2015年发表的部分论文(B类以上)

发布时间:2016-04-19浏览次数:1834

1. Xie Y J, Ma C F(马昌凤). The matrix iterative methods for solving a class of generalized coupled Sylvester-conjugate linear matrix equations[J]. Applied Mathematical Modelling, 2015, 39(16):4895-4908. ( SCI-I)

2. Chen J(陈建清). Multiple positive solutions of a class of non autonomous Schrödinger–Poisson systems[J]. Nonlinear Analysis Real World Applications, 2015, 21(21):13-26. ( SCI-I)

3. Chen C(陈超). Three dimensional non-isentropic subsonic Euler flows in rectangular nozzles[J]. Nonlinear Analysis Real World Applications, 2015, 21(1):153-160. ( SCI-I)

4. Ke Y, Ma C(马昌凤). The generalized viscosity implicit rules of nonexpansive mappings in Hilbert spaces[J]. Fixed Point Theory & Applications, 2015, 2015(1):1-21. ( SCI-I)

5.Ke Y, Ma C(马昌凤). Strong convergence theorem for a common fixed point of a finite family of strictly pseudo-contractive mappings and a strictly pseudononspreading mapping[J]. Fixed Point Theory & Applications, 2015, 2015(1):1-23. ( SCI-I)

6. Gao Y(高燕芳), Wang Z(王智勇). Concentration of blow-up solutions for the coupled Schrödinger equations in R2[J]. Journal of Mathematical Analysis & Applications, 2015, 429(1):591–601. ( SCI-II )

7. Deng Q R(邓起荣), Lau K S. Sierpinski-type spectral self-similar measures [J]. Journal of Functional Analysis, 2015, 269(5):1310-1326. ( SCI-II )

8. Liu J, Huang X(黄欣沂), Liu J K. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption[J]. Future Generation Computer Systems, 2014, 52:67-76. ( SCI-II )

9. Hou S, Huang X(黄欣沂), Liu J K, J LiL Xu(许力). Universal designated verifier transitive signatures for graph-based big data[J]. Information Sciences, 2015, 318(C):144-156. ( SCI-II )

10. Wang J(王健). Poincaré-type inequalities for singular stable-like Dirichlet forms[J]. Journal of Mathematical Analysis & Applications, 2015, 432(2):761-786. ( SCI-II )

11. Hu L Y(胡丽莹), Guo G D(郭躬德), Ma C F(马昌凤). Image processing using Newton-based algorithm of nonnegative matrix factorization[J]. Applied Mathematics & Computation, 2015, 269:956-964. ( SCI-II )

12. Lin H(林和子). L^2 harmonic forms on submanifolds in a Hadamard manifold[J]. Nonlinear Analysis Theory Methods & Applications, 2015, 125:310–322. ( SCI-II )

13. Lin H(林晖), Xu L(许力), Y MuW Wu(伍玮). A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing[J]. Future Generation Computer Systems, 2014, 52(C):125-136. ( SCI-II )

14. Lin H(林和子). On the structure of conformally flat Riemannian manifolds [J]. Nonlinear Analysis Theory Methods & Applications, 2015, s 123–124:115-125. ( SCI-II )

15.Lin H(林和子).Vanishing theorems for L^2 harmonic forms on complete submanifolds in Euclidean space. Journal of Mathematical Analysis and Applications,2015, 425 (2) : 774-787. ( SCI-II )

16. Lin X(林贤祖). ADE Subalgebras of the Triplet Vertex Algebra W(p): E6, E7[J]. Imrn International Mathematics Research Notices, 2015, 2015(15):6752. ( SCI-II )

17. Chen C(陈超). Subsonic potential flows in general smooth: Bounded domains[J]. Communications in Mathematical Sciences, 2015, 13(8):2053-2064. ( SCI-II )

18. Huang N, Ma C F(马昌凤). Parallel multisplitting iteration methods based on M-splitting for the PageRank problem[J]. Applied Mathematics & Computation, 2015, 271(C):337-343. ( SCI-II )

19. Chen C, Ma C(马昌凤). A generalized shift-splitting preconditioner for saddle point problems [J]. Applied Mathematics Letters, 2015, 43:49-55. ( SCI-II )

20. Huang N, Ma C(马昌凤). A globally convergent damped Gauss–Newton method for solving the extended linear complementarity problem[J]. Journal of Numerical Mathematics, 2015, 23(3):247-256. ( SCI-II )

