2013年发表的部分论文(B类以上)

发布者:系统管理员发布时间:2014-02-25浏览次数:1344

1.  杨文生.Global asymptotical stability and persistent property for a diffusive predator-prey system with modified Leslie-Gower functional response NONLINEAR ANALYSIS-REAL WORLD APPLICATIONS .2013,143:1323-1330. sci-I
 
2.  高燕芳.Blow-up for the focusing  H^{1/2}-critical Hartree equation with radial data.Journal of Differential Equations, 2013, 255(9):2801-2825 sci-II
 
3.  王健.Exponential ergodicity and strong ergodicity for SDEs driven by symmetric alpha-stable processes.APPLIED MATHEMATICS LETTERS, 2013, 26(6): 654-658. sci-II
 
4.  马翔,王长平,王鹏 .Global geometry and topology of spacelike stationary surfaces in the 4-dimensional Lorentz space .ADVANCES IN MATHEMATICS.  2013,249 : 311-347. sci-II
 
5.  张世芳.The intersection of upper and lower semi-Browder Spectrum of upper triangular Operator Matrices.Abstract and Applied Analysis. Hindawi Publishing Corporation, 20132013):373147.sci-II
 
6.  Masamune, Toshihiro, 王健. On the conservativeness and the recurrence of symmetric jump-diffusions. JOURNAL OF FUNCTIONAL ANALYSIS, 2012, 263(12): 3984-4008. JOURNAL OF FUNCTIONAL ANALYSIS, 2012, 263(12): 3984-4008. sci-II
 
7.  陈俊凡. A Note on the Growth of Meromorphic Functions with a Radially Distributed Value. Abstr. Appl. Anal., 2012 (2012): Article ID 217280, 16 pages. sci-II
 
8.  张健飞,陈黎飞,郭躬德.Projected-prototype based classifier for text categorization.Knowledge Based System. 2013, 49: 179189. sci-II
 
9.  叶善力,卓钲渊.Weighted Composition Operators from Hardy to Zygmund Type SpacesAbstr. Appl. Anal. vol. 2013, Article ID 365286, 10 pages. sci-II
 
10. 周书明,徐俊明    Fault diagnosability of arrangement graphs.INFORMATION SCIENCES, 2013, 246: 177-190. sci-II
 
11. 杨文生.Diffusion has no influence on the global asymptotical stability of the Lotka-Volterra prey-predator model incorporating a constant number of prey refuges      .Applied Mathematics and Computation, 2013, 223:278-280. sci-II
 
12. 沈建和,周哲彦.Fast-slow dynamics in Logistic models with slowly varying parameters.Communications in Nonlinear Science and Numerical Simulation. 201318(8):2213-2221.sci-II
 
13. 黄娜,马昌凤,刘正刚. A new extragradient-like method for solving variational inequality problems. Fixed Point Theory and Applications, 2012, 223: 1-14. sci-II
 
14. 柯艺芬,马昌凤. The convergence analysis of the projection methods for a system of generalized relaxed cocoercive variational inequalities in Hilbert spaces. Fixed Point Theory and Applications, 2013, 189: 1-11. sci-II
 
15. 赖惠林,马昌凤. Numerical Study of the Nonlinear Combined Sine-Cosine-Gordon Equation with the Lattice Boltzmann Method. Journal of Scientific Computing, 2012, 53: 569–585. sci-II
 
16. 柯艺芬,马昌凤. A new relaxed extragradient-like algorithm for approaching the common solutions of the generalized mixed equilibrium problems, a more general system of variational inequalities and a fixed point problem. Fixed Point Theory and Applications, 2013, 126: 1-21. sci-II
 
17. 陈兰香.Using algebraic signatures to check data possession in cloud storage.Future Generation Computer Systems, 2013, 29 (7):1709-1715. sci-II 
 
18. 江樵芬,钟怀杰,张世芳.Components of topological uniform descent resolvent set and local spectral theory.LINEAR ALGEBRA AND ITS APPLICATIONS20134383):1149-1158 .sci-III
 
19. 王健.ON THE EXPONENTIAL ERGODICITY OF LEVY-DRIVEN ORNSTEIN-UHLENBECK PROCESSES. JOURNAL OF APPLIED PROBABILITY, 2012, 49(4): 990-1004. sci-III
 
20. Rene Schilling,王健.Functional inequalities and subordination: stability of Nash and Poincar, inequalities. MATHEMATISCHE ZEITSCHRIFT, 2012, 272(3-4): 921-936. sci-III
 
