1 |
Evaluation of DDOS Attack Degree Based on GRA-TOPSIS Model
|
会议论文 |
Hang Yang;Rong Jiang;Chengliang Zhao;Aiping Li |
2 |
Topics' popularity prediction based on ARMA model
|
会议论文 |
Yichen Song;Aiping Li;Yong Quan |
3 |
A Knowledge Graph Embedding Method Based on Neural Network
|
会议论文 |
Chenchen Li;Aiping Li;Tu Hongkui;Ye Wang;Changhai Wang |
4 |
A Network-flow Based Optimal Scheduling for Data Downloading from Satellites to ES in LEO Satellite Networks
|
会议论文 |
Zhichao He;Longying Wu;Hejiao Huang |
5 |
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
|
期刊论文 |
Yan Jia;Yulu Qi;Huaijun Shang;Rong Jiang;Aiping Li |
6 |
DRAV: Detection and repair of data availability violations in Internet of Things
|
期刊论文 |
Jinlin Wang;Haining Yu;Xing Wang;Zhang Hongli;Binxing Fang;Yuchen Yang;Xiaozhou Zhu |
7 |
Public Opinion Early Warning Agent Model: A Deep Learning Cascade Virality Prediction Model Based on Multi-Feature Fusion
|
期刊论文 |
Gao Liqun;Liu Yujia;Zhuang Hongwu;Wang Haiyang;Zhou Bin;Li Aiping |
8 |
Minimal Energy Broadcast for Delay-Bounded Applications in Satellite Networks
|
期刊论文 |
Nuo Yu;Zhiyi Wang;Hejiao Huang;Xiaohua Jia |
9 |
面向超大规模流量的网络生物数据安全检测关键技术及应用
|
奖励 |
何跃鹰;卓子寒;谷杰铭;余翔湛;刘博;张翀;邢潇;邹潇湘;徐雅丽;吕欣润;张奕欣;张程鹏;赵彦;张晓明;刘立坤 |
10 |
Needle in a Haystack: Attack Detection from Large-Scale System Audit
|
会议论文 |
Han Yu;Aiping Li;Rong Jiang |
11 |
Distance-Based Adaptive Large Neighborhood Search Algorithm for Green-PDPTW
|
会议论文 |
Lu J;Huang H |
12 |
T2FA: A Heuristic Algorithm for Deadline-Constrained Workflow Scheduling in Cloud with Multicore Resource
|
会议论文 |
Sun Zaixing;Chonglin Gu;Hejiao Huang;Honglin Zhang |
13 |
Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes
|
期刊论文 |
Guo Yu;Wang Mingyue;Wang Cong;Yuan Xingliang;Jia Xiaohua |
14 |
Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
|
期刊论文 |
Chonglin Gu;Zhenlong Li;Hejiao Huang;Xiaohua Jia |
15 |
MARS: Automated Protocol Analysis Framework for Internet of Things
|
期刊论文 |
Haonan Yan;Xiaoguang Li;Rui Dai;Hui Li;Xingwen Zhao;Fenghua Li |
16 |
CoWatch: Collaborative Prediction of DDoS Attacks in Edge Computing with Distributed SDN
|
会议论文 |
Hongliang Zhou;Xiaohua Jia;Jiangang Shu;Lei Zhou |
17 |
A Metadata-Based Representation Method of the Internet of Things
|
会议论文 |
Guangwei Yang;Haining Yu;Hongli Zhang;Xiangzhan Yu |
18 |
Collaborative Anomaly Detection in Distributed SDN
|
会议论文 |
Lei Zhou;Jianggang Shu;Xiaohua Jia |
19 |
Multi-agent Pathfinding Based on Improved Cooperative A in Kiva System
|
会议论文 |
Yiming Liu;Mengxia Chen;Hejiao Huang |
20 |
Advanced Free-rider Attacks in Federated Learning
|
