2017年发表的科研学术论文
发布时间: 2018-07-04 访问次数: 13

序号

论文题目

所有作者

刊名, , (): 起止页码

论文类别

sci-I收录论文1

1

Cluster validation method for determining   the number of clusters in categorical sequences

陈黎飞,郭躬德,姜青山,叶艳芳

IEEE Transactions on Neural Networks and   Learning Systems

sci-I

sci-II收录论文21

2

A generalization of the HSS-based   sequential two-stage method for solving non-Hermitian saddle point problems

马昌凤,陈彩荣

Numerical Algorithms

sci-II

3

The dimensional splitting iteration methods   for solving saddle point problems arising from time-harmonic eddy current   models

马昌凤,柯艺芬

Applied Mathematics and Computation

sci-II

4

SOR-like iteration method for solving   absolute value equations

马昌凤,柯艺芬

Applied Mathematics and Computation

sci-II

5

An inexact modified relaxed splitting   preconditioner for the generalized saddle point problems from the   incompressible Navier-Stokes equations

马昌凤,柯艺芬

Numerical Algorithms

sci-II

6

Picard splitting method and Picard CG   method for solving the absolute value equation

马昌凤,吕长青

Journal of Nonlinear Sciences and   Applications

sci-II

7

Symmetric least squares solution of a class   of Sylvester matrix equations via MINIRES algorithm

马昌凤,马昌凤

Journal of the Franklin Institute

sci-II

8

The parameterized upper and lower   triangular splitting methods for saddle point problems

马昌凤,李景涛

Numerical Algorithms

sci-II

9

Multimodal learning for topic sentiment   analysis in microblogging

黄发良

Neurocomputing

sci-II

10

Eigenvalue estimate and gap theorems for   submanifolds in the hyperbolic space

林和子

Nonlinear Analysis: Theory, Methods &   Applications 148 (2017), 126137.

sci-II

11

Stackelberg game based relay selection for   physical layer security and energy efficiency enhancement in cognitive radio   networks

许力,方禾

Applied Mathematics and Computation

sci-II

12

Vanishing theorems for f-harmonic forms on   smooth metric measure spaces

林和子,韩英波

Nonlinear Analysis: Theory, Methods &   Applications

sci-II

13

Toward Better DataVeracity in Mobile Cloud Computing: A   Context-Aware and Incentive-Based Reputation Mechanism.

林晖

information sciences

sci-II

14

A class of accelerated parameterized   inexact Uzawa algorithms for complex symmetric linear systems

马昌凤,郑青青

Applied Mathematics and Computation

sci-II

15

Can Likert scales be treated as interval   scales? - A simulation study

吴慧萍,Shing-On Leung

Journal of Social Service Research

sci-II

16

A Variant of Password Authenticated Key   Exchange Protocol

Abdulhameed Alelaiwi,伍玮,项阳,Abdulhameed   Alelaiwi

Future Generation Computer Systems

sci-II

17

A Levenberg-Marquardt method for solving semi-symmetric   tensor equations

马昌凤,吕长青

Journal of Computational and Applied   Mathematics, 2018, 332:1325

sci-II

18

Blow-up phenomena for a nonlinear   pseudo-parabolic equation with nonlocal source

龙群飞

APPLIED MATHEMATICS LETTERS

sci-II

19

Laws of the iterated logarithm for   symmetric jump processes

王健,Kim Panki,Takashi Kumagai

Bernoulli

sci-II

20

Overlapping Community Detection for   Multimedia Social Networks

黄发良

IEEE Transactions on Multimedia

sci-II

21

An examination of Chinese preservice and inservice   early childhood teachers perspectives on the importance and feasibility of the   implementation of key characteristics of quality inclusion

吴慧萍,Bi Ying Hu

International Journal of Inclusive   Education

sci-II

22

Stability andbifurcation analysis in the coupled HR   neurons with delayed synaptic connection