21. Huang N, Ma C F(马昌凤). The nonlinear inexact Uzawa hybrid algorithms based on one-step Newton method for solving nonlinear saddle-point problems [J]. Applied Mathematics & Computation, 2015, 270(C):291-311. ( SCI-II )

22. Huang N, Ma C(马昌凤), Xie Y. SOME PREDICTOR-CORRECTOR-TYPE ITERATIVE SCHEMES FOR SOLVING NONSYMMETRIC ALGEBRAIC RICCATI EQUATIONS ARISING IN TRANSPORT THEORY[J]. Numerical Linear Algebra with Applications, 2014, 21(6):761–780. ( SCI-II )

23. Huang N, Ma C(马昌凤). The BGS–Uzawa and BJ–Uzawa iterative methods for solving the saddle point problem [J]. Applied Mathematics & Computation, 2015, 256(C):94-108. ( SCI-II )

24. He Y, Ma C(马昌凤), Fan B. A corrected Levenberg–Marquardt algorithm with a nonmonotone line search for the system of nonlinear equations[J]. Applied Mathematics & Computation, 2015, 260(C):159-169. ( SCI-II )

25. Ma C F(马昌凤), Zheng Q Q. The corrected Uzawa method for solving saddle point problems[J]. Numerical Linear Algebra with Applications, 2015, 22(4):717–730. ( SCI-II )

26. Zheng Q Q, Ma C F(马昌凤). Fast parameterized inexact Uzawa method for complex symmetric linear systems [J]. Applied Mathematics & Computation, 2015, 256(C):11-19. ( SCI-II )

27. Xie Y J, Ma C F(马昌凤). The MGPBiCG method for solving the generalized coupled Sylvester-conjugate matrix equations[J]. Applied Mathematics & Computation, 2015, 265(C):68-78. ( SCI-II )

28. Ke Y F, Ma C F(马昌凤). Alternating direction method for generalized Sylvester matrix equation AXB + CYD = E[J]. Applied Mathematics & Computation, 2015, 260(C):106-125. ( SCI-II )

29. Huang N, Ma C F(马昌凤), Xie Y J. An inexact relaxed DPSS preconditioner for saddle point problem [J]. Applied Mathematics & Computation, 2015, 265:431-447. ( SCI-II )

30. Chen C R, Ma C F(马昌凤). A generalized shift-splitting preconditioner for singular saddle point problems[J]. Applied Mathematics & Computation, 2015, 269:947–955. ( SCI-II )

31. Liu J K, Chu C, Chow S S M, X Huang(黄欣沂), et al. Time-Bound Anonymous Authentication for Roaming Networks[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(1):178-189. ( SCI-II )

32. Chen Y, Chen J(陈建清). Existence of multiple positive weak solutions and estimates for extremal values to a class of elliptic problems with Hardy term and singular nonlinearity[J]. Journal of Mathematical Analysis & Applications, 2015, 429(2):873-900. ( SCI-II )

33. Hu L Y(胡丽莹), Guo G D(郭躬德), Ma C F(马昌凤). The least squares anti-bisymmetric solution and the optimal approximation solution for Sylvester equation[J]. Applied Mathematics & Computation, 2015, 259:212-219. ( SCI-II )

34. Tang J(唐嘉), Xie Y J, Ma C F(马昌凤). A modified product preconditioner for indefinite and asymmetric generalized saddle-point matrices [J]. Applied Mathematics & Computation, 2015, 268(C):303-310. ( SCI-II )

35.Ying Lv(吕楹), Changping Wang(王长平),Willmore surfaces in 3-sphere foliated by circles, J. reine angew. Math. 2015, 701:221–244.( ( SCI-II )

36.Jing Zeng(曾晶), Shuting Cai. Multiple solutions for a p-Laplacian elliptic problem .Boundary Value Problems, 2014, 1: 124-132.( SCI-III )

37. Huang N, Ma C F(马昌凤). Two structure-preserving-doubling like algorithms for obtaining the positive definite solution to a class of nonlinear matrix equation [J]. Computers & Mathematics with Applications, 2015, 69(6):494-502. ( SCI-III )

38. Xie Y J, Ma C F(马昌凤). The scaling conjugate gradient iterative method for two types of linear matrix equations [J]. Computers & Mathematics with Applications, 2015, 70(5):1098-1113. ( SCI-III )