会议论文 |
Zhenqian Zhu;Jiangang Shu;Xing Zou;Xiaohua Jia |
21 |
Semantic Role Labeling For Russian Language Based on Ensemble Model
|
会议论文 |
Xinping Zheng;Bin Zhou;Jiuming Huang;Yunxuan Liu;Hao Wang;Zhichao Wang |
22 |
隐私保护的轨迹相似度计算方法
|
期刊论文 |
于海宁;张宏莉;余翔湛;曲家兴;葛蒙蒙 |
23 |
Network Traffic Obfuscation against Traffic Classification
|
期刊论文 |
Likun Liu;Haining Yu;Shilin Yu;Xiangzhan Yu |
24 |
一种跨境云内部地理边界发现系统及方法
|
专利 |
张宇;朱金玉;王宇楠;张宏莉;张伟哲;方滨兴 |
25 |
一种基于机器学习加速的网络流量分类方法
|
专利 |
5.李晖;戴睿;闫皓楠;萧明炽;郑献春;赵兴文;李凤华;曹进 |
26 |
一种基于BGP网络靶场的调度僵尸机攻击方法
|
专利 |
张宇;张源良;张宏莉 |
27 |
一种射频识别数据安全认证方法、系统、存储介质、终端
|
专利 |
樊凯;王幸苗;康俊斌;李晖 |
28 |
一种基于微服务的平台化流量生成系统、方法、计算机及存储介质
|
专利 |
詹东阳;尹志杰;陈杰;张宏莉;马紫凯;余兆丰;谭凯 |
29 |
一种去中心化DNS根区管理系统
|
专利 |
张宇;方滨兴;张宏莉;余翔湛;刘文峰;刘路 |
30 |
一种基于覆盖网的NDN网络管理系统及方法
|
专利 |
张宇;王忠泽;张宏莉;张伟哲;方滨兴 |
31 |
一种域名解析系统搭建和域名查询方法
|
专利 |
张宇;刘姝言;刘文峰;张宏莉;方滨兴 |
32 |
一种基于DNS系统的通用网络标识解析方法及系统
|
专利 |
张宇;郭为;张雅舒;方滨兴;张伟哲;张宏莉 |
33 |
一种多接口路由器地理定位方法
|
专利 |
张宇;朱金玉;张宏莉 |
34 |
Knowledge Fusion: Introduction of Concepts and Techniques
|
会议论文 |
Yichen Song;Aiping Li;Yan Jia;Jiuming Huang;Xiaojuan Zhao |
35 |
基于互联网的公开信息大搜索关键技术及系统
|
奖励 |
方滨兴;贾焰;黄九鸣;韩伟红;田志宏;顾钊铨;李爱平;王晔;廖清;景晓军;韩毅;陈雷霆;张圣栋;李树栋;符永铨 |
36 |
An APT Attack Analysis Framework Based on Self-define Rules and Mapreduce
|
会议论文 |
Yulu Qi;Rong Jiang;Yan Jia;Aiping Li |
37 |
Joint Extraction of Entities and Relations Based on Multi-label Classification
|
会议论文 |
Yunxuan Liu;Aiping Li;Jiuming Huang;Xinping Zheng;Hao Wang;Weihong Han;Zhichao Wang |
38 |
Optimal Download of Dynamically Generated Data by Using ISL Offloading in LEO Networks
|
会议论文 |
Jiajing Wang;Nuo Yu;Hejiao Huang;Xiaohua Jia |
39 |
分布式环境下话题发现算法性能分析
|
期刊论文 |
邓璐;贾焰;方滨兴;周斌;张涛;刘心 |
40 |
Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model.
|
期刊论文 |
Yinggang Sun;Hongguo Zhang;Luogang Zhang;Chao Ma;Hai Huang;Dongyang Zhan;Jiaxing Qu |
41 |
工业物联网中隐私保护的轻量级认证协议
|
期刊论文 |
李德馨;付溪;赵兴文 |
42 |
Fast controlling of rumors with limited cost in social networks
|
期刊论文 |
Xiaopeng Yao;Yue Gu;Chonglin Gu;Hejiao Huang |
43 |
TLHSA and SACA: two heuristic algorithms for two variant VRP models
|
期刊论文 |
Xuhong Cai;Li Jiang;Songhu Guo;Hejiao Huang;Hongwei Du |
44 |
PFcrowd: Privacy-Preserving and Federated Crowdsourcing Framework by Using Blockchain
|
会议论文 |
Chen Zhang;Yu Guo;Hongwei Du;Xiaohua Jia |
45 |
Spatio-Temporal Data Anomaly Detection Using 3G-Net in IoT
|
会议论文 |
Shuo Zhang;Jiayuan Chen;Xiaofei Chen;Qiao Jiang;Hejiao Huang |
46 |
SecSkyline: Fast Privacy-Preserving Skyline Queries Over Encrypted Cloud Databases
|
期刊论文 |
Yifeng Zheng;Weibo Wang;Songlei Wang;Xiaohua Jia;Hejiao Huang;Cong Wang |
47 |