郑艳红,王海侠

NONLINEAR DYNAMICS

sci-II

23

Efficient Sequential Data Migration Scheme   Considering Dying Data for HDD/SSD Hybrid Storage Systems

林铭炜

IEEE ACCESS

sci-III

24

Semi-convergence analysis of parameterized   ULT splitting iteration methods for singular saddle point problems

马昌凤,李景涛

Computers & Mathematics with   Applications

sci-III

25

Positive definite and semi-definite   splitting methods for non-hermitian positive definite linear systems

马昌凤,黄娜

Journal of Computational Mathematics, 2016,   34(3): 300-316

sci-III

26

Minimum-norm Hamiltonian solutions of a   class of generalized Sylvester-conjugate matrix equations

马昌凤,胡晶晶

Computers & Mathematics with   Applications

sci-III

27

An alternating direction method for   nonnegative solutions of the matrix equation AX+YB = C

马昌凤,柯艺芬

Computational & Applied Mathematics

sci-III

28

Alternating direction methods for solving a   class of Sylvester-like matrix equations (AXB, CXD) = (G, H)

马昌凤,柯艺芬

Linear & Multilinear Algebra

sci-III

29

A matrix CRS iterative method for solving a   class of coupled Sylvester-transpose matrix equations

马昌凤,陈彩荣

Computers & Mathematics with   Applications

sci-III

30

On the least squares generalized Hamiltonian   solution of generalized coupled Sylvester-conjugate matrix equations

马昌凤,马昌凤

Computers & Mathematics with   Applications

sci-III

31

SIGN-CHANGING SOLUTIONS FOR ELLIPTIC   EQUATIONS WITH FAST INCREASING WEIGHT AND CONCAVE-CONVEX NONLINEARITIES

钱晓涛

ELECTRONIC JOURNAL OF DIFFERENTIAL   EQUATIONS

sci-III

32

EXISTENCE OF MULTIPLE POSITIVE WEAK   SOLUTIONS AND ESTIMATES FOR EXTREMAL VALUES FOR A CLASS OF CONCAVE-CONVEX   ELLIPTIC PROBLEMS WITH AN INVERSE-SQUARE POTENTIAL

陈耀苹

COMMUNICATIONS ON PURE AND APPLIED ANALYSIS

sci-III

33

Global well-posedness of 2D nonlinear   Boussinesq equations with mixed partial viscosity and thermal diffusivity

陈超

MATHEMATICAL METHODS IN THE APPLIED   SCIENCES

sci-III

34

Exponential attractors for the strongly   damped wave equations with critical exponent

钟延生

Boundary Value Problems (2016) 2016:36

sci-III

35

A new form for the differential of the   constraint functional in strictly convex reflexive Banach spaces

钟延生,李永青

Journal of Mathematical Analysis and   Applications

sci-III

36

Minimal mass non-scattering solutions of   the focusing L 2-critical Hartree   equations with radial data

高燕芳,王智勇

Discrete and Continuous Dynamical Systems.   Series A

sci-III

37

Infinite solutions having a prescribed   number of nodes for a Schrdinger problem

曾晶,

BOUNDARY VALUE PROBLEMS

sci-III

38

The Reliability Analysis Based on   Subsystems of (n, k)-Star Graph

周书明,李小旺,王大进,林丽美,胥翔

IEEE TRANSACTIONS ON RELIABILITY,

sci-III

39

Cryptanalysis of Controlled Bidirectional   Quantum Secure Direct Communication Network Using Classical XOR Operation and   Quantum Entanglement

林崧,郭躬德,刘晓芬,蔡彬彬

IEEE Communications Letters

sci-III

40

Dynamical behaviors of a diffusive   predator-prey model with Beddington-DeAngelis functional response and disease   in the prey

杨文生

International Journal of Biomathematics

sci-III

41

Towards Secure and Cost-Effective fuzzy   Access Control in Mobile Cloud Computing