21. 伍玮,许力,Xiang Yang,Jianying Zhou.How to achieve non-repudiation of origin with privacy protection in cloud computing.Journal of Computer and System Sciences 79(8) 2013: 1200-1213. sci-III
 
22. 林崧,姚志强,刘晓芬,孙莹.Quantum private comparison protocol with d-dimensional Bell states.QUANTUM INFORMATION PROCESSING, 2013, 12: 559-568. sci-III
 
23. 邓起荣,Lau Ka-Sing.On the equivalence of homogeneous iterated function systems.Nonlinearity, 2013, 26(10): 2767. sci-III
 
24. 杨文生,李永青.Dynamics of a diffusive predator-prey model with modified Leslie-Gower and Holling-type III schemesCOMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (11):1727-1737. sci-III
 
25. 李英国.Oscillation deduced from the Neimark-Sacker bifurcation in a discrete dual Internet congestion control algorithm.ADVANCES IN DIFFERENCE EQUATIONS 2013,2013:136. sci-III
 
26. 李英国.Bifurcation analysis of a non-standard finite difference scheme for a time-delayed model of asset prices.JOURNAL OF DIFFERENCE EQUATIONS AND APPLICATIONS 2013,19(3): 507-519 . sci-III
 
27. 刘景辉,马昌凤    A nonmonotone trust region method with new inexact line search for unconstrained optimization.Numerical Algorithms, 2013, 64:1-20. sci-III 
 
28. 林贤祖.Infinite Loop Spaces Associated to Affine Kac-Moody Groups.Journal of Lie Theory 23 (2013), No. 3: 699--709 . sci-IIII
 
29. 高建梁,闵革勇,胡嘉,许力.Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic.Concurrency and Computation: Practice and Experience, Wiley Press, 2013,  25(1): 85-93 . sci-IIII
 
30. 王健.Regularity for semigroups of Ornstein-Uhlenbeck processes.POSITIVITY, 2013, 17(2): 205-221. sci-IIII
 
31. 陈志德,许力,曾燕清.A Supermodular Game Framework for Power Control of Wireless Sensor Networks .INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS. volume 2013,Article ID 792315,7pages    .sci-IIII
 
32. 王健.Sub-Markovian C-0-Semigroups Generated by Fractional Laplacian with Gradient Perturbation.INTEGRAL EQUATIONS AND OPERATOR THEORY, 2013, 76(2): 151-161. sci-IIII
 
33. 林崧,郭躬德,刘晓芬.Quantum Private Comparison of Equality with chi-Type Entangled States.INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52: 4185-4194.       sci-IIII
 
34. 林崧,郭躬德.Cryptanalysis the Security of Enhanced Multiparty Quantum Secret Sharing of Classical Messages by Using EntanglementSwapping.INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52: 3238-3243. sci-IIII
 
35. 林崧,黄川,刘晓芬.Multi-user quantum key distribution based on Bell states with mutual authentication.PHYSICA SCRIPTA, 2013, 87: 035008. sci-IIII
 
36. 叶阿勇,杨小亮,许力,凌远景.An Improved RFID-Based Localization Algorithm for Wireless Sensor Networks.INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,2013,v2013(1):1:8.sci-IIII
 
37. 林崧,刘晓芬. A Modified Quantum Key Distribution Without Public Announcement Bases Against Photon-Number-Splitting Attack. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2012, 51:2514–2523. sci-IIII
 
38. 陈俊凡.Picard values and the growth of meromorphic functions.Acta Math. Sin. (Engl. Ser.),2013,29(10):1981-1992. sci-IIII
 
39. 陈俊凡.Entire functions that share a set with their derivatives.Complex Var. Elli. Equ.,2013,58(6):727-734. sci-IIII
 
40. 柯品惠,张劼,张胜元.On the linear complexity and the autocorrelation of generalized cyclotomic binary sequences of length 2p (m).Designs, Codes and Cryptography, 2013, 67(3): 325-339. sci-IIII
 
41. 张胜元,柯品惠,林昌露,唐飞.Provably Secure Self-Certified Signature Schemes with Message Recovery. CHINA COMMUNICATIONS.2012, 9(10):112-119.sci-IIII
 
42. 周书明,陈兰香,徐俊明.CONDITIONAL FAULT DIAGNOSABILITY OF DUAL-CUBES. NTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE,2012,23(8): 1729-1747. sci-IIII
 
