Mathematics, 2016, 311:239-251. ( SCI-II )
10. LG Hu,J Zeng. Liouville type theorems for stable solutions of the weighted elliptic system. Journal of Mathematical Analysis & Applications, 2015, 437(2):882-901. ( SCI-II )
11. YF Ke,CF Ma(马昌凤). Spectrum analysis of a more general augmentation block preconditioner for generalized saddle point matrices. Bit Numerical Mathematics, 2015, 56(2):1-12. ( SCI-II )
12. QQ Zheng,CF Ma(马昌凤). Preconditioned AHSS-PU alternating splitting iterative methods for saddle point problems . Applied Mathematics & Computation, 2016, 273:217-225. ( SCI-II )
13. QQ Zheng,CF Ma(马昌凤). A class of triangular splitting methods for saddle point problems. Journal of Computational & Applied Mathematics, 2015, 298:13-23. ( SCI-II )
14. YF Ke,CF Ma(马昌凤). A note on “A dimensional split preconditioner for Stokes and linearized Navier–Stokes equations”.AppliedNumericalMathematics, 2016,108: 223–225. ( SCI-II )
15. X Yang,X Huang(黄欣沂),JK Liu. Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. Future Generation Computer Systems, 2015, 62(C):190-195. ( SCI-II )
16. N Huang,C Ma(马昌凤). The modulus-based matrix splitting algorithms for a class of weakly nonlinear complementarity problems. Numerical Linear Algebra With Applications, 2016; 23:558–569. ( SCI-II )
17. C Ma(马昌凤),N Huang. Modified modulus-based matrix splitting algorithms for a class of weakly nondifferentiable nonlinear complementarity problems. Applied Numerical Mathematics, 2016, 108:116-124. ( SCI-II )
18. QQ Zheng,CF Ma(马昌凤). Accelerated PMHSS iteration methods for complex symmetric linear systems. Numerical Algorithms, 2016, 73(2):1-16. ( SCI-II )
19. L Chen(陈黎飞),S Wang,K Wang,J Zhu. Soft subspace clustering of categorical data with probabilistic distance. Pattern Recognition, 2016, 51(C):322-332. ( SCI-II )
20. YJ Xie,CF Ma(马昌凤). The accelerated gradient based iterative algorithm for solving a class of generalized Sylvester-transpose matrix equation. Applied Mathematics & Computation, 2016, 273(C):1257-1269. ( SCI-II )
21. Y Fan,Y Ye,L Chen(陈黎飞). Malicious sequential pattern mining for automatic malware detection. Expert Systems With Applications, 2016, 52(C):16-25. ( SCI-II )
22. P Shi(时鹏),J Zhong,J Hong,R Huang,K Wang. Automated Ki-67 Quantification of Immunohistochemical Staining Image of Human Nasopharyngeal Carcinoma Xenografts. Scientific Reports, 2016, 6:32127. ( SCI-II )
23. Xin Chen,Jian Wang(王健). Intrinsic ultracontractivity of Feynman–Kac semigroups for symmetric jump processes. Journal of Functional Analysis, 2016, 270:4152–4195. ( SCI-II )
24. J Wang(王健). L^{p}$-Wasserstein distance for stochastic differential equations driven by Lévy processes. Bernoulli, 2016, 22(3):1598-1616. ( SCI-II )
25. QR Deng(邓起荣). On the spectra of Sierpinski-type self-affine measures. Journal of Functional Analysis, 2016, 270(12):4426-4442. ( SCI-II )
26. QR Deng(邓起荣),XY Wang. Denker-Sato type Markov chains and Harnack inequality. Nonlinearity, 2015, 28(11):3973-3998. ( SCI-II )
27. L Lin,L Xu(许力),S Zhou(周书明),Y Xiang.Trustworthiness-Hypercube-based Reliable Communication in Mobile Social Networks. Information Sciences, 2016, 369:34-50. ( SCI-II )
28. S Lin(林崧),GD Guo,F Huang,XF Liu. Quantum anonymous ranking based on the Chinese remainder theorem. Physical Review A, 2016, 93(1). ( SCI-II )
29. S Lin(林崧),GD Guo,YZ Xu,Y Sun,XF Liu. Cryptanalysis of quantum secret sharing with d -level single particles. Phys.rev.a, 2016, 93(6). ( SCI-II )
30. L Lin,L Xu(许力),S Zhou(周书明),S Hsieh. The Extra, Restricted Connectivity and Conditional Diagnosability of Split-Star Networks. IEEE Transactions on Transactions on Parallel & Distributed Systems,2016, 27(2):533-545. ( SCI-II )