39. Chen L(陈黎飞), Guo G(郭躬德). Nearest neighbor classification of categorical data by attributes weighting[J]. Expert Systems with Applications, 2015, 42(6):3142-3149. ( SCI-III )

40. Zhong Y(钟延生). Multiple solutions for the p-Laplacian problem with supercritical exponent[J]. Boundary Value Problems, 2015, 2015(1):1-15. ( SCI-III )

41. Baes M, Lin H(林惠玲). A Lipschitzian error bound for monotone symmetric cone linear complementarity problem[J]. Optimization, 2014, 64(11):1-22. ( SCI-III )

42. Ke P(柯品惠), Zhou Z. A Generic Construction of Z-Periodic Complementary Sequence Sets with Flexible Flock Size and Zero Correlation Zone Length[J]. Signal Processing Letters IEEE, 2015, 22(9):1462-1466. ( SCI-III )

43. Peng S(时鹏), Jinsheng H, Yue H, et al. Automated computational framework of blood vessel quantification in chick chorioallantoic membrane angiogenesis.[J]. Journal of Biomedical Optics, 2014, 19(10):106005-106005. ( SCI-III )

44. Zhou S(周书明), Lin L, Xu L(许力), et al. The t/k Diagnosability of Star Graph Networks[J]. IEEE Transactions on Computers, 2015, 64:1. ( SCI-III )

45. Chen Z(陈正新), Wang D. 2-Local automorphisms of finite-dimensional simple Lie algebras[J]. Linear Algebra & Its Applications, 2015, 486:335-344. ( SCI-III )

46. Lin S(林崧), Yu C H, Guo G D(郭躬德). Reexamining the security of fair quantum blind signature schemes[J]. Quantum Information Processing, 2014, 13(11):2407-2415. ( SCI-III )

47. Huang X(黄欣沂), Liu J K, Tang S, Xu L(许力),et al. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security[J]. IEEE Transactions on Computers, 2014, 64(4):971-983. ( SCI-III )

48. Tang J(唐嘉), Ma C(马昌凤). A smoothing Newton method for symmetric cone complementarity problems[J]. Optimization Letters, 2013:1-20. ( SCI-III )

49. Wang F Y, Wang J. Functional Inequalities for Stable-Like Dirichlet Forms[J]. Journal of Theoretical Probability, 2012, 28(2):1-26. ( SCI-III )

50. Wu J(吴建宁), Wu B. The novel quantitative technique for assessment of gait symmetry using advanced statistical learning algorithm.[J]. Biomed Research International, 2015, 2015. ( SCI-III )

51. Wang Z, Zhang X, Chen J(陈建清). Standing waves for nonlinear Schrödinger-Poisson equation with high frequency[J]. Topological Methods in Nonlinear Analysis, 2015,45(.2): 601-614. ( SCI-III )

52. Lin H(林和子). On the Structure of Submanifolds in Euclidean Space with Flat Normal Bundle[J]. Results in Mathematics, 2015, 68(3-4):313-329. ( SCI-III )

53. Gao Y(高燕芳), Wang Z(王智勇). Scattering versus blow-up for the focusing L 2 supercritical Hartree equation[J]. Zeitschrift Für Angewandte Mathematik Und Physik Zamp, 2012, 57(2):73-77. ( SCI-III )

54. Lin L, Zhou S(周书明), Xu L(许力), et al. The Extra Connectivity and Conditional Diagnosability of Alternating Group Networks[J]. IEEE Transactions on Parallel & Distributed Systems, 2015, 26(8):2352-2362. ( SCI-III )

55. Lin L, Xu L(许力), Zhou S(周书明), et al. The Reliability of Subgraphs in the Arrangement Graph[J]. Reliability IEEE Transactions on, 2015, 64(2):807-818. ( SCI-III )

56. Ye J(叶剑雄), Xu H, Huang X, et al. Dynamics Analysis and Prediction of Genetic Regulation in Glycerol Metabolic Network via Structural Kinetic Modelling[J]. Mikroskopie, 2015, 2015(3):1-9. ( SCI-IIII )

57. Knopova V, Schilling R L, Wang J(王健). Lower bounds of the Hausdorff dimension for the images of Feller processes[J]. Statistics [?] Probability Letters, 2014, 97:222–228. ( SCI-IIII )

58. Chen X P(陈晓平), Shi J H, Zhou Y. Monotone rank estimation of transformation models with length-biased and right-censored data[J]. Science China Mathematics, 2015, 58(10):1-14.