伍玮

Soft Computing

sci-III

42

Uncertain random spectra_ a new metric for   assessing the survivability of mobile wireless sensor networks

许力,王大进,伍玮,章静

Soft Computing

sci-III

43

Self-adaptive trust management based on   game theory in fuzzy large-scale networks

许力,方禾,黄欣沂

Soft Computing

sci-III

44

A Straight Skeleton Based Connectivity   Restoration Strategy in the Presence of Obstacles for WSNs

许力,汪晓丁,周书明

Sensors

sci-III

45

An adaptive trust-Stackelberg game model   for security and energy efficiency in dynamic cognitive radio networks

许力,方禾,李颉

Computer Communications

sci-III

46

Bowen Lemma in the Countable Symbolic Space

李名田

Entropy

sci-III

47

Analysis on inexact block diagonal   preconditioners for elliptic PDE -constrained optimization problems

马昌凤,黄娜

Computers & Mathematics with   Applications, 2017, 74, 24232437

sci-III

48

Universally Composable RFID Mutual   Authentication

黄欣沂,苏春华,Robert   Deng,Yingjiu Li,Bagus Santoso

IEEE Transactions on Dependable and Secure   Computing

sci-III

49

DMRS: An Efficient Dynamic Multi-keyword   Ranked Search over Encrypted Cloud Data

陈兰香,邱林冰

Soft Computing

sci-III

50

Quantum key agreement protocols with single   photon in both polarization and spatial-mode degrees of freedom

王丽丽

Quantum Information Processing

sci-III

51

Rate Functions for Symmetric Markov   Processes via Heat Kernel

王健,Yuichi Shiozawa

Potential Anal

sci-III

52

Weighted Poincare Inequalities for   Non-local Dirichlet Forms

王健,陈昕

Journal of Theoretical Probability

sci-III

53

Reliability Assessment of Multiprocessor   System Based on (n, k)-Star Network

周书明,王大进,李金强,李小旺

IEEE TRANSACTIONS ON RELIABILITY,

sci-III

54

An accelerated augmented Lagrangian method   for linearly constrained convex programming with the rate of convergence   O(1/k^2)

马昌凤,柯艺芬

Applied Mathematics-A Journal of Chinese   Universities, 2017,32(1):117-126

sci-IIII

55

The alternating direction methods for   solving the Sylvester-type matrix equation AXB+CX^TD = E

马昌凤,柯艺芬

Journal of Computational Mathematics

sci-IIII

56

Role-based signature and its security proof

林昌露,林昌露

Journal of Information Science and Engineering

sci-IIII

57

Autocorrelation of the Modified Binary   Two-prime Sidelnikov Sequence

柯品惠,周正春

International Journal of Foundations of   Computer Science

sci-IIII

58

Uniform quasi-differentiabilityof semigroup to nonlinear   reaction-diffusion equations with supercritical exponent

钟延生,孙春友

Acta Mathematica Scientia

sci-IIII

59

Nonexceptional functions and normal   families of zero-free meromorphic functions

陈俊凡

Filomat

sci-IIII

60

Reliability of Complete Cubic Networks   under the Condition of g-Good-Neighbor

周书明,胥翔,李金强

The Computer Journal

sci-IIII

61

The g-good-neighbor diagnosability of (n,   k)-star graphs

周书明,胥翔,李小旺

Theoretical Computer Science

sci-IIII

62

Multi-party quantum key agreement with   teleportation

林崧,蔡彬彬,郭躬德

Modern Physics Letters B

sci-IIII

63

Multi-party Quantum Key Agreement without   Entanglement

林崧,蔡彬彬,郭躬德

International Journal of Theoretical   Physics

sci-IIII

64

High-throughput Fat Quantifications of   Hematoxylin-Eosin Stained Liver Histopathological Images Based on Pixel-wise   Clustering