OblivGM: Oblivious Attributed Subgraph Matching as a Cloud Service
|
期刊论文 |
Songlei Wang;Yifeng Zheng;Xiaohua Jia;Hejiao Huang;Cong Wang |
48 |
A Review of APT Attack Detection Methods and Defense Strategies
|
会议论文 |
Kai Xing;Aiping Li;Rong Jiang;Yan Jia |
49 |
Connected positive influence dominating set in k-regular graph
|
期刊论文 |
Yao Xiaopeng;Huang Hejiao;Du Hongwei |
50 |
Optimal Satellite Data Downloading to Multiple ESs by ISL Offloading in LEO Satellite Networks
|
会议论文 |
Longying Wu;Liwei Yang;Hejiao Huang;Xiaohua Jia |
51 |
Efficient Privacy-Preserving Query Processing on Outsourced Geographic Databases
|
会议论文 |
Li Zhao;Qin Liu;Hejiao Huang;Xiaohua Jia |
52 |
Improved Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
|
期刊论文 |
Xiuguang Li;Ruifeng Li;Xu An Wang;Ke Niu;Hui Li;Xiaoyuan Yang |
53 |
基于深度学习的盗窃罪辅助量刑方法
|
专利 |
叶麟;张宏莉;方滨兴;李尚;郭镔;蔡怡蕾;郭小丁;陈喆 |
54 |
一种基于多粒度多层级的历史行为异常用户检测系统、方法、设备及存储介质
|
专利 |
张宏莉;梁稚媛;胡振鹏;黄洁润;孟超;卢昆;于海宁;孙骁 |
55 |
一种基于去中心化DNS根区管理的智能合约系统
|
专利 |
张宇;方滨兴;刘路;余翔湛;张宏莉 |
56 |
一种基于区域功能增强特征的城市人群流量预测方法及系统
|
专利 |
刘春雨;张宏莉;刘立坤;田泽庶;孟超 |
57 |
一种基于人群移动轨迹的高清城市功能区识别方法及系统
|
专利 |
刘春雨;张宏莉;朱国普;高阳 |
58 |
一种DaaS应用的数据集成的隐私保护方法
|
专利 |
张宏莉;周志刚;张羽;高阳;王星;于海宁;方滨兴;刘妙玲;孙燕 |
59 |
一种自治域级互联网拓扑可视化方法
|
专利 |
张宇;秦超逸;安宇昊;张宏莉 |
60 |
抗追溯攻击的无线传感器网络轻量级接入认证方法及系统
|
专利 |
赵兴文;付溪;李晖;曹进;关键 |
61 |
Learning Traffic as Videos: A Spatio-Temporal VAE Approach for Traffic Data Imputation
|
会议论文 |
Jiayuan Chen;Shuo Zhang;Xiaofei Chen;Qiao Jiang;Hejiao Huang;Chonglin Gu |
62 |
A Practical Approach to Answer Extraction for Constructing QA Solution
|
会议论文 |
Mingxuan Xiong;Aiping Li;Zongsheng Xie;Yan Jia |
63 |
Contextualise Entities and Relations: An Interaction Method for Knowledge Graph Completion
|
会议论文 |
Kai Chen;Ye Wang;Yitong Li;Aiping Li;Xiaojuan Zhao |
64 |
无线传感器网络中基于MDP的攻击模型研究
|
期刊论文 |
叶春果;陈丽娜;李晖;范渊;苗春雨 |
65 |
MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain
|
期刊论文 |
Mingyue Wang;Yu Guo;Chen Zhang;Cong Wang;Hejiao Huang;Xiaohua Jia |
66 |
基于层级注意力机制的链接预测模型研究
|
期刊论文 |
赵晓娟;贾焰;李爱平;陈恺 |
67 |
PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems
|
期刊论文 |
Haining Yu;Xiaohua Jia;Hongli Zhang;Xiangzhan Yu;Jiangang Shu |
68 |
Blockchain-Assisted Conditional Anonymity Privacy-Preserving Public Auditing Scheme With Reward Mechanism
|
期刊论文 |
Jie Zhao;Hejiao Huang;Chonglin Gu;Zhongyun Hua;Xiaojun Zhang |
69 |
Protecting Regression Models with Personalized Local Differential Privacy
|
期刊论文 |
Xiaoguang Li;Haonan Yan;Zelei Cheng;Wenhai Sun;Hui Li |
70 |
Multi-source knowledge fusion: a survey
|
期刊论文 |
Zhao Xiaojuan;Jia Yan;Li Aiping;Jiang Rong;Song Yichen |
71 |
Multi-user Forward Secure Dynamic Searchable Symmetric Encryption