59. ZHANG(张云南), Qiong. Two Classes of Operators with Irreducibility and the Small and Compact Perturbations of Them[J]. Acta Mathematica Sinica, 2015, 31(8):1261-1272. ( SCI-IIII )

60. Wu X, Ye S. On a logarithmic Hardy-Bloch type space[J]. Rocky Mountain Journal of Mathematics, 2014, 44(5):1669-1683. ( SCI-IIII )

61. Wu J, Chen Z(陈志德). An Implicit Identity Authentication System Considering Changes of Gesture Based on Keystroke Behaviors[J]. International Journal of Distributed Sensor Networks, 2015, 2015:1-16. ( SCI-IIII )

62. Zhang S F(张世芳), Zhong H J(钟怀杰), Lin L Q. Generalized Drazin spectrum of operator matrices[J]. Applied Mathematics A Journal of Chinese Universities, 2014, 29(2):162-170. ( SCI-IIII )

63. Lin H(林晖), Hu J, Ma J, Li X(许力)et al. A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks[J]. Wireless Personal Communications, 2014, 75(3):1611-1633. ( SCI-IIII )

64. Lin X(林贤祖). Infinitely Many Primes in the Arithmetic Progression $\textit{\textbf{kn-1$[J]. American Mathematical Monthly, 2015, 122(1):48-51. ( SCI-IIII )

65. Lin H(林和子). On the structure and volume growth of submanifolds in Riemannian manifolds[J]. Journal of Geometry & Physics, 2015, 92:119–128. ( SCI-IIII )

66. Yanhong Zheng(郑艳红), Haixia Wang. Chaotic burst synchronization in a two-small-world-layer neuronal network[J]. International Journal of Modern Physics C, 2015, 26(05). ( SCI-IIII )

67.Chen, Zhengxin(陈正新),Wang, Bing.Commutingderivations and automorphisms of certain nilpotent Lie algebras over commutative rings. Communications in algebra2015,435):2044-2061. ( SCI-IIII )

68. Chen J F(陈俊凡). Normality criteria for families of zero-free meromorphic functions[J]. Annales Polonici Mathematici, 2015, 115(1):89-98. ( SCI-IIII )

69. Lin H(林晖), Hu J, Huang C(黄川), Li X(许力) et al. Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks[J]. International Journal of Distributed Sensor Networks, 2015, 2015:1-12. ( SCI-IIII )

70. Chen X, Wang J(王健). Intrinsic contractivity properties of Feynman-Kac semigroups for symmetric jump processes with infinite range jumps[J]. Frontiers of Mathematics in China, 2015, 10(4):753-776. ( SCI-IIII )

71.Wang J(王健). Linear Evolution Equations with Cylindrical Lévy Noise: Gradient Estimates and Exponential Ergodicity[J]. Stochastic Analysis & Applications, 2015, 33(2):306-330. ( SCI-IIII )

72.Yifen K E, Changfeng M A(马昌凤). A NEURAL NETWORK FOR THE GENERALIZED NONLINEAR COMPLEMENTARITY PROBLEM OVER A POLYHEDRAL CONE[J]. Journal of the Australian Mathematical Society, 2015, 99(3):364-379. ( SCI-IIII )

73.Huang N, Ma C(马昌凤). TWO INVERSION-FREE ITERATIVE ALGORITHMS FOR COMPUTING THE MAXIMAL POSITIVE DEFINITE SOLUTION OF THE NONLINEAR MATRIX EQUATION[J]. Applied & Computational Mathematics, 2015, 14(2):158-167. ( SCI-IIII )

74. Ye Z, Ke P(柯品惠), Zhang S(张胜元), et al. Zero-Difference Balanced Function Derived from Fermat Quotients and Its Applications[J]. Ieice Transactions on Fundamentals of Electronics Communications & Computer Sciences, 2015, E98.A(11):2336-2340. ( SCI-IIII )

75. Ou Z H(欧忠辉). Direction change of plant root growth by the impenetrable boundary[J]. Plant Biosystems, 2014, 148(6):1160-1168. ( SCI-IIII )