43. 周书明,林丽美,徐俊明.Conditional fault diagnosis of hierarchical hypercubes. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89(16): 2152-2164. sci-IIII
 
44. 柯品惠,余望鸿,常祖领.A note on binary sequence pairs with two-level correlation.INFORMATION PROCESSING LETTERS,2013, 113: 811-814. sci-IIII
 
45. 曾清平,钟怀杰.New results on common properties of bounded linear operators RS and SR.ACTA MATHEMATICA SINICA-ENGLISH SERIES 20132910):1871-1884. sci-IIII
 
46. 曾清平,钟怀杰,吴珍莺.Samuel multiplicity and the structure of essentially semi-regular operators: A note on a paper of Fang.SCIENCE CHINA-MATHEMATICS 2013566):1213-1231. sci-IIII
 
47. 曾清平,钟怀杰.Three-space theorem for semi-Fredholmness.ARCHIV DER MATHEMATIK  20131001:55-61. sci-IIII
 
48. 曾清平,钟怀杰,张世芳.ON LEFT AND RIGHT DECOMPOSABLY REGULAR OPERATORS.BANACH JOURNAL OF MATHEMATICAL ANALYSIS 2013,7(1):41-58. sci-IIII
 
49. 林和子.L-p-vanishing results for conformally flat manifolds and submanifolds.JOURNAL OF GEOMETRY AND PHYSICS,  2013, 73: 157165. sci-IIII
 
50. 刘晓芬,潘日晶,陈荔聪.Improving the security of n-user quantum key distribution with n quantum channels. Proceedings of the 2012 International Conference on Computer Application and System Modeling, ICCASM 2012. 2012:0433-0435EI
 
51. 林昌露,李勇,Sriramkrishnan Srinivasan,鲁力. Analysis on token-controlled public key encryption. oceedings - 2012 8th International Conference on Mobile Ad Hoc and Sensor Networks, MSN 2012. pp. 2012: 113-117,. EI
 
52. 许力,张跃欣.Matrix-based pairwise key establishment for wireless mesh networks.Future Generation Computer SystemsDOI:  10.1016/j.future. 2013.06.031. EI 
 
53. 周书明,王健,徐喜容,徐俊明. Conditional fault diagnosis of bubble sort graphs under the PMC Model. Intelligence Computation and Evolutionary Computation, 2012, 180:53-59. EI
 
54. 陈家祯,连桂仁,郑子华. Method on computer-generated hologram coding and digital reconstruction of multi-object waves. 中国激光,201239卷, s209009-1~ s209009-5. EI
 
55. 陈兰香,黄欣沂,周书明,许力.Data Dynamics for Remote Data Possession Checking in Cloud Storage.Computers & Electrical Engineering, 2013, 39(7):2413-2424. EI
 
56. 陈兰香,彭真.The design principles for user-centered remote data possession checking. CIS, 17-18, November, 2012:615-618. EI
 
57. 彭真,陈兰香,郭躬德. Method of fountain code based privacy protection and data recovery. 华中科技大学学报(自然科学版)2012, 40(355S1):54-57. EI
 
58. 肖国宝,严宣辉.A New Cooperative Multi-Robot Path Planning in Dynamic Environment.The International Conference on Automatic Control and Artificial Intelligence.March 2012.Xiamen,China . EI
 
59. 陈黎飞,郭躬德,王声瑞. Nearest neighbor classification by partially fuzzy clustering. Proceeding of the AINA Workshops, 2012:789-796. EI
 
60. 陈黎飞,严宣辉,王声瑞. Centroid-based clustering for graph datasets.Proceeding of the ICPR. 2012:2144-2147. EI
 
61. 陈丽萍,孔祥增,曾晶,林新棋,郑之,詹晓珊,潘雄.The application of cumulative sum feature extraction algorithm in data stream anomaly analysis before earthquake.Advanced Materials Research, 厦门,2013,8: 524-527. EI
 
62. 张仕,蒋建民.Research on type-safety parallel update . Lecture Notes in Electrical Engineering. 2012, 125(2):245-251 .EI
 
63. 连燕玲,黄欣沂,Yi Mu.SA3: Self-adaptive anonymous authentication for dynamic authentication policies      .Future Generation Computer Systems 2014,30(1):133-139, Elsevier EI
 
64. 陈智勤,陈志德,刘晶晶,邹阳.Spectrum sensing and auction in the cognitive radios network.Journal of Computational Information Systems .2013,9(14): 5577-5584. EI
 
