您当前位置:首页>>科研论著

计算机学院科研论著统计

在国内外重要的学术期刊和学术会议上发表论文300多篇,其中被SCI、EI和ISTP收录论文近200篇。近几年申请国家发明专利10余项,获软件著作权登记3项,在世界顶级出版社出版学术专著及章节10余部。

代表性论文如下

1Transaction的文章

[1]      Fengyong Li,K.Wu, J.S.Lei, M.Wen, Z.Q.Bi, C.H.Gu, Steganalysis over Large-scale Social Networks with High-order Joint Features and Clustering Ensembles, accepted by Transactions on Information Forensics & Security,2015.

[2]      Xiuxia Tian, Ling Huang, Tony Wu, Xiaoling Wang, Aoying Zhou. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework. accepted by IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), DOI:10.1109/TKDE. 2015.2457903.

[3]      Weimin Wei, Shuozhong Wang, Xinpeng Zhang and Zhenjun Tang. Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Trans. on Information Forensics and Security, 2010, 5(3): 507-517.

[4]      G. Zhu, J.S Lei, and Y. Yuan. Unsupervised hyperspectral band selection by dominant set extraction, accepted by IEEE Transaction on Geoscience and Remote Sensing.

[5]      G. Zhu, Q. Wang, and Y. Yuan. NATAS: Neural activity trace aware saliency, IEEE Transactions on Cybernetics, 2014, 44(7): 1014-1024.

[6]      G. Zhu, Q. Wang, Y. Yuan, and P. Yan. Learning saliency by MRF and differential threshold, IEEE Transactions on Cybernetics, 2013, 43(6): 2032-2043.

[7]      M.Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, PaRQ: A Privacy- preserving Range Query Scheme over Encrypted Metering Data for Smart Grid, accepted by IEEE Transactions on Emerging Topics in Computing.

[8]      Zhenjiangi Li, Wenwei Chen,Mo Li, Jingsheng Lei,Incorporating Energy Heterogeneity into Sensor Network Time Synchronization, IEEE Transactions on Parallel and Distributed Systems,  2015, 26(1): 163-173.

[9]      Dongyao Jia, Rui Zhang, Kejie Lu, Jianping Wang, Zhongqin Bi, and Jingsheng Lei. Improving the Uplink Performance of Drive-Thru Internet via Platoon-Based Cooperative Retransmission. IEEE Transaction on Vehicular Technology. 2014, 63(9): 4536-4545.

[10]  Guoming Tang, Kui Wu, Jingsheng Lei, Zhongqin Bi and Jiuyang Tang. From Landscape to Portrait: A New Approach for Outlier Detection in Load Curve Data. IEEE Transactions on Smart Grid. 2014, 5(4): 1764-1773.

[11]  Du, Wan; Li, Mo; Lei, Jingsheng, CO-MAP: Improving Multiple Access Efficiency of Mobile Wireless Network with Location Input, IEEE Transactions on Parallel and Distributed Systems,2014,13(12): 6643-6654.

[12]  P. Qin,B. Dai,B. Huang,G. Xu,Kui Wu,A survey on network tomography with network coding,IEEE Communications Surveys and Tutorials,2014,16(4):1981-1995

[13]  D. Marinakis,K. Wu,N. Ye,S. Whitesides,Network optimization for lightweight stochastic scheduling in underwater sensor networks,IEEE Transactions for Wireless Communications (TWC),2012,11(8):2786-2795 .

[14]  Y. Yuan,K. Wu,W.J. Jia,Y.M. Jiang,Performance of acyclic stochastic networks with network coding,IEEE Transactions on Parallel and Distributed Systems (TPDS),2011,22(7):1238-1245 .

[15]  Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, and Naijie Gu, Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No.10, pp. 2025-2035, 2013.

[16]  Tao Zhang, Kejie Lu, Shengli Fu, Yi Qian, Wang Liu, and Jianping Wang, Improving the Capacity of Large-Scale Wireless Networks with Network-Assisted Coding Schemes, IEEE Transactions on Wireless Communications, Vol. 11, No. 1, pp. 88-96, 2012.