|
会议论文 |
Qiao Wang;Yu Guo;黄荷姣;贾小华 |
72 |
Chinese Semantic Role Labeling with Hybrid Model
|
会议论文 |
Xinping Zheng;Bin Zhou;Jiuming Huang;Yunxuan Liu;Feng Wei |
73 |
Locality-sensitive hashing scheme based on heap sort of hash bucket
|
会议论文 |
方波;花忠云;黄荷姣 |
74 |
Research of Trojan Attack Effect Evaluation Based on FAHP
|
会议论文 |
Haocheng Zhong;Chenxi Zeng;Aiping Li;Yan Jia;Rong Jiang;Yulu Qi;Weihong Han |
75 |
Deep Entity Linking via Eliminating Semantic Ambiguity with BERT
|
会议论文 |
Aiping Li;Junbin Fang;Qianye Jiang;Bin Zhou;Yan Jia |
76 |
Divide-and-Conquer CBS Design for Multi-Agent Path Finding in Large-scale Scenario
|
会议论文 |
陈梦夏;刘一鸣;黄荷姣 |
77 |
Few-shot Knowledge Reasoning Method based on Attention Mechanism
|
会议论文 |
Haocheng Xie;Aiping Li;Yan Jia |
78 |
Attribute-based Encrypted Search for Multi-owner and Multi-user Model
|
会议论文 |
Mingyue Wang;Yinbin Miao;Yu Guo;Cong Wang;Hejiao Huang;Xiaohua Jia |
79 |
面向人工智能的异构并行算法设计理论与方法
|
奖励 |
李肯立;刘楚波;廖清;阳王东;KEQINLI |
80 |
Dynamic Service Caching in Mobile Edge Networks
|
会议论文 |
Xie Qingyuan;Wang Qiuyun;Yu Nuo;Huang Hejiao;Jia Xiaohua |
81 |
IoT-GAN: Anomaly Detection for Time Series in IoT Based on Generative Adversarial Networks
|
会议论文 |
Xiaofei Chen;Shuo Zhang;Qiao Jiang;Jiayuan Chen;Hejiao Huang;Chonglin Gu |
82 |
Calculation of network security index based on convolution neural networks
|
会议论文 |
Yang Hang;Jia Yan;Han Wei-Hong;Nie Yuan-Ping;Li Shu-Dong;Zhao Xiao-Juan |
83 |
An Efficient Algorithm for Clarification of Rumors with Limited Costs in Social Networks
|
会议论文 |
Xiaopeng Yao;Guangxian Liang;Hejiao Huang;Chonglin Gu |
84 |
A Blockchain-based Database System for Decentralized Information Management
|
会议论文 |
Dekai Yan;Xiaohua Jia;Jiangang Shu;Rutao Yu |
85 |
Two-Dimensional Exponential Chaotic System with Hardware Implementation
|
期刊论文 |
Yinxing Zhang;Han Bao;Zhongyun Hua;Hejiao Huang |
86 |
BatchedGreedy: A batch processing approach for influence maximization with candidate constraint
|
期刊论文 |
Xiaowei Han;Xiaopeng Yao;Hejiao Huang |
87 |
一种蓝牙通信的身份识别方法、系统、计算机及存储介质
|
专利 |
敖世亮;张宏莉;方滨兴;杨大千;肖新光;叶麟 |
88 |
一种低功耗蓝牙加密通信的流量分析方法、系统、计算机及存储介质
|
专利 |
敖世亮;张宏莉;方滨兴;杨大千;肖新光;叶麟 |
89 |
一种基于半监督聚类的局部网络拓扑测量任务选择方法
|
专利 |
张宇;余卓勋;张晔;张宏莉 |
90 |
一种基于专家联合评价的网络安全信息共享系统、方法、电子设备及存储介质
|
专利 |
叶麟;胡灵娟;黄洁润;胡振鹏;彭凤杰;杨晓丽;杨立炳;叶甜甜;成燕;梁稚媛;张宏莉;杨语晨;尹公主;孟超 |
91 |
一种横向联邦学习架构下的Free Rider攻击检测方法
|
专利 |
于海宁;胡振鹏;陈杰;张宏莉;成燕;梁稚媛;陈瑞;尹莱莱 |
92 |
一种基于协议无感知转发的NDN模态实现方法及NDN控制器应用程序
|
专利 |
张宇;郭为;夏重达;张伟哲;张宏莉;方滨兴 |
93 |
一种隐私保护的大数据的近似检索方法
|
专利 |
张宏莉;周志刚;张宇;叶麟;于海宁;王星;方滨兴;曾浩华;吕文娟 |
94 |
一种基于预测和区域划分的P2P网络动态负载均衡方法
|
专利 |
叶麟;余翔湛;张宏莉;刘飞扬;赵俊达;刘立坤;顾旭;张元禛;葛蒙蒙 |