时鹏

SCIENCE CHINA-INFORMATION SCIENCES

sci-IIII

65

A Road-Network Based Privacy-Preserving   Approach in Trajectory Publishing

叶阿勇

Journal of Internet Technology

sci-IIII

66

Network Coding Based Converge-Cast Scheme   in Wireless Sensor Networks

许力,章静,黄欣沂,项阳

Wireless Personal Communications

sci-IIII

67

A NOTE ON WEYL-TYPE THEOREMS AND   RESTRICTIONS

苏维钢,陈俐宏

Annals of FunctionalAnalysis

sci-IIII

68

Hybrid Recovery Strategy Based on Random   Terrain in Wireless Sensor Networks

许力,汪晓丁,周书明,伍玮

Scientific Programming

sci-IIII

69

Strongly Secure Certificateless Signature   Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack   Ability

许力,王峰

JOURNAL OF INFORMATION SCIENCE AND   ENGINEERING

sci-IIII

70

Evolutionarily stable opportunistic   spectrum access in cognitive radio networks

许力,方禾,林志伟

IET Communications

sci-IIII

71

Hypersurfaces in nearly Kaehler manifold   S^3xS^3

杨标桂,朱晴晴

Proceedings - Mathematical Sciences

sci-IIII

72

bpCMon:A rule-based monitoring framework   for business processes compliance

龚平

International journal of web services   research

sci-IIII

73

Relaxation Oscillations in Singularly   Perturbed Generalized Lienard Systems with Non-Generic Turning Points

沈建和,胡欢

MATHEMATICAL MODELLING AND ANALYSIS

sci-IIII

74

Characterizations of the Vertex Operator   Algebras and V-L(T) and V-L(O)

林贤祖

Algebras and Representation Theory

sci-IIII

75

Aclass of simple Lie algebras attached to unit forms

陈正新,陈金晶

Frontier of mathematics in China

sci-IIII

76

THE STRONG IRREDUCIBILITY OF A CLASS OF   COWENDOUGLAS OPERATORS ON   BANACH SPACES

张云南,林丽琼

Bulletin of the Australian Mathematical   Society

sci-IIII

77

Protecting Mobile Health Records in Cloud   Computing: A Secure, Efficient, andAnonymous   Design

伍玮,黄欣沂,陈晓峰,许力,伍玮

ACM Transactions on Embedded Computing   Systems

sci-IIII

78

Uniqueness of meromorphic functions sharing   two finite sets

陈俊凡

Open Mathematics

sci-IIII

79

Exposing video inter-frame forgery by   Zernike opponent chromaticity moments and coarseness analysis

黄添强,刘雨青

Multimedia System

sci-IIII

80

A Novel Location Privacy-Preserving Scheme   Based on l-Queries for Continuous LBS

叶阿勇

Computer Communications

ei收录论文核心版

81

A Robust Location Fingerprint Based on   Differential Signal Strength and Dynamic Linear Interpolation

叶阿勇

Security & Communication Networks

ei收录论文核心版

82

A novel video forgery detection algorithm   for blue screen compositing based on 3-stage foreground analysis and tracking

黄添强,刘雨青

Multimedia Tools and Applications

ei收录论文核心版

83

Workload-aware page-level flash translation   layer for NAND flash-based storage systems

林铭炜,王慧冰,林铭炜

Lecture Notes in Computer Science

ei收录论文核心版

84

An improved block-based matching algorithm   of copy-move forgery detection

黄添强,赖玥聪,卢贺楠,林晶

Multimedia Tools and Applications

ei收录论文核心版

85

RSE-PoW: A role symmetric encryption PoW   scheme with authorized deduplication for multimedia data

熊金波,张媛媛,李璇

Mobile Networks and Applications

ei收录论文核心版

86

A secure data deduplication scheme based on   differential privacy

熊金波,任君

IEEE ICPADS

ei收录论文核心版

87

Multi-attribute group decision-making under   probabilistic uncertain linguistic environment