[17]  Xiumin Wang, Jianping Wang, Kejie Lu, and Yinlong Xu, GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 5, pp. 916-925,2013.

[18]  Dongyao Jia, Kejie Lu, and Jianping Wang, A Disturbance-Adaptive Design for VANET-Enabled Vehicle Platoon, IEEE Transactions on Vehicular Technology, Vol. 63, No. 2, pp. 527 - 539, Feb. 2014.

[19]  Wang Liu, Kejie Lu, Jianping Wang, Guoliang Xing and Liusheng Huang, Performance Analysis of Wireless Sensor Networks with Mobile Sinks, IEEE Transactions on Vehicular Technology, Vol. 61, No. 6, pp. 2777-2788, 2012.

[20]  Wang Liu, Kejie Lu, Jianping Wang, Liusheng Huang, and Dapeng Oliver Wu, On the Throughput Capacity of Wireless Sensor Networks With Mobile Relays, IEEE Transactions on Vehicular Technology, Vol. 61, No. 4, pp. 1801-1809, 2012.

 

2、SCI收录论文:

[21]  Lin Zhu, Longbing Cao, Jie Yang,Jingsheng Lei,Evolving Soft Subspace Clustering,Applied Soft Computing, 2014, 14(1): 210-228.

[22]  Jingsheng Lei, Yanghui Rao, Qing Li, Towards Building a Social Emotion Detection System for Online News, Future Generation Computer Systems,37, pp. 438-448, 2014.

[23]  Yanghui Rao, Jingsheng Lei, Qing Li, Building emotional dictionary for sentiment analysisof online news, World Wide Web, 16(12):1-12,2013.

[24]  Ting Jin, Haoran Xie, Jingsheng Lei, Qing Li, Xiaodong Li, Xudong Mao, and Yanghui Rao, Finding Dominating Set from Verbal Contextual Graph for Personalized Search in Folksonomy, WI 2013, IEEE CS,2013.

[25]  Jiuchuan Jiang, Darong Lai, Yungui Zhang, Jingsheng Lei, A tag-based solution for datasensing conflicts in multiple sensing agent systems, Advances in Engineering Software, 47(2),pp 170-177, 2012.

[26]  Yao Lu, Xingliang Ni, Jingsheng Lei, Xiaojun Quan, Wenyin Liu and Yinlong Xu, Semantic Link Analysis for Finding Answer Experts, Journal of Information Science and Engineering, 27(2), pp 197-211, 2011.

[27]  Jian Yu, Shuigeng Zhou, Lipo Wang, Jingsheng Lei, Advances in fuzzy sets and knowledge discovery, Computers & Mathematics with Applications, 57(6) , 2009, 865-876.

[28]  Yingxu Wang, Jason Huang, Jingsheng Lei, The Formal Design Models of a Universal Array (UA) and its Implementation, IJSSCI , 3(3): 69-89 (2011).

[29]  Jingtao Yao, Qingfu Zhang, Jingsheng Lei, Recent developments in natural computation, Neurocomputing, 72(13-15) , 2009, 2833-2839.

[30]  Zhumin Chen,Jingsheng Lei, A Cross-Language Focused Crawling Algorithm Basedon Multiple Relevance Prediction Strategies, Computers & Mathematics with Applications,57(6), 2009, 1057-1072.

[31]  B. Sun,X.M. Shan,K. Wu,Y. Xiao,Anomaly detection based secure in-network aggregation for wireless sensor networks,IEEE Systems Journal,2013,7(1):13-25 ,

[32]  Y. Yuan,K. Wu,W.J. Jia,On the queueing behavior of inter-flow asynchronous network coding,Elsevier International Journal of Computer Communications(COMCOM),2012,35(13):1535-1548 .

[33]  X.M. Wang, K. Wu, J.P. Wang, and Y.L. Xu, Cape: coded anycast packet forwarding for wireless mesh networks, ACM/Springer Wireless Networks (WINET) Journal, 17(5), pp. 1273-1285, July 2011.

[34]  Jing Ren, Kejie Lu, Sheng Wang, Xiong Wang, Shizhong Xu, Lemin Li, and Shucheng Liu, VICN: A Versatile Deployment Framework for Information-Centric Networks, IEEE Network, Vol. 28, No. 3, pp. 26–34, 2014.