95 |
一种基于历史拓扑测量数据的局部网络目的IP地址选择方法
|
专利 |
张宇;余卓勋;张晔;张宏莉 |
96 |
一种利用Looking Glass测量点实现自动化拓扑测量的方法
|
专利 |
张宇;余卓勋;张晔;张宏莉 |
97 |
GDAGAN: An Anonymization Method for Graph Data Publishing Using Generative Adversarial Network
|
会议论文 |
Junbin Fang;Aiping Li;Qianyue Jiang |
98 |
A Two-layers Heuristic Search Algorithm for Milk Run with A New PDPTW Model
|
会议论文 |
Xuhong Cai;Li Jiang;Songhu Guo;Hejiao Huang;Hongwei Du |
99 |
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things
|
期刊论文 |
Xingwen Zhao;Dexin Li;Hui Li |
100 |
Device scheduling and channel allocation for energy-efficient Federated Edge Learning
|
期刊论文 |
Youqiang Hu;Hejiao Huang;Nuo Yu |
101 |
Sgpm: A Coroutine Scheduling Model for Wound-Wait Concurrency Control
|
期刊论文 |
Xinyuan Wang;hejiao huang |
102 |
A Heterogeneous Ensemble Learning Model Based on Data Distribution for Credit Card Fraud Detection
|
期刊论文 |
Xie Yalong;Li Aiping;Gao Liqun;Liu Ziniu |
103 |
Efficient Lane-Level Map Building via Vehicle-Based Crowdsourcing
|
期刊论文 |
Jiangang Shu;Songlei Wang;Xiaohua Jia;Weizhe Zhang;Ruitao Xie;Hejiao Huang |
104 |
面向异质资源聚合的多云协同系统关键技术及应用
|
奖励 |
刘欣然;张鸿;李正民;黄道超;季昕华;张宏莉;沈时军;朱春鸽;张旭;赵丽;李焱;吕雁飞;靳锐;温森浩;武义涵 |
105 |
面向机器学习的分布式异构并行计算关键技术及应用
|
奖励 |
唐卓;廖清;李肯立;肖国庆;曹嵘晖;谢鲲;蒋洪波;肖正;周旭;胡逸騉;宋柏森;杨建仁 |
106 |
Collaborative Service Placement for Mobile Edge Computing Applications
|
会议论文 |
Nuo Yu;Qingyuan Xie;Qiuyun Wang;Hongwei Du;Hejiao Huang;Xiaohua Jia |
107 |
AESM2 Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems
|
期刊论文 |
Mingyue Wang;Yinbin Miao;Yu Guo;Hejiao Huang;Cong Wang;Xiaohua Jia |
108 |
PGRide: Privacy-Preserving Group Ridesharing Matching in Online Ride Hailing Services
|
期刊论文 |
Yu Haining;Zhang Hongli;Yu Xiangzhan;Du Xiaojiang;Guizani Mohsen |
109 |
Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding
|
期刊论文 |
Liu Qiao;Zhang Wenjing;Ding Sheng;Li Hui;Wang Yong |
110 |
HetInf: Social Influence Prediction With Heterogeneous Graph Neural Network
|
期刊论文 |
Liqun Gao;Haiyang Wang;Zi-Ke Zhang;Hongwu Zhuang;Bin Zhou |
111 |
Influence Spread in Location-Based Social Network: An Efficient Algorithm of Epidemic Controlling
|
期刊论文 |
Xiaopeng Yao;Xiaowei Han;Yue Gu;Chonglin Gu;Hejiao Huang |
112 |
ET2FA: A Hybrid Heuristic Algorithm for Deadline-constrained Workflow Scheduling in Cloud
|
期刊论文 |
Zaixing Sun;Boyu Zhang;Chonglin Gu;Ruitao Xie;Bin Qian;Hejiao Huang |
113 |
Rumors clarification with minimum credibility in social networks
|
期刊论文 |
Yao Xiaopeng;Liang Guangxian;Gu Chonglin;Huang Hejiao |
114 |
基于位置服务隐私自关联的隐私保护方案
|
期刊论文 |
李维皓;曹进;李晖 |
115 |
A Practical Approach to Construct Profile Linkage Framework