31. Y Chen,J Chen(陈建清). Multiple positive solutions for a semilinear equation with critical exponent and prescribed singularity. Nonlinear Analysis Theory Methods & Applications, 2016, 130:121-137. ( SCI-II )
32. H Lin(林晖),L Xu,X Huang,W Wu,Y Huang. A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Networks, 2015, 35(C):51-64. ( SCI-III )
33. ML Zeng,CF Ma(马昌凤). A parameterized SHSS iteration method for a class of complex symmetric system of linear equations . Computers & Mathematics with Applications, 2016, 71(10):2124-2131. ( SCI-III )
34. D Luo,J Wang(王健). Exponential convergence in Lp‐Wasserstein distance for diffusion processes without uniformly dissipative drift. Mathematische Nachrichten, 2014, 289(14-15):1909-1926. ( SCI-III )
35. Y Xie,C Ma(马昌凤). A generalized Newton method of high-order convergence for solving the large-scale linear complementarity problem. Journal of Inequalities and Applications, 2015, 2015(1):1-12. ( SCI-III )
36. C Chen(陈超). Subsonic non‐isentropic ideal gas with large vorticity in nozzles. Mathematical Methods in the Applied Sciences, 2016, 39(10):2529-2548. ( SCI-III )
37. N Huang,C Ma(马昌凤),J Tang. The inversion-free iterative methods for a system of nonlinear matrix equations. International Journal of Computer Mathematics, 2015, 2013:1-14. ( SCI-III )
38. H Lai(赖惠林),A Xu,G Zhang,Y Gan,Y Ying,... Nonequilibrium thermohydrodynamic effects on the Rayleigh-Taylor instability in compressible flows. Phys.rev.e, 2015, 94(2-1). ( SCI-III )
39. CR Chen,CF Ma(马昌凤). AOR–Uzawa iterative method for a class of complex symmetric linear system of equations.Computers & Mathematics with Applications, 2016, 72(9):2462-2472. ( SCI-III )
40. L Lin,L Xu(许力),S Zhou(周书明),SY Hsieh. The t/k-Diagnosability for Regular Networks. IEEE Transactions on Computers, 2015, 65(10):1-1. ( SCI-III )
41. C Chen(陈超),L Du,C Xie,Z Xin. Two Dimensional Subsonic Euler Flows Past a Wall or a Symmetric Body. Archive for Rational Mechanics and Analysis, 2016, 221(2):559-602. ( SCI-III )
42. X Chen,FY Wang,J Wang(王健). Perturbations of Functional Inequalities for Lévy Type Dirichlet Forms. Forum Mathematicum, 2015, 27(6):3477-3507. ( SCI-III )
43. C Chen(陈超),E Creusé,S Nicaise,Z Tang. Residual-based a posteriori estimators for the potential formulations of electrostatic and time-harmonic eddy current problems with voltage or current excitation. International Journal for Numerical Methods in Engineering, 2016, 107(5):377-394. ( SCI-III )
44. FY Wang,J Wang(王健). Functional Inequalities for Convolution Probability Measures. Annales de l’Institut Henri Poincaré - Probabilités et Statistiques,2016, 52(2): 898–914. ( SCI-III )
45. Y Zeng,L Xu(许力),Z Chen. Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks.Sensors, 2015, 16(1):3. ( SCI-III )
46. L Xu(许力),L Lin,S Zhou,SY Hsieh. The Extra Connectivity, Extra Conditional Diagnosability, and -Diagnosability of Arrangement Graphs. IEEE Transactions on Reliability, 2016:1-15. ( SCI-III )
47. C Lin,W Wu(伍玮),X Huang(黄欣沂),L Xu. A new universal designated verifier transitive signature scheme for big graph data. Journal of Computer & System Sciences, 2017, 83(1):73-83. ( SCI-III )
48. S Zhang(张世芳),L Zhang,H Zhong. Perturbation of Browder spectrum of upper triangular operator matrices. Linear & Multilinear Algebra, 2016, 64(3):502-511. ( SCI-III )
49. J Wu(吴建宁),H Xu. An advanced scheme of compressed sensing of acceleration data for telemonintoring of human gait. BioMedical Engineering OnLine, 2016, 15(1):1-15. ( SCI-III )
50.Z Wang(王智勇), J Yin. Asymptotic behaviour of the lifespan of solutions for a semilinear heat equation in hyperbolic space. Proceedings of the Royal Society of Edinburgh, 2016,146(5):1091-1114. ( SCI-III )
51. H Lin(林惠玲). A Lipschitzian Error Bound for Convex Quadratic Symmetric Cone Programming. Acta Applicandae Mathematicae, 2016, 144(1):17-34.