[35]  Huan Li, Kejie Lu, and Shicong Meng, BigProvision: A Provisioning Framework for Big Data Analytics, IEEE Network, to appear, 2015.

[36]  Hui Guo, Rose Qingyang Hu, Kejie Lu, and Yi Qian, Backbone construction with relay node placement for energy-efficient wireless sensor networks, Wireless Communications and Mobile Computing, Vol. 14, No. 9, pp. 922-936,2014.

[37]  Zeyu Zheng, Shengli Fu, Kejie Lu, Jianping Wang, Biao Chen, On the relay selection for cooperative wireless networks with physical-layer network coding, Springer Wireless Networks, Vol. 18, No. 6, pp. 653-665, 2012

[38]  Xun Xiao, Shucheng Liu, Kejie Lu, Jianping Wang, MaxDiv: an optimal randomized spectrum access with maximum diversity scheme for cognitive radio networks, International Journal of Communication Systems, Vol. 25, No. 7, pp.832-848, 2012.

[39]  Shengli Fu, Kejie Lu, Tao Zhang, Yi Qian, and Haisao-Hwa Chen, Cooperative wireless networks based on physical layer network coding, IEEE Wireless Communications, Vol. 17, No. 6, pp. 86-95, 2010.

[40]  Jianping Wang, Chunming Qiao, Yan Li, and Kejie Lu, On Guaranteed VoD Services in Next Generation Optical Access Networks, IEEE Journal on Selected Areas in Communications, Vol. 28, No. 6, pp. 875-888, 2010.

[41]  Bo Rong, Yi Qian, Kejie Lu, Rose Qingyang Hu, and Kadoch Michel, Multipath Routing over Wireless Mesh Networks for Multiple Description Video Transmission, IEEE Journal on Selected Areas in Communications, Vol. 28, No.3, pp. 321-331, 2010.

[42]  M.Wen, Jingsheng. Lei,Zhongqin Bi, SSE: a secure searchable encryption scheme for urban sensing and querying, International Journal of Distributed Sensor Network, accepted, 2013

[43]  M.Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing, Security and Communication Networks, published online, DOI: 10.1002/sec.699. (SCI)

[44]  M.Wen, K. Zhang, J. Lei, X. Liang, R. Deng, and X. Shen, CIT: A Credit-based Incentive Tariff Scheme with Fraud-traceability for Smart Grid, Security and Communication Networks , published online, DOI: 10.1002/sec.895.

[45]  Mi Wen, Jingsheng Lei, Zhongqin Bi, Jing Li. EAPA: An efficient authentication protocol against pollution attack for smart grid. Peer-to-Peer Networking and Applications. Published online, (SCI) 8(6), pp:1082-1089,2015.

[46]  Hongwei Li, Yi Yang, Mi Wen, Hongwei Luo, and Rongxing Lu, EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market, KSII Transactions on Internet and Information Systems, 2014, vol. 8, no. 11: 3937- 3954 .

[47]  M.Wen, YF.Zheng, WJun.Ye , KF.Chen, WDong.Qiu, A key management protocol with robust continuity for sensor networks, Computer Standards & Interfaces, 31(4), pp: 642-647,2009.

[48]  M.Wen, L.Dong, YF.Zheng and KF.Chen, Towards provable security for Data Transmission Protocols in Sensor Network, Journal of Information Science and Engineering, 25(1), pp:319-333. 2009.

[49]  Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha, Xiaoling Wang. DualAcE: fine-grained dual access control enforcement with multi‐privacy guarantee in DaaS. Security and Communication Networks, 8(8):1494–1508,2015

[50]  Jinguo Li, Yaping Lin, Gang Wang, Rui Li, Bo Yin. Privacy and Integrity Preserving Skyline Queries in Tiered Sensor Networks. Security and Communication Networks, 2013, 7(7): 1177-1188.

[51]  Lin Zhu. Evolving Soft Subspace Clustering, Applied Soft Computing, 2014, 14(1): 210-228.