林铭炜

Journal of the Operational Research Society

ei收录论文核心版

88

Approach to Estimating Energy Consumption   for Mobile Software Based on AADL Language

杜欣

软件学报

ei收录论文核心版

89

Surrogate model assisted multi-objective   differential evolution algorithm for performance optimization at software   architecture level

杜欣

Asia-Pacific Conference on Simulated   Evolution and Learning 2017SEAL2017

ei收录论文核心版

90

An Evolutionary Algorithm for Performance   Optimization at Software Architecture Level

杜欣

2015 Annual Conference on Genetic and   Evolutionary Computation

ei收录论文核心版

91

Achieving proof of shared ownership for the   shared file in collaborative cloud applications

熊金波,张媛媛,王丽丽,林铭炜,李璇

IEEE ICCCS

ei收录论文核心版

92

Smooth representation clustering based on   kernelized random walks

陈丽萍,郭躬德,陈黎飞

1st Asia-Pacific Web and Web-Age Information   Management Joint Conference on Web and Big Data, APWeb-WAIM 2017 held in   Conjuction with the International Workshop on Mobile Web Data Analytics, MWDA   2017, International Workshop on Hot Topics in Big Spatial Data and Urban   Computing

ei收录论文核心版

93

A Multi-objective Evolutionary Algorithm   for Rule-based Performance Optimization at Software Architecture Level

杜欣

17th Genetic and Evolutionary Computation   Conference

ei收录论文核心版

94

Linear complexity of a class of   pseudorandom sequences over a general finite field

柯品惠,叶琪,沈剑

Soft Computing

ei收录论文核心版

95

Authenticated Data Redaction with   Fine-Grained Control

伍玮,黄欣沂,项阳,伍玮

IEEE Transactions on Emerging Topics in   Computing

ei收录论文核心版

96

Trust Enhancement over Range Search for   Encrypted Data

Ting-Ting Lee,黄欣沂,Joseph K. Liu,Ting-Ting Lee

IEEE International Conference on Trust,   Security and Privacy in Computing and Communications

ei收录论文核心版

97

Diagnosabilities of regular networks under   three-valued comparison models

周书明,胥翔,许力

Int. J. High Performance Computing and   Networking

ei收录论文核心版

98

Bot detection using unsupervised machine   learning

伍玮,Hung-Ming Sun,Jaime Alvarez

Microsystem Technologies

ei收录论文核心版

99

An Efficient and Secure Design of   Redactable Signature Scheme with Redaction Condition Control

伍玮,伍玮

Green, Pervasive, and Cloud Computing

ei收录论文核心版

100

Automated quantitative image analysis of   hematoxylin-eosin staining slides in lymphoma based on hierarchical Kmeans   clustering

时鹏

Proceedings - 2016 8th International   Conference on Information Technology in Medicine and Education, ITME 2016

ei收录论文核心版

101

A trajectory privacy-preserving algorithm   based on road networks in continuous location-based services

叶阿勇

2017 IEEE Trustcom

ei收录论文核心版

102

Perceptual Video Signal Compression Method   Based on Structure Analysis

叶锋,陈家祯,许力,李承欣,门爱东

北京邮电大学学报

ei收录论文核心版

103

An Adaptive Error Concealment Algorithm   Based on Partition Model

许力,李承欣,陈家祯,叶锋

Advances in Image and Graphics Technologies

ei收录论文核心版

104

A Privacy-Preserving Approach Based on   Graph Partition for Uncertain Trajectory Publishing

许力,肖剑川,汪晓丁,林丽美

International Symposium on Parallel and   Distributed Computing

ei收录论文核心版

105

A Defense Mechanism Against Location   Cheating Attack in Social Network

叶阿勇

2017 IEEE Second International Conference   on Data Science in Cyberspace

ei收录论文核心版

106

Efficient monitoring framework for business   process compliance

龚平

计算机集成制造系统

ei收录论文核心版

107

The flexible and privacy-preserving   Proximity Detection in Mobile Social Network