52. Y Dong,H Lin(林和子),G Yang. Liouville Theorems for F -Harmonic Maps and Their Applications. Results in Mathematics, 2016, 69(1):1-23. ( SCI-III )
53. J Chen(陈建清),EM Rocha. SIGN CHANGING SOLUTIONS OF A SEMILINEAR EQUATION ON HEISENBERG GROUP. Journal of Nonlinear and Convex Analysis, 2016,17(8): 1531-1545. ( SCI-III )
54. L Chen(陈黎飞),Y Ye,G Guo,(郭躬德)J Zhu. Kernel-based linear classification on categorical data. Soft Computing, 2016, 20(8):2981-2993. ( SCI-III )
55. L Lin,L Xu(许力),S Zhou(周书明). Conditional diagnosability and strong diagnosability of shuffle-cubes under the comparison model. International Journal of Computer Mathematics, 2015, 92(2):230-249. ( SCI-III )
56. Y Zeng,Z Chen(陈志德),X Yang. Self-healing and energy-efficient restoration in machine-to-machine networks. Iet Communications, 2016, 10(7):805-811. ( SCI-IIII)
57. YZ Xu,GD Guo(郭躬德),S Lin. One-Dimensional Three-State Quantum Walk with Single-Point Phase Defects. International Journal of Theoretical Physics, 2016, 55(9):1-15. ( SCI-IIII)
58. N Huang,C Ma(马昌凤). A New GSOR Method for Generalised Saddle Point Problems. East Asian Journal on Applied Mathematics, 2016, 6(1):23-41. ( SCI-IIII)
59. Y Zhang,L Xu(许力),X Huang(黄欣沂),J Li. Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge. International Journal of Ad Hoc & Ubiquitous Computing, 2015, 20(4):262-273. ( SCI-IIII)
60. Dejun,Jian,WANG(王健). Holder continuity of semigroups for time changed symmetric stable processes. Front. Math. China , 2016(1):109-121. ( SCI-IIII)
61. C Ma(马昌凤),H Lu. Numerical Study on Nonsymmetric Algebraic Riccati Equations. Mediterranean Journal of Mathematics, 2016:1-13. ( SCI-IIII)
62. N Huang,C Ma(马昌凤),Y Xie. The Derivative-Free Double Newton Step Methods for Solving System of Nonlinear Equations. Mediterranean Journal of Mathematics, 2016, 13(4):2253-2270. ( SCI-IIII)
63. Z Chen(陈正新). Biderivations and linear commuting maps on simple generalized Witt algebras over a field. Electronic Journal of Linear Algebra Ela, 2016, 31(1):1-12. ( SCI-IIII)
64. S Song,S Zhou(周书明),X Li. Conditional Diagnosability of Burnt Pancake Networks Under the PMC Model. Computer Journal, 2016(1):bxv066. ( SCI-IIII)
65. B Pan(潘飚),W C Lin. Angular value distribution concerning shared values. Rocky Mountain Journal of Mathematics, 2015, 45(6):1919-1935. ( SCI-IIII)
66. S Zhou(周书明),S Song,X Yang,L Chen. On conditional fault tolerance and diagnosability of hierarchical cubic networks. Theoretical Computer Science, 2016, 609(P2):421-433. ( SCI-IIII)
67. JM Jiang(蒋建民),H Zhu,Q Li,Y Zhao,L Zhao,... Analyzing Event-Based Scheduling in Concurrent Reactive Systems. Acm Transactions on Embedded Computing Systems, 2015, 14(4):86. ( SCI-IIII)