65. 陈志德,陈智勤,刘晶晶,邹阳.Local stability in wireless network.Journal of Computational Information Systems, 2013, 9(14): 5569-5576. EI
 
66. 叶善力.Products of volterra-type operators and composition operators on logarithmic Bloch space.WSEAS Transactions on Mathematics, 2013,12(2):180-188. EI
 
67. 许力,Bertino, Elisa,穆怡.Security of new generation computing systems.Concurrency Computation Practice and ExperienceDOI: 10.1002/cpe.3128,2013. EI
 
68. 许力,汪晓丁,潘鹏贵,伍玮. Physical-layer network coding and connected dominating set based routing protocol in wireless multi-hop network.. 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012 :259-263, IEEE Press. EI
 
69. 杨小雪,周书明. On conditional fault tolerant of dual-cubes. International Journal of Parallel, Emergent and Distributed Systems, 2013, 28(3): 199-213. EI
 
70. 陈志德,乔成,许力,伍玮.Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.Concurrency Computation Practice and Experience. EI
 
71. 龚平,陈智勤,蒋建民,张仕. Executability analysis for semantically annotated process model. IEEE Computer Society .2012:117-124.EI
 
72. 曹夕,张跃欣,许力,伍玮. Identity-based proxy signature for cloud service in SaaS. 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012 pp.594-599, IEEE Press. EI
 
73. 黄娜,马昌凤. A sufficient condition that has no exceptional family of elements for SDCP. Optimization Letters, 2013,7(8):1-9. EI
 
74. 龚平. Compliance checking for semantically annotated process model. Int. J. Digit. Content Technol. Appl. 2013,6(21):670-679, EI
 
75. 林昌露. Identity-Based Cryptography on Hidden-Order Groups . Procedia Engineering.2012,29:2067-2071 EI
 
76. 唐飞,林昌露,柯品惠. Universal designated verifier signcryption. NSS2012LNCS 7645, pp 126-134, 2012. EI
 
77. 郭躬德,李南. Classification for concept-drifting data streams with limited amount of labeled data. the international conference on automatic control and artificial intelligence, march 24 to 26, 2012 in Xiamen, China. 4259-4265, IET.EI
 
78. 李南,郭躬德,陈黎飞. Optimal subspace classification method for complex data. international journal of machine learning and cybernetics, 2013, 4(2):163-171. EI
 
79. 龚平. Formal dynamic semantics for semantically annotated process model. Journal of Convergence Information Technology. 2012,7(20):167 -174EI
 
80. 郭躬德,陈思. Soft Subspace Clustering with an Improved Feature Weight Self-Adjustment Mechanism. international journal of machine learning and cybernetics, 2012,3(1:39-49. EI
 
81. 陈志德,王孟,邵磊,邵连.A clustering method based on attribute and weight in microblog.Journal of Computational Information Systems . Journal of Computational Information Systems.2013,914:5719-5726EI
 
82. 叶锋,郑子华. Medicinal plant specimen recognition based on multi-features fusion. 中南大学学报(增刊).201,9(42)656-661.EI
 
83. 陈黎飞,郭躬德.属性加权的类属型数据非模聚类.软件学报, 2013, 24(11):2628-2641. A类)
 
84. 陈浩源,柯品惠,张胜元.基于矩阵置换的最优无碰撞区跳频序列集的构造研究.计算机应用,2013, 33(11):3028-3031. A类)
 
85. 陈丽萍,林新棋,郑之,詹晓珊.基于滑动窗口的几何移动平均鞅算法在震前异常分析中的应用.计算机应用,2013,12:3608-3610. A类)
 
86. 刘芬,郭躬德.基于区间相似度的模糊时间序列预测算法.计算机应用,201333( 11):3052-3056. A类)
 
87. 胡永生,周哲彦,沈建和.一类带非线性无穷大边界值条件的二阶半线性方程奇摄动问题.应用数学学报, 2013, 36(2): 306-314. A类)
 
88. 吴胜艳,许力,林昌露.基于门限属性加密的安全分布式云存储模型.算机应用,2013,33(7):1880-1884, 1902. A类)
 
89. 杨小亮,叶阿勇,凌远景.基于阈值分类及信号强度加权的室内定位算法.计算机应用, 2013, 33(10): 2711-2714. A类) 
 
90. 吴建宁,伍滨.构建基于小波熵的自训练半监督支持向量机分类模型评价老年人步态.中国生物医学工程学报. A类)
 