|
会议论文 |
Aiping Li;Shuying Mu;Liang Zhang;Yan Jia |
116 |
Deep Learning for Social Network Information Cascade Analysis: a survey
|
会议论文 |
Liqun Gao;Bin Zhou;Yan Jia;Tu Hongkui;Ye Wang;Chen Chenguang;Haiyang Wang;Hongwu Zhuang |
117 |
Device scheduling for energy-efficient federated learning over Wireless Network Based on TDMA Mode
|
会议论文 |
Youqiang Hu;Hejiao Huang;Nuo Yu |
118 |
MTSVAE: A Traffic Data Imputation Model Considering Different Periodic Temporal and Global Spatial Features
|
会议论文 |
Jinyi Chen;Shuo Zhang;Wenbo Zhang;Chonglin Gu;Hejiao Huang |
119 |
A Novel Deep Neural Network Model for Credit Risk Prediction of Chinese Farmers
|
会议论文 |
Yalong Xie;Aiping Li;Ziniu Liu;Kai Chen;Hongkui Tu |
120 |
A Novel Differential-Chaos-Shift-Keying Secure Communication Scheme
|
会议论文 |
Cai Hang;Hua Zhongyun;Huang Hejiao |
121 |
Enhance Rumor Controlling Algorithms Based on Boosting and Blocking Users in Social Networks
|
期刊论文 |
Xiaopeng Yao;Ningtuo Gao;Chonglin Gu;Hejiao Huang |
122 |
Efficient and Privacy-Preserving Ride Matching Using Exact Road Distance in Online Ride Hailing Services
|
期刊论文 |
Haining Yu;Xiaohua Jia;Hongli Zhang;Jiangang Shu |
123 |
lpRide: Lightweight and Privacy-Preserving Ride Matching over Road Networks in Online Ride Hailing Systems
|
期刊论文 |
Haining Yu;Jiangang Shu;Xiaohua Jia;Hongli Zhang;Xiangzhan Yu |
124 |
一种密态最短路网距离计算方法、设备及存储介质
|
专利 |
于海宁;张宏莉;尹莱莱;张宇;叶麟;陈瑞 |
125 |
一种BGP安全事件快速检测系统
|
专利 |
张宇;霍俊杰;张宏莉 |
126 |
一个基于开源DNS软件的自证根实现方法
|
专利 |
张宇;张文佳;方滨兴;张宏莉;刘文峰 |
127 |
一种混合云环境下隐私的差异化数据检索方法
|
专利 |
张宏莉;周志刚;王星;于海宁;张羽;叶麟;方滨兴;吕文娟;曾浩华 |
128 |
一种基于输出型相似门的案件分类方法、装置及存储介质
|
专利 |
叶麟;张宏莉;郭小丁;余翔湛;李尚;刘嘉锡;张云婷 |
129 |
一种企业基本信息知识图谱的构建方法及系统
|
专利 |
关皓天;张宏莉;王星;刘立坤;刘春雨;孟超;孙庆伟 |
130 |
一种面向人物表征的新闻文本发生地抽取方法
|
专利 |
张宏莉;关皓天;王星;方滨兴;杨语晨;方依;孟超 |
131 |
一种基于区块链的BGP路由泄露检测方法及系统
|
专利 |
张宇;秦超逸;刘天资;张伟哲;张宏莉 |
132 |
一种基于微服务的跨平台新软件以及新系统安全风险分析方法、计算机及存储介质
|
专利 |
詹东阳;王建华;王京峰;张宏莉;陈悦;张伟华;余兆丰;谭凯 |
133 |
一种中国网络边界的识别方法及系统
|
专利 |
张宇;曾良伟;张宏莉 |
134 |
大规模网络安全态势分析关键技术及系统YHSAS
|
奖励 |
方滨兴;贾焰;黄九鸣;韩伟红;田志宏;顾钊铨;李爱平;王晔;廖清;景晓军;韩毅;陈雷霆;张圣栋;李树栋;符永铨 |
135 |
Efficient Budget-Distance-Aware Influence Maximization in Geo-Social Network
|
会议论文 |
Yue Gu;Xiaopeng Yao;Guangxian Liang;Chonglin Gu;Hejiao Huang |
136 |
Lightweight Secure Data Exchange in Decentralized VANETs with Physical Layer Security
|
会议论文 |
Qiao Liu;Hui Li;Sheng Ding;Yong Wang |
137 |
An Advanced BERT-Based Decomposition Method for Joint Extraction of Entities and Relations
|
会议论文 |
Changhai Wang;Aiping Li;Tu Hongkui;Ye Wang;Chenchen Li;Xiaojuan Zhao |
138 |
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match
|
会议论文 |