68. H Fang,L Xu(许力),L Xiao. Secure routing and resource allocation based on game theory in cooperative cognitive radio networks. Concurrency & Computation Practice & Experience, 2016, 28(10):2958-2977. ( SCI-IIII)
69. L Lin,L Xu(许力),S Zhou. Relating the extra connectivity and the conditional diagnosability of regular graphs under the comparison model. Theoretical Computer Science, 2016, 618(C):21-29. ( SCI-IIII)
70. X Yang,X Huang(黄欣沂),J Han,C Su. Improved handover authentication and key pre‐distribution for wireless mesh networks. Concurrency & Computation Practice & Experience, 2016, 28(10):2978-2990. ( SCI-IIII)
71. S Lin(林崧),H Wang,GD Guo,GH Ye,HZ Du,... Authenticated multi-user quantum key distribution with single particles. International Journal of Quantum Information, 2016, 14(01):1650002. ( SCI-IIII)
72. H Lin(林和子). On the structure of submanifolds in the hyperbolic space. Monatshefte Für Mathematik, 2015:1-16. ( SCI-IIII)
73. M Chen(陈密),KC Yuen. Optimal dividend and reinsurance in the presence of two reinsurers. Journal of Applied Probability, 2016, 53(2):554-571. ( SCI-IIII)
74. L Hu(胡丽莹),G Guo,C Ma. Combined new nonnegative matrix factorization algorithms with two-dimensional nonnegative matrix factorization for image processing. Multimedia Tools and Applications, 2016, 75(18):11127-11155. ( SCI-IIII)
75. H Lin(林和子). SOME RIGIDITY THEOREMS FOR SELF-SHRINKERS OF THE MEAN CURVATURE FLOW. J. Korean Math. Soc. 2016, 53 (4): 769–780.( SCI-IIII)
76. J Chen(陈建清),SHARP VARIATIONAL CHARACTERIZATION AND A SCHRODINGER EQUATION WITH HARTREE TYPE NONLINEARITY. DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-S,Vol.9, No.6, 1613-1628. ( SCI-IIII)
77. X Yang,W Wu(伍玮),JK Liu,X Chen. Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach. In ProvSec 2015, Lecture Notes in Computer Science 9451: 215-226, 2015. (EI)
78. C Su,B Santoso,Y Li,R Deng,X Huang(黄欣沂). Universally Composable RFID Mutual Authentication. IEEE Transactions on Dependable and Secure Computing, 2015:1-1. (EI)
79. Zhen Li,Wei Wu(伍玮). Reversible Data Hiding for Encrypted Images Based on Statistical Learning. Australasian Conference on Information Security and Privacy, 2016: 198-212. (EI)
80. H Lin,J Hu,J Liu,L Xu(许力). A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing. IEEE International Conference on Computer and Information Technology;2015:2049-2054. (EI)
81. Y Xia,H Lin,L Xu(许力). An AGV Mechanism Based Secure Routing Protocol for Internet of Things. IEEE International Conference on Computer and Information Technology, 2015:662-666. (EI)