76. Ye Z, Ke P(柯品惠), Zhang S(张胜元), et al. Some Notes on Pseudorandom Binary Sequences Derived from Fermat-Euler Quotients[J]. Ieice Transactions on Fundamentals of Electronics Communications & Computer Sciences, 2015, E98.A(10):2199-2202. ( SCI-IIII )

77.Chen L F(陈黎飞). A probabilistic framework for optimizing projected clusters with categorical attributes[J]. Sciece China Information Sciences, 2015, 58(7):1-15. ( SCI-IIII )

78.Lin X(林贤祖). Fusion rules of Virasoro Vertex Operator Algebras[J]. Proceedings of the American Mathematical Society, 2012, 143(9):3765-3776. ( SCI-IIII )

79.Lin H(林晖), Hu J, Ma J, Li X(许力),et al. CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks[J]. Computer Journal, 2014, 58(4) :656-667. ( SCI-IIII )

80. Zhang J, Li X(许力), Zhou S(周书明), et al. A novel sleep scheduling scheme in green wireless sensor networks[J]. Journal of Supercomputing, 2015, 71(3):1067-1094. ( SCI-IIII )

81.Song S, Li X, Zhou S(周书明), et al. Fault tolerance and diagnosability of burnt pancake networks under the comparison model[J]. Theoretical Computer Science, 2015, 582:48–59. ( SCI-IIII )

82. Zhang, Jing, Zhou, Shu-Ming(周书明), Xu, Li(许力), et al. An efficient connected dominating set algorithm in WSNs based on the induced tree of the crossed cube[J]. International Journal of Applied Mathematics & Computer Science, 2015, 25(2):295-309. ( SCI-IIII )

83.Wang X, Xu L(许力), Zhou S(周书明), et al. A resolving set based algorithm for fault identification in wireless mesh networks[J]. Meteorological & Environmental Sciences, 2015, 21:384-405. ( SCI-IIII )

84.Xu L(许力), Chen X, Li J ,X Huang(黄欣沂),J Zhou. Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis[J]. Telecommunications Systems, 2015, 60(1):149-158. ( SCI-IIII )

85.Lin L, Xu L(许力), Zhou S(周书明), et al. Conditional diagnosability and strong diagnosability of Split-Star Networks under the PMC model[J]. Theoretical Computer Science, 2014, 562(C):565-580. ( SCI-IIII )

86.Wang X, Xu L(许力), Zhou S(周书明). Restoration strategy based on optimal relay node placement in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2015, 2015(8):1-13. ( SCI-IIII )

87.Chen H, Shen J(沈建和), Zhou Z(周哲彦). EXISTENCE AND ANALYTICAL APPROXIMATIONS OF LIMIT CYCLES IN A THREE-DIMENSIONAL NONLINEAR AUTONOMOUS FEEDBACK CONTROL SYSTEM[J]. Journal of Systems Science & Complexity, 2014, 27(6):1158-1171. ( SCI-IIII )

88.Shen J(沈建和), Chen H(周哲彦), Zhou Z, et al. Approximation of limit cycles in two-dimensional nonlinear systems near a Hopf bifurcation by canonical transformations[J]. Journal of Engineering Mathematics, 2015, 92(1):185-202. ( SCI-IIII )

89.Tongzhu Li(李同柱), Xiang Ma(马翔), Changping Wang(王长平),
 Wintgen ideal submanifolds with a low-dimensional   integrable distribution (I), Frontiers of Mathematics in China, 2015,10(1):111- 136. ( SCI-IIII )

90.Zhen Guo(郭震), Tongzhu Li(李同柱), Changping Wang(王长平), Classification of hypersurfaces with constant Moebius Ricci  Curvature in Rn+1, Tohoku Math. J.2015, 673, 383-403. ( SCI-IIII )

91.Wang K(王开军). Asynchronous standard deviation method for fault detection[C]// Prognostics and System Health Management Conference. IEEE, 2014:233 - 236. ( EI )

92. Ye A Y(叶阿勇), Lin S C, Ma J F, L Xu(许力). An active diffusion based location privacy protection method[J]. Tien Tzu Hsueh Pao/acta Electronica Sinica, 2015, 43(7):1362-1368. ( EI )