Junbin Fang;Aiping Li;Qianyue Jiang;Shudong Li;Weihong Han |
139 |
CROTPN Based Collision-free and Deadlock-free Path Planning of AGVs in Logistic Center
|
会议论文 |
Sun Sankui;Gu Chonglin;Wan Qian;Huang Hejiao;Jia Xiaohua |
140 |
A Survey on Approaches and Applications of Knowledge Representation Learning
|
会议论文 |
Chenchen Li;Aiping Li;Ye Wang;Tu Hongkui;Song Yichen |
141 |
Road Distance Computation Using Homomorphic Encryption in Road Networks
|
期刊论文 |
Yu Haining;Yin Lailai;Zhang Hongli;Zhan Dongyang;Qu Jiaxing;Zhang Guangyao |
142 |
基于移动Sink的WSN安全数据收集方法
|
期刊论文 |
苗春雨;范渊;李晖;葛凯强;张小孟 |
143 |
A lightweight user authentication scheme for multi-gateway based wireless sensor networks using Rabin cryptosystem
|
期刊论文 |
Xingwen Zhao;Dexin Li;Xi Fu |
144 |
Key-Value Data Collection with Distribution Estimation under Local Differential Privacy
|
期刊论文 |
Xiaoguang Li;Haonan Yan;Gewei Zheng;Hui Li;Fenghua Li |
145 |
Client-side Fingerprinting Embedding Scheme with Adaptive Multivalued Scale Factor and Privacy Protection
|
期刊论文 |
Xingwen Zhao;Furong Zhang;Hui Li |
146 |
基于深度学习的文本分类研究进展
|
期刊论文 |
杜思佳;于海宁;张宏莉 |
147 |
一种支持前向安全更新和验证的加密搜索算法
|
期刊论文 |
李涵;张晨;黄荷姣;郭宇 |
148 |
Target relational attention-oriented knowledge graph reasoning
|
期刊论文 |
Zhao Xiaojuan;Jia Yan;Li Aiping;Jiang Rong;Chen Kai;Wang Ye |
149 |
Online Location Trace Privacy: An Information Theoretic Approach
|
期刊论文 |
Wenjing Zhang;Ming Li;Ravi Tandon;Hui Li |
150 |
Focus on Inherent Attributes for Temporal Knowledge Graph Completion
|
会议论文 |
Kai Chen;Chenchen Li;Aiping Li;Jingsheng Gao;Ma Sixia |
151 |
Multi-AGVs Pathfinding Based on Improved Jump Point Search in Logistic Center
|
会议论文 |
Yunwang Zhang;Hejiao Huang |
152 |
Time-Sensitive Influence Maximization in Social Networks
|
会议论文 |
Min Hu;黄荷姣;Qin Liu;贾小华 |
153 |
Dynamic Server Switching for Energy Efficient Mobile Edge Networks
|
会议论文 |
王秋云;谢清源;余诺;黄荷姣;贾小华 |
154 |
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing
|
会议论文 |
Ming Zhang;Zhe Sun;Hui Li;Ben Niu;Fenghua Li;Yuhang Xie;Chunhao Zheng |
155 |
Learning Knowledge Graph Embedding in Semantic Space: A Novel Bi-linear Semantic Matching Method
|
会议论文 |
Kai Chen;Ye Wang;Aiping Li;ChenChen Li;Xiaojuan Zhao;Ruidong Ding |
156 |
A Multi-Objective Task Scheduling Method based on ACO in Cloud Environment
|
会议论文 |
Song Gao;Ying Li;Hejiao Huang |
157 |
Clustered Federated Multi-Task Learning with Non-IID Data
|
会议论文 |
Yao Xiao;Jiangang Shu;Xiaohua Jia;Hejiao Huang |
158 |
BICON:Connecting the Same Users of Different Social Networks using BiLSTM
|
会议论文 |
Hao Wang;Bin Zhou;Jiuming Huang;Yunxuan Liu;Xinping Zheng;Weihong Han |