82. H Lin,J Hu,C Huang,L Xu(许力). A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks. IEEE International Conference on Computer and Information Technology, 2015:2198-2205. (EI)
83.A Ye(叶阿勇),J Sao,Q Jian. A robust location fingerprint based on differential signal strength and dynamic linear interpolation. Security & Communication Networks, 2016, 9(16):3618-3626. (EI)
84.Q Chen,A Ye(叶阿勇),L Xu. A privacy-preserving Proximity Detection Method in social network. International Conference, 2016:68. (EI)
85.A Ye(叶阿勇),Y Li,L Xu. A novel location privacy-preserving scheme based on l -queries for continuous LBS. Computer Communications, 2016. (EI)
86.H Lu,C Ma(马昌凤). A new linearized implicit iteration method for nonsymmetric algebraic Riccati equations. Journal of Applied Mathematics and Computing, 2016, 50(1):1-15. (EI)
87. P Shi(时鹏),M Wan,J Hong,J Chen,L Zhang. A Parallel Fish Image Processing Pipeline of High-Throughput Chromosomal Analysis. International Conference on Information Technology in Medicine and Education ,2015:337-342. (EI)
88.F Wang,L Xu(许力),JS Pan. Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model". International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015:195-198. (EI)
89. J Zhang,L Xu(许力),H Yang. A Novel Sleep Scheduling Algorithm for Wireless Sensor Networks. International Conference on Intelligent Information Hiding and Multimedia Signal Processing., 2015:364-367. (EI)
90. M Li,X Huang,JK Liu,L Xu(许力),W Wu. Cooperative attribute-based access control for enterprise computing system. International Journal of Embedded Systems, 2015, 7(3):191-202. (EI)
91. Jing Zeng(曾晶),Liping Chen(陈丽萍).Detecting Anomalies in Outgoing Long-wave Radiation Data by A Window Average Martingale Method. Advances in Energy, Environment and Materials Science,2016:809-813.(EI)
92. C Lin(林昌露),F Luo,H Wang,Y Zhu. A Provable Data Possession Scheme with Data Hierarchy in Cloud. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015.(EI)
93. C Lin,F Zhu,W Wu(伍玮),K Liang,KKR Choo. A New Transitive Signature Scheme. International Conference on Network and System Security, 2016: 156-167. (EI)
94. T Wang,HA Man,W Wu(伍玮). An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords. International Conference on Network and System Security. Springer International Publishing, 2016: 251-265. (EI)
95. Ayong Ye(叶阿勇), Yongxing Zheng.Large Scale Trajectory Data Management. Institute of Electrical and Electronics Engineers Inc.2015.(EI)
96. Z Ye,P Ke(柯品惠),Z Chen. Further results on pseudorandom binary sequences derived from Fermat-Euler Quotients. International Conference on Information, 2015:1-4. (EI)