叶阿勇

Future Generation Computer Systems

ei收录论文核心版

108

A Secure Collaborative Spectrum Sensing   Strategy in Cyber-Physical Systems

林晖

IEEE CPSCom 2016

ei收录论文核心版

109

Privacy Protection-oriented Mobile   Crowdsensing Analysis Based on Game Theory

熊金波,马蓉,林铭炜

IEEE TrustCom

ei收录论文核心版

110

A multi-replica associated deleting scheme   in cloud

熊金波,张媛媛,李璇

IEEE CISIS

ei收录论文核心版

111

A secure access and associate deleting   scheme for multi-replica in multi-cloud environment

熊金波,李素萍,李璇

International Journal of High Performance   Systems Architecture

ei收录论文核心版

112

A measure of biological robustness in   microbial metabolic systems and its approximated estimation

叶剑雄,李安

Proceedings of the 36th Chinese Control   Conference, CCC 2017

ei收录论文核心版

113

New construction of low-hit-zone frequency   hopping sequence sets with optimal partial hamming correlation

柯品惠,李正谦

LNCS

ei收录论文核心版

114

Efficient Verifiable Multi-user Searchable   Symmetric Encryption for Encrypted Data in the Cloud

陈兰香,张楠

International Conference on Security and   Privacy in New Computing Environments

ei收录论文核心版

115

采用局部强度顺序模式的图像复制—粘贴篡改检测算法

黄添强,林晶,林玲鹏

通信学报

A类刊物

116

面向云数据的隐私度量研究进展

熊金波,王敏燊,田有亮,林铭炜,马蓉

软件学报

A类刊物

117

共享所有权证明:协作云数据安全去重新方法

熊金波,张媛媛,李素萍,李璇

通信学报

A类刊物

118

可修订数字签名研究综述

黄欣沂,伍玮,黄欣沂

计算机研究与发展

A类刊物

119

基于显著性区域检测和水平集的图像快速分割算法

叶锋,陈家祯,郑子华,李婉茹

电子与信息学报

A类刊物

120

离散半马氏风险模型中的期望罚金函数

刘海燕,陈密

应用概率统计

A类刊物

121

基于群签名的无线Mesh网络匿名切换认证方案

王峰,许力,王峰

通信学报

A类刊物

122

三维物体多重菲涅耳计算全息水印与无干扰可控重建方法

陈家祯,叶锋,连桂仁,许力,郑子华

物理学报

A类刊物

123

可加Lévy 噪声驱动随机微分方程的强Feller 性与指数遍历性

王健,梁明杰

应用数学学报

A类刊物

124

p-框架, Hilbert-Schauder框架与σ-框架算子

张云南,林丽琼,朱玉灿

中国科学 数学

A类刊物

125

半参数变系数空间误差回归模型的估计

陈建宝

数量经济技术经济研究

A类刊物

126

随机效应变系数空间自回归面板模型的估计

陈建宝,孙林

统计研究

A类刊物

127

基于动态阈值的帧复制粘贴篡改检测