159 |
Analysis for Threat Models and Improvement Scheme of 5G AKA Protocol Based on Petri-net
|
会议论文 |
Zhiping Yan;Chonglin Gu;Hejiao Huang |
160 |
Multi-source Knowledge Fusion: A Survey
|
会议论文 |
Xiaojuan Zhao;Yan Jia;Aiping Li;Rong Jiang;Haocheng Xie;Yichen Song;Weihong Han |
161 |
HDGS: A Hybrid Dialogue Generation System using Adversarial Learning
|
会议论文 |
Han Yu;Aiping Li;Rong Jiang;Yan Jia;Xiaojuan Zhao;Weihong Han |
162 |
Lifelong Multi-Agent Path Finding in a Dynamic Environment
|
会议论文 |
Qian Wan;Chonglin Gu;Sankui Sun;陈梦夏;黄荷姣;贾小华 |
163 |
Identify Influential Based on User behavior Across Different Topics
|
会议论文 |
Yong Quan;Yichen Song;Lu Deng;Yan Jia;Bin Zhou;Weihong Han |
164 |
Contextual Gated Graph Convolutional Networks for Social Unrest Events Prediction
|
会议论文 |
Haiyang Wang;Bin Zhou;Zhipin Gu;Yan Jia |
165 |
Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning
|
期刊论文 |
Samy Ahmed;Yu Haining;Zhang Hongli |
166 |
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
|
期刊论文 |
Zhongyun Hua;Yanxiang Wang;Shuang Yi;Yicong Zhou;Xiaohua Jia |
167 |
基于假名的NFC安全支付认证协议
|
期刊论文 |
赵兴文;段懿入 |
168 |
Multi-Batches Revenue Maximization for competitive products over online social network
|
期刊论文 |
Guangxian Liang;Xiaopeng Yao;Yue Gu;Hejiao Huang;Chonglin Gu |
169 |
A Novel Encoder-Decoder Knowledge Graph Completion Model for Robot Brain
|
期刊论文 |
Song Yichen;Li Aiping;Tu Hongkui;Chen Kai;Li Chenchen |
170 |
一种基于区块链的域名注册管理方法及系统
|
专利 |
张宇;姜明欣;张伟哲;张宏莉;余翔湛 |
171 |
Attack Analysis Framework for Cyber-Attack and Defense Test Platform
|
期刊论文 |
Qi Yulu;Jiang Rong;Jia Yan;Li Aiping |
172 |
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services
|
期刊论文 |
Haining Yu;Hongli Zhang;Xiaohua Jia;Xiao Chen;Xiangzhan Yu |
173 |
一种隐私保护的纵向深度神经网络模型构建方法、计算机及存储介质
|
专利 |
于海宁;张宏莉;尹莱莱;孙骁;申旭弘 |
174 |
一种基于自举法的加速搜索方法
|
专利 |
张宏莉;周志刚;王晓萌;于海宁;张羽;叶麟;方滨兴;邱彪;郭新凯 |
175 |
一种获取域名所有资源记录的系统
|
专利 |
张宇;李永悦;张宏莉 |
176 |
一种基于规范化张量分解的司法案例建模方法、装置及存储介质
|
专利 |
郭小丁;叶麟;张宏莉;余翔湛;李尚;刘嘉锡;张云婷 |
177 |
一种面向在线打车服务的隐私保护系统及方法
|
专利 |
朱辉;王枫为;李晖;李凤华;杨晓鹏;武衡 |
178 |
一种基于知识构建的用户行为模拟方法、模拟系统、定制系统、计算机及存储介质
|
专利 |
詹东阳;巫祺炜;崔兆栋;张宏莉;许聪;余兆丰;谭凯 |
179 |
基于以太坊IoT实体轻量级认证方法、系统、智能终端
|
专利 |
李晖;张秀娟;曹进;罗玙榕;赵兴文 |
180 |
车联网场景下的轻量级RFID安全认证方法、车联网通信系统
|
专利 |
樊凯;罗琪;朱珊珊;康俊斌;邱剑莹;李晖 |
181 |
一种面向不确定性社会计算问题的计算方法
|
专利 |
张羽;靳锐;张宏莉 |
182 |
一种针对新顶级域名的Web浏览器行为自动化测试方法
|
专利 |
张宇;张文佳;张宏莉 |
183 |
一种混合云环境下数据的隐私保护方法
|
专利 |
张宏莉;周志刚;于海宁;张羽;王星;叶麟;方滨兴;孙燕;刘妙玲 |
184 |
加密流量分析特征提取方法、系统、存储介质、安全设备
|
专利 |
赵兴文;丁潇;李晖;朱辉;戴睿;萧明炽 |
185 |
一种将K-means与证据累积相结合的文本聚类方法
|
专利 |
张宏莉;叶麟;方滨兴;郭小丁;李尚;郭镔;杜思佳;陈喆 |
186 |
一种自适应高并发拓扑测量系统
|
专利 |
张宇;余卓勋;邱勇泽;张宏莉;方滨兴 |