97. T Wu,Y Fan,Z Hong,L Chen(陈黎飞). Subspace Clustering on Mobile Data for Discovering Circle of Friends. Lecture Notes in Computer Science, 2015.(EI)
98. BL Liang,C Huang. Core-Selecting Auction Based Spectrum Allocation Scheme in Cognitive Femtocell Networks. IEEE International Conference on Computer & Inf..., 2015. (EI)
99. 吴建宁,徐海东,王珏.基于过完备字典稀疏表示的多通道脑电信号压缩感知联合重构. 电子与信息学报,2016,38(7):1666-1673.(A类)
100. 吴建宁,徐海东,王佳境,凌雲. 基于随机投影的快速稀疏表示人体动作识别方法.中国生物医学工程学报,2016,35(1):38-46. (A类)
101. 柯品惠,叶智钒,常祖领. 一类推广的二元Legendre-Sidelnikov序列的自相关分布.电子与信息学报, 2016,38(2):303-309 . (A类)
102. 汪晓丁,许力,周书明,林晖. 基于Voronoi图和定位集的故障诊断和修复策略. 通信学报, 2015, 36(s1):103-109. (A类)
103. 黄毅杰,林晖,许力,黄川,周赵斌. 认知无线网络中一种基于VCG的分布式安全频谱感知策略. 小型微型计算机系统, 2016(6):1228-1233. (B类)
104. 夏有华,林晖,许力,周赵斌. 基于Core-Selecting机制的物联网安全路由协议.计算机系统应用, 2016, 25(4):128-134. (B类)
105. 李晴,叶阿勇,许力. 公众环境下无线接入的安全问题研究.信息网络安全,2016(4):67-75. (B类)
106. 朱晴晴,杨标桂. 近凯勒流形中一般子流形的淹没. 数学进展,2016(2):271-279. (B类)
107. 张豪,陈黎飞,郭躬德. 基于符号熵的序列相似性度量方法. 计算机程,2016(5):201-206. (B类)
108. 范宇杰,陈黎飞,郭躬德. 一种匹配全局结构的图相似性度量. 小型微型计算机系统,2016(7):1488-1492. (B类)
109. 肖剑川,许力,叶阿勇,林丽美. 基于Voronoi图的路网轨迹隐私保护研究. 信息网络安全, 2016(6):15-21. (B类)
110. 方禾,许力,苏彬庭. 认知无线电网络中基于非合作博弈的隐货币交易模型. 小型微型计算机系统, 2016(2):227-230. (B类)
111. 陈丽萍,郭躬德. 一种基于顺序特性的子空间聚类方法. 计算机科学,2016(3):72-74. (B类)
112. 李承欣,叶锋,涂钦,陈家祯,许力. 面向视频压缩的显著性协同检测JND模型. 计算机系统应用,2016(11):208-215. (B类)
113. 吴建宁,徐海东,凌雲,王佳境. 基于块稀疏贝叶斯学习的人体运动模式识别. 计算机应用,2016,36(4):1039-1044. (B类)
114. 罗飞来,邹囡,欧忠辉. 丛枝菌根真菌吸收磷酸盐的数值分析. 生物数学学报,2016(1):129-135. (B类)
115. 周赵斌,许力. 基于数字签名的防污染网络编码方案. 计算机系统应用, 2016, 25(6):185-190. (B类)
116. 周赵斌,许力,李世唐. 基于CRC的防污染网络编码方案. 计算机系统应用, 2016, 25(1):101-106. (B类)
117. 蒋欣,王开军,陈黎飞. 基于DTW匹配的粒子滤波故障预报. 计算机系统应用2016, 25(3):124-130. (B类)
118. 田健,王开军,郭躬德,陈黎飞. 融合速度特征的压缩感知目标跟踪算法. 南京大学学报,2016,52(2): 149-158. (B类)
119. 林品乐,王开军. 基于模糊隶属度的粒子滤波故障预测. 计算机系统应用2016, 25(6) :119-124. (B类)
120. 徐永振,郭躬德,蔡彬彬,林崧. 基于一维三态量子游走的量子聚类算法. 计算机科学,2016(3):80-83. (B类)
121. 林少聪,叶阿勇,许力. 基于坐标变换的k匿名位置隐私保护方法. 小型微型计算机系统,2016(1):119-123. (B类)
122. 罗杰,林伟川. 涉及分担三值的非整数级亚纯函数的唯一性定理. 数学物理学报,2016,36(2):243-254. (B类)
123. 陈建宝,乔宁宁. 地方利益主体博弈下的资源禀赋与公共品供给. 经济学(季刊),2016(2):693-722. (B类)
124. 陈建宝,鞠芳煜. 不同收入地区政府支出结构差异分析. 经济科学,2016(3):19-31. (B类)
125. 黄波,严宣辉,林建辉. 基于有向图分割的推荐算法. 计算机系统应用,2015(12):196-203. (B类)
126. 林建辉,严宣辉,黄波. 基于SVD与模糊聚类的协同过滤推荐算法. 计算机系统应用,2016(11):156-163. (B类)
127. 兰天,郭躬德. 基于词共现关系和粗糙集的微博话题检测方法. 计算机系统应用,2016(6):17-24. (B类)
128. 黄波,严宣辉,林建辉. 基于联合非负矩阵分解的协同过滤推荐算法. 模式识别与人工智能,2016(8):725-734. (B类)
129. 白猛,严宣辉,吴坤安,陈振兴. 混合分解的多目标粒子群优化算法. 计算机系统应用,2015(12):215-222. (B类)
130. 韩宸望,林晖,黄川. 基于SQL语法树的SQL注入过滤方法研究. 网络与信息安全学报, 2016, 2(11):70-77. (B类)
131. 董涛.为什么这三个命题是公理[J].数学通报,2016(7):4-6.(B类)