黄添强,卢贺楠,林晶

计算机系统应用

B类刊物

128

融合前景判别和圆形搜索的目标跟踪算法

黄添强,林玲鹏,林晶

计算机应用

B类刊物

129

基于非负张量分解的视频篡改检测方法

黄添强,张雪莉

网络与信息安全学报

B类刊物

130

基于光流周期特性的视频帧率上转篡改检测

黄添强,林晶,林玲鹏

计算机系统应用

B类刊物

131

一类带大参数的二维生物模型的快慢动力学与松弛振动

周哲彦

生物数学学报

B类刊物

132

基于随机搜索规则的软件体系结构层性能演化优化方法

倪友聪

计算机科学

B类刊物

133

基于马尔科夫模型的就餐人数预测

江育娥,徐彭娜

计算机系统应用

B类刊物

134

基于多因素加法模型的中期电力负荷预测

江育娥,翁金芳

计算机系统应用

B类刊物

135

云环境下软件错误报告自动分类算法改进

江育娥,黄伟

计算机应用

B类刊物

136

针对 QSP 算法的研究与分析

林劼,李莉

计算机系统应用

B类刊物

137

基于分布式架构的时间序列局部相似检测算法

林劼,林炀

计算机应用

B类刊物

138

基于GPU的实时素描风格渲染算法

吴献,高山晓

计算机应用

B类刊物

139

融合信任用户的协同过滤推荐算法

黄波,严宣辉,黄波

计算机系统应用

B类刊物

140

椭圆PDE约束优化问题的一个预条件子

马昌凤,柯艺芬

计算数学

B类刊物

141

基于稳态过程的多重分形Web日志仿真生成算法

彭行雄,彭行雄

计算机应用

B类刊物

142

带双调和记忆项的四阶非线性伪抛物方程解的整体存在性和不存在性

龙群飞

数学进展

B类刊物

143

优先关联的Web日志数据逼真生成算法

丘志鹏,丘志鹏

计算机系统应用

B类刊物

144

基于相邻请求的动态时间阈值会话识别算法

曾令,曾令

计算机应用

B类刊物

145

逼真生成表格式数据的非时间属性关联模型

张锐,张锐

计算机应用

B类刊物

146

基于LASSO回归模型的网贷借款成功影响因素挖掘

王开军,李海超

计算机系统应用

B类刊物

147

广义特征值问题与两线性流形之间夹角的计算

张圣贵

工程数学学报

B类刊物

148

基于FPGAFIR滤波的数字全息零级像抑制

陈家祯,叶锋,连桂仁,许力,郑子华

网络新媒体技术

B类刊物

149

基于直觉模糊集的灰色模型故障预测

王开军,林品乐

计算机系统应用

B类刊物

150

一类含时滞的扩散单神经元模型的分岔分析

李英国

生物数学学报

B类刊物

151

两类可截取签名方案的改进

伍玮,王敏

网络与信息安全学报

B类刊物

152

支持丰富访问控制策略的群组协作密文策略属性基加密

伍玮,李洋

网络与信息安全学报

B类刊物

153

地理信息服务于高校大学生-以福州大学城为例

金彪

计算机系统应用

B类刊物

154

基于机器视觉的交通拥堵评估系统

叶锋,汪敏,张建嘉,林萧,廖茜

计算机系统应用

B类刊物

155

平衡超立方体的故障容错性

许力,张欣欣

网络与信息安全学报

B类刊物

156

基于视频分析和多传感器融合的移动式监控系统

叶锋,林晖,陈超意,林贵增,汪敏,廖茜

计算机系统应用

B类刊物

157

政府消费与经济增长——基于MS-VECM的实证研究

陈建宝

数理统计与管理

B类刊物

158

回归模型中哑变量的相对重要性指数

王开军,李海超

计算机应用

B类刊物

159

自适应紧致特征的超像素目标跟踪算法

王开军,田健

中国图象图形学报

B类刊物

160

社交网络中基于定位欺骗的隐私攻击研究

叶阿勇

信息网络安全

B类刊物

161

基于模糊贴近度的粒子滤波故障预测

王开军,林品乐

计算机系统应用

B类刊物

162

一种时空域结合的自适应错误隐藏算法

叶锋,李承欣,陈家祯,许力,林晖

小型微型计算机系统

B类刊物

163

支持批量认证和隐私保护的无线Mesh网络切换认证方案

许力,许力