93. Li M, Huang X(黄欣沂), Liu J K, L Xu(许力) . GO-ABE: Group-Oriented Attribute-Based Encryption[M]// Network and System Security. Springer International Publishing, 2014:260-270. ( EI )

94.Hou S, Huang X(黄欣沂), Xu L(许力). Identity-Based Transitive Signcryption[M]// Network and System Security. Springer International Publishing, 2014:246-259. ( EI )

95. Lin C, Li Y, Lv K, CC Chang. Ciphertext-auditable identity-based encryption[J]. International Journal of Network Security, 2015, 17(1):23-28. ( EI )

96. Chen L, Guo G, Wang S, et al. Kernel learning method for distance-based classification of categorical data[C]// Computational Intelligence. IEEE, 2014. ( EI )

97. Chen L(陈黎飞), Ye Y, Guo G(郭躬德), J Zhu. Kernel-based linear classification on categorical data[J]. Soft Computing, 2015:1-13. ( EI )

98. Li Y(李英国). Hopf bifurcation analysis of a feedback control ecosystem with two delays[C]// Control Conference. IEEE, 2014. ( EI )

99. Ma J, Chen Z(陈志德),Wu W(伍玮), R ZhengJ Liu.Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies[J]. Information, 2015, 6(3):536-549. ( EI )

100.Chen Z(陈志德), Wang ML Xu(许力)W Wu(伍玮) . Worm propagation model in mobile network[J]. Concurrency & Computation Practice & Experience, 2015. ( EI )

101. Yang W杨文生), Li X李学鹏). Global asymptotical stability for a diffusive predator–prey system with Beddington–DeAngelis functional response and nonlocal delay[J]. Journal of Applied Mathematics & Computing, 2015, 50(1-2):327-347. ( EI )

102. Jiang J M(蒋建民), Zhu H, Li Q, S Zhang(张仕). Configuration of Services Based on Virtualization[C]// TASE 2014. 2014:177-184. ( EI )

103. Yao C, Xu L(许力), Huang X(黄欣沂), JK Liu. A secure remote data integrity checking cloud storage system from threshold encryption[J]. Journal of Ambient Intelligence & Humanized Computing, 2014, 5(6):857-865. ( EI )

104. 叶欢, 陈庆华. Stress-Strength Structural Reliability Model with a Stochastic Strength Aging Deterioration Process[J]. Journal of Donghua University(English Edition), 2014, 31(6):847-849. ( EI )

105. 陈智勤, 李成进, 张圣贵. 物流管理中的图分割问题[J]. 应用数学学报, 2015(2):356-365. ( A )

106. 吴建宁, 徐海东, 王珏. 用于低功耗的体域网加速度数据压缩感知设计[J]. 中国生物医学工程学报, 2015, 34(6). ( A )

107. 董涛. 基于PCK结构框架的数学课例分析程序与特征[J]. 课程.教材:教法, 2015(11):75-79. ( A )

108. 林晖, 田有亮, 许力,. HWMN中一种新的隐私感知安全路由协议[J]. 计算机研究与发展, 2015(8):1883-1892. ( A )

109.胡丽莹, 郭躬德, 马昌凤. 基于对称非负矩阵分解的重叠社区发现方法[J]. 计算机应用, 2015(10):2742-2746. ( A )

110. 陈旖, 许力, 张美平. 适用于大规模无线传感器网的流量优化系统设计[J]. 计算机应用, 2015, 35(4):905-909. ( A )

111. 林崧, 王宁, 郭躬德,. 具有双向认证功能的多方量子密钥分发[J]. 中国科学:物理学力学天文学, 2015(4):40302-040302. ( A )

112. 赖璇, 陈正新. 有限维单李代数的2-局部导子[J]. 数学学报:中文版, 2015(5):847-852. ( A)

113.吴建宁, 徐海东. 用块稀疏贝叶斯学习算法重构识别体域网步态模式[J]. 计算机应用, 2015, 35(5):1492-1498. ( A )

114. 叶立淼, 陈庆华. 混合指数几何分布[J]. 统计研究, 2015(7):106-112. ( A )

115. 赖智铭, 郭躬德. 基于滑动窗口和蚁群优化算法的二次路径规划算法[J]. 计算机应用, 2015(1):172-178. ( A )

116. 余勇, 郭躬德. 基于矩阵分解模型的微博好友推荐算法[J]. 计算机系统应用, 2015(12):133-141. ( B )