91. 刘芬,郭躬德.基于符号化聚合近似的时间序列相似性复合度量方法.计算机应用,201333( 1) : 192 -198. A类)
 
92. 石贤芝,张胜元,林昌露,唐飞.标准模型下高效的门限签名方案.计算机应用,201333(1):15-18. A类)
 
93. 林丽美,周书明,许力.交错群图AGnh-外连通度.高校应用数学学报,2013,28(4):379-97 .
B类)
 
94. 吴铁浩,黄添强,袁秀娟,陈智文,苏伟峰.逆重心密度的半监督学习在视频篡改检测的应用.计算机系统应用, 2013,22(8):91-97. B类)
         
95. 苏立超,黄添强.基于单层双树小波变换和平滑零范数法的压缩感知图像重构.计算机科学, 2013,40(3):263-265. B类)
         
96. 陈智文,黄添强,袁秀娟,吴铁浩,苏伟峰.同源视频Copy-Move篡改检测及恢复.计算机系统应用, 2013,22(9):102-110. B类)
         
97. 章静,许力.Mesh 网络中拓扑控制策略研究.小型微型计算机系统,2013341):140-144. B类)
 
98. 龚平,蒋建民,张仕. 语义标识过程模型的可执行分析. 小型微型计算机系统,2013 33 12):2618-2624. B类)
 
99. 刘晓芬,严宣辉,姚志强. 可认证的多方量子秘密共享协议.小型微型计算机系统, 2012, 33(11): 2518-2521. B类)
         
100. 韩建邦,沈建和,周哲彦.一类具有无穷边界值的二次奇摄动边值问题.高校应用数学学报, 2013, 28(2): 180-188. B类)
         
101. 张圣贵.两线性流形之间夹角的算法.工程数学学报,2013,30(4):517-524. B类)
 
102. 朱大艺,欧忠辉,陈少清.利用差异演化算法优化土壤特征曲线参数.生物数学学报, 2013 (001): 185-191. B类)
         
103. 黄娜,马昌凤,谢亚君.求解非对称代数Riccati方程的几个新的预估-校正法.计算数学,2013,35(4): 401-418. B类)
 
104. 李翔宇,王开军,郭躬德.基于网格最小生成树的聚类算法选择.模式识别与人工智能, 2013,26(1):34-41. B类)
         
105. 范伟,周书明.分层立方体网络的容错性分析.高校应用数学学报,2013, 28(2):200-211     . B类)
 
106. 柯跃海,陈清华.高考数学:命题目标的确立与实现.数学通报, 2013 (1): 56-58. B类)
 
107. 吴炎辉,杨文生,阳超.具有Holling-(n+1)型功能性反应的m维食物链系统的永久持续生存和周期性.生物数学学报,201328(1)89-94. B类)
 
108. 张美平.基于STM32SN260的物联网数据采集与控制系统.计算机系统应用. 2013,22(11):86-89. B类)
 
109. 李云,胡珊.计算机组成原理实验教学的探究.实验室科学,2013,16(4):62-67. B类)
         
110. 李英国,郑艳红.基于时滞反馈的一类基因表达模型的分岔控制.生物数学学报,2013,28(3):461-466. B类)    
 
111. 胡小辉,黄川,许力.认知无线电网络中分布式频谱分配策略的研究.小型微型计算机系统,2013344):716-720.B类)
         
112. 许力,黄川,胡小辉.基于跨层议价博弈的认知无线电网络资源优化分配策略.小型微型计算机系统,20133410):2319-2323. B类)
         
113. 许力,陈江勇.基于遗传算法的数据流测试用例自适应生成算法.计算机系统应用,2013227):90-94. B类)
         
114. 肖国宝,严宣辉.一种新型协作多机器人路径规划算法.计算机科学,2013,40(4):217-220. B类)
 
115. 陈雪云,郭躬德,陈黎飞.GwMKnn: 征对类属性数据加权的MKnn算法.计算机系统应用, 2013 ,22 (8:103-108. B类)
         
116. 兰天,郭躬德.基于RSKNN分类改进算法.计算机系统应用, 2013 ,22 (12 ):86-92. B类) 
 
117. 范斌,马昌凤,谢亚君.求解非线性互补问题的一类光滑Broyden-like方法.计算数学,2013, 35(2): 181-194. B类)
 
118. 郭玲玲,林昌露,张胜元. 针对一类无证书签名方案的攻击及改进. 计算机工程,201238(16): 134-137. B类)