计算机系统应用

B类刊物

164

部分级联特征的离线手写体汉字识别方法

叶锋,林晖,郑子华,邓衍晨,汪敏,廖茜

计算机系统应用

B类刊物

165

建国以来高考数学试题演变分析与展望

陈清华,郑雪静

数学通报

B类刊物

166

基于ZigBee实验室智能管理系统的研究与设计

蔡丽萍,李汪彪,林立,陈鸿光

实验室研究与探索

B类刊物

167

基于Merkle哈希树的可验证密文检索方案

陈兰香,邱林冰

信息网络安全

B类刊物

168

云存储中基于二进制向量索引的密文云数据排序查询方法

陈兰香,周书明

计算机应用与软件

B类刊物

169

一种高效的支持排序的关键词可搜索加密系统研究

陈兰香,张楠

信息网络安全

B类刊物

170

面向社交网络的图片信息隐藏方法与实现

熊金波,张媛媛,马蓉

信息网络安全

B类刊物

171

面向存储介质的数据安全删除

熊金波,吴莎莎,王敏燊

计算机系统应用

B类刊物

172

基于测试的高中生数学抽象素养水平现状研究

陈清华,郑雪静

数学教育学报

B类刊物

173

Bayesian network modelling on data from   fine needle aspiration cytology examination for breast cancer diagnosis

丁雪梅,刘烁,杨洪钦,李毓华,翟佳,曾锦树,Liam Maguire,曹弋

Advances in Engineering Research (AER),   volume 130, ATLANTIS PRESS. The 5th International Conference on FMSMT 2017

istp收录论文

174

基于智能手机的健身跑运动数据采集及演化建模

池小文,池小文

智能系统学报

CSCD收录论文

175

图像矩在图像区域复制粘贴检测中的快速计算算法

黄添强,赖玥聪,林晶

中国科学技术大学学报

CSCD收录论文

176

基于点云的SUSAN特征点检测算法在三维重建中的应用

吴献,庄恩泽

福建师范大学学报(自然科学版)

CSCD收录论文

177

一类非线性波方程的TVD数值模拟研究

李德梅,赖惠林

福建师范大学学报(自然科学版)

CSCD收录论文

178

代理模型帮助的SA层性能差分演化优化算法

杜欣

计算机科学与探索

CSCD收录论文

179

经济集聚与地方公共品供给的内生交互作用和空间溢出效应

鞠芳煜,陈建宝

福建师范大学学报 ( 哲学社会科学版)

CSCD收录论文

180

关于投射子内射模

周德旭,黄智强

福建师范大学学报(自然科学版)

CSCD收录论文

181

基于选举标签传播的非重叠社区挖掘算法

黄发良,连亚飞

福建师范大学学报(自然科学版)

CSCD收录论文

182

对偶自同构不变模与Morita对偶

周德旭,黄凌娟

福建师范大学学报(自然科学版)

CSCD收录论文

183

加法范畴的回路范畴与η-扩张

陈清华

福建师范大学学报(自然科学版)

CSCD收录论文

184

基于产品评论情感分析的用户满意度挖掘

黄发良,程惠华

福建师范大学学报(自然科学版)

CSCD收录论文

185

广义AR-猜想与三角矩阵代数

陈清华,刘宏锦

厦门大学学报(自然科学版)

CSCD收录论文

186

软件代码的恶意行为学习与分类

陈黎飞,范宇杰,郭躬德

数据采集与处理

CSCD收录论文

187

NN算子及Weyl型定理

苏维钢,陈俐宏,周玮

应用数学

CSCD收录论文

188

基于Adaboost与背景差分级联的室内人数统计方法

叶锋,陈家祯,郑子华,洪斯婷,邓衍晨,郑德城

福建师范大学学报(自然科学版)

CSCD收录论文

189

有限维单李代数的双导子

陈正新

福建师范大学学报(自然科学版)

CSCD收录论文

190

亚纯函数的某类非线性微分多项式的分担值

陈俊凡,蔡晓华

Comm. Math. Res.

CSCD收录论文