117. 叶锋, 傅燕云, 陈林芳,. 基于多协议融合的实时移动视频监控系统[J]. 计算机系统应用, 2015(4):80-85. ( B )

118. 陈家祯, 郑子华, 叶锋,. 多重虚拟三维物体菲涅耳全息水印方法[J]. 计算机系统应用, 2015, 24(8):33-39. ( B )

119. 黄娜, 马昌凤, 谢亚君. 一类Hermitian鞍点矩阵的特征值估计[J]. 计算数学, 2015(1):92-102. ( B )

120. 陈家祯, 郑子华, 叶锋,. 数字全息图可控再现菲涅耳计算全息水印方法[J]. 激光与光电子学进展, 2015(12). ( B )

121. 张豪, 陈黎飞, 郭躬德. 规范化相似度的符号序列层次聚类[J]. 计算机科学, 2015, 42(5):114-118. ( B )

122. 郭彦明, 陈黎飞, 郭躬德. DNA序列的二阶隐马尔科夫模型分类[J]. 计算机系统应用, 2015(9):22-28. ( B )

123.吴建宁, 徐海东. EMD和小波消噪的加速度信号压缩重构新方法[J]. 计算机系统应用, 2015(11):99-106. ( B )

124. 杨婷婷, 林昌露, 刘忆宁,. 基于多方排序协议的安全电子投票方案[J]. 计算机系统应用, 2015, 24(8):25-32. ( B )

125. 王宁, 林崧. 基于最低有效位的量子图像水印[J]. 量子电子学报, 2015, 32(3):263-269. ( B )

126. 王宁, 郭躬德, 林崧. 基于Greenberger-Horne-Zeilinger态的量子公平盲签名方案[J]. 小型微型计算机系统, 2015(3):520-523. ( B )

127. 吴建宁. 面向实践教学的嵌入式系统课程体系构建与探索[J]. 实验室科学, 2014, 17(6):184-186. ( B )

128. 吴亚洲, 杨启帆, 蒋建民,. 业务过程的自动配置与管理[J]. 计算机科学, 2015(7):129-133. ( B )

129.罗芬芬, 林昌露, 张胜元,. 基于FOO投票协议的无收据电子投票方案[J]. 计算机科学, 2015, 42(8):180-184. ( B )

130. 黄河清, 吴建宁, 蔡泽森,. 面向家庭的无线便携老年人健康信息远程获取系统[J]. 计算机系统应用, 2015(2):53-58. ( B )

131. 黄燕, 李祎. 0真的应该成为自然数吗[J]. 数学通报, 2015(2):10-12. ( B )

132.蒋欣, 王开军, 陈黎飞. 基于改进余弦相似度的粒子滤波故障预报[J]. 计算机系统应用, 2015, 24(1):98-103. ( B )

133. 杨洪, 许力, 章静. 无线传感器网络中容错虚拟骨干网构造算法[J]. 小型微型计算机系统, 2014(12):2612-2616. ( B )

134. 陈旖, 张美平, 许力. WSN应用层协议MQTT-SNCoAP的剖析与改进[J]. 计算机系统应用, 2015(2):229-234. ( B )

135.张美平, 许力. 基于ZigBee的物联网环境数据采集与控制系统[J]. 计算机系统应用, 2015(2):59-64. ( B )

136. 余勇, 郭躬德. 基于RBLDA模型和交互关系的微博标签推荐算法[J]. 计算机系统应用, 2015, 24(8):141-148. ( B )

137.卢伟胜, 郭躬德. 基于特定话题的微博意见领袖在线检测方法[J]. 计算机应用与软件, 2015, 32(5):70-74. ( B )

138. 林新棋, 李海涛, 林云玫. 基于多尺度互信息量的数字视频帧篡改检测[J]. 计算机工程, 2015(4):246-252. ( B )

139. 林新棋, 林云玫, 林志新,. 基于纹理谱的视频帧间篡改检测[J]. 计算机工程, 2015, 41(11):314-321. ( B )

140. 胡珊, 李云. 计算机实验教学中心设备信息化管理探索[J]. 实验室科学, 2014, 17(5):165-167. ( B )

141. 詹晓珊, 林新棋, 孔祥增,. CUSUM算法在NOAA卫星数据震前异常分析中的应用[J]. 计算机应用与软件, 2015(2):232-235. ( B )