[52]  Lin Zhu. Generalized Fuzzy C-Means Clustering Algorithm with Improved Fuzzy Partitions. IEEE Trans. on Cybernetics, 2009, 39(3): 578-591.

[53]  Lin Zhu . Improving the Accuracy of Predicting Disulfide Connectivity by Feature Selection. Journal of Computational Chemistry, 2010.

[54]  Lin Zhu. Multi-label Learning for Prediction of Human Protein Sub-cellular Localizations, The Protein Journal , 2009.

[55]  Fangfang Lu, Qunfei Zhao, Genke Yang. A no-reference image quality assessment approach based on steerable pyramid decomposition using natural scene statistics. Neural Computing and Applications, DOI: 10.1007/s00521-014-1699-5, 2014.

[56]  Fangfang Lu, Qunfei Zhao, Genke Yang, Nonsubsampled contourlet transform based algorithm for no-reference image quality assessment, Optical Engineering, 50(6), pp. 067010-1-067010-10, 2011.

[57]  Weimin Wei, Liping Sun, Dongjie Tang, Yan Zhao, Hongjiao Li. A Survey of Passive Image Forensics. Communications in Computer and Information Science, 2012, 345:45-55.

[58]  Yang Yindong, Guan Haibing, An Efficient Adapting Virtual Intermediate Instruction Set towards the Optimized DBT System, Journal of Central South University of Technology, (2012) 19: 3118−3128.

[59]  Yindong Yang,Erzhou Zhu, Planning for Fast DBT in Distributed Virtual Execution Environment, Scientific Research and Essays, 29 February, 2012, Vol. 7(8), pp. 939-946.  

[60]  Yindong Yang,Refine Item-Based Collaborative Filtering Algorithms With Skew Amplification,  accepted by Journal of Information Science and Engineering, 2015.

[61]  Fengyong Li,Digital image steganalysis based on local textural features and double dimensionality reduction, accepted by Security and Communication Networks,2015.

[62]  Ting Zhang, Reconstruction of porous media using multiple-point statistics with data conditioning, accepted by Stochastic Environmental Research and Risk Assessment.2015.

[63]  Ting Zhang, Stochastic simulation of patterns using ISOMAP for dimensionality reduction of training images, accepted by Computers & Geosciences,2015.

[64]  Ting Zhang, GPU-accelerated 3D reconstruction of porous media using multiple-point statistics, accepted by Computational Geosciences,2015.

[65]  Hong.Jiao. Li, S. Wang,X.X. Tian & C.C. Sun. Dynamic Remote Attestation based on System Call Sequence with Arguments. WIT Transactions on Information and Communication. Vol 65(1):1743-3517

[66]  Y. Wang,D. Gu,J. Xu,M. Wen,L. Deng,RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow,China Communications,2010,7(6):10-16

[67]  Detian Zhang, Chi-Yin Chow, Qing Li, Yukun Cao. SMashQ: A Spatial Mashup Framework for k-NN Queries in Time-Dependent Road Networks, an International Journal on Distributed and Parallel Databases (DAPD), 2012.

[68]  Haiming Li, Xiaoping Qiu,  Yajun Du. The Semantics of Lattice-valued Propositional Logic system lp(X),GESTS International Transactions on Computer Science and Engineering. 2008,30(1) pp. 152-160

[69]  Li Haiming, Qin Keyun, Xu Yang, L-fuzzy Set Categories Based on Generalized Extension Principle, The Journal of Fuzzy Mathematics, 2002, 10(2): 399-410.

 

 

3、申请的相关专利如下:

  1. 施柳,栗风永等,机密信息的游动编码隐藏方法,专利号:ZL201110171393.9 ,授权日期:2015年2月25日
  2. 温蜜,徐琳等,智能电网数据采集方法,申请号:201510421008.X
  3. 余江,张新鹏,栗风永,王朔中,程航,基于校验码的加密域无损可逆信息隐藏方法,申请号:201310198542.X
  4. 王勇等,一种基于行为特征自动机模型的软件漏洞检测方法, 国家发明专利,申请号:201210162896.4
  5. 田秀霞等,社交网络中潜在好友查询方法, 国家发明专利,申请号:201210179600.X
  6. 温蜜等,基于传感器网络中协商式组密钥建立的方法,专利号: ZL.200810201833.9
  7. 温蜜等,传感器网络中同时建立对密钥和组密钥的方法,申请号:200810201834.3
  8. 温蜜等,一种可自愈并带头节点撤销的密钥分发方法,申请号:201010504839.0
  9. 温蜜等,一种传感器网络中基于中国剩余定理的组密钥建立方法,申请号: 201210037322.0
  10. 管海兵, 梁阿磊, 杨吟冬等, 利用剖分信息生成超级块的方法, 专利号: 200810201939.9
  11. 赵群飞, 卢芳芳, 人脸检测中非特征区域图像处理的方法,2012.4, 中国, ZL201010266992.4.
  12. 魏为民等. 发明名称:数字图像缩放因子的盲检测方法, 专利号:ZL200810203981.4,授权公告日:2011 年11 月23 日.
  13. 陈轶,张新鹏,王朔中,魏为民.发明名称:基于连“1”特性的JPEG 图像再次编码检测方法,专利号:ZL200810202976.1,授权公告日:2010 年08 月18 日.

 

4、软件著作权:

  1. 魏为民,国家版权局计算机软件著作权登记证书, 软件名称: 基于DTMF 的按键音识别软件 V1.0。证书号: 软著登字第0604132 号, 登记号: 2013SR098370
  2. 魏为民,国家版权局计算机软件著作权登记证书, 软件名称: TrueMark 数字图像克隆检测软件 V1.0。证书号: 软著登字第0443572 号, 登记号: 2012SR075536
  3. 刘大明,国家版权局计算机软件著作权登记证书, 软件名称: 多通道数据采集及监控系统V1.0, 软件著作权,受理号:2013R11S008506

 

5、出版的专著及章节如下:

  1. M.Wen, Jingsheng. Lei, X. Liang, R. Lu and X. Shen, Querying over Encrypted Data in Smart Grid, Springer, In press, 2013.
  2. Y.H. Lee, K. Wu, and J.M. Chen, “Information collection and storage in wireless multimedia sensor networks,” book chapter in Handbook on Sensor Networks, Y. Xiao et al. (Eds.), World Scientific Publishing, 2010, ISBN: 978-981-283-730-1.
  3. I. Nikolaidis and K. Wu (editors), Proc. of 9th Int. Conf. on Ad Hoc Networks and Wireless (ADHOC-NOW), Aug. 2010, ISBN: 978-3642147845.
  4. F. Wang, J.C. Liu, and K. Wu, “Cooperative Overlay Networking for Streaming Media Content,” book chapter in Cooperative Networking, M.S. Obaidat and S. Misra (Eds.), Wiley, 2011, ISBN: 978-0470749159
  5. Jingsheng Lei, Fu Lee WangHepu DengDuoqian Miao, Artificial Intelligence and Computational Intelligence, Springer,  2012, ISBN 978-3-642-33477-1
  6. Fu Lee Wang, Jingsheng Lei, Zhiguo GongXiangfeng Luo ,  Web Information Systems and Mining, Springer, 2012, ISBN 978-3-642-33468-9
  7. Jingsheng Lei, Fu Lee Wang, Mo Li and Yuan Luo, Network Computing and Information Security , Springer, 2012, ISBN 978-3642352102
  8. Fu Lee Wang, Jingsheng Lei, Rynson W.H. Lau and Jingxin Zhang, Multimedia and Signal Processing, Springer, 2012, ISBN 978-3642352850
  9. Mi Wen, Shui Yu, Jinguo Li, Hongwei Li, Kejie Lu,Big Data Storage Security, to appear, Big Data Concepts, Theories and Applications, 2015. 
  10. Jian Wang, Zhen-qiang Yao, Mingde Yin, Lin Mei, Yao-jie Zhu, Quan-zhang An, Fang-fang Lu, Principles and applications of Rided-2D-A robust edge detection method in range images, Patrick S.P. Wang (ed) Pattern Recognition, Machine Intelligence and Biometrics, Beijing: Higher Education Press, pp. 139-167, 2011.
  • Copyright 2012, 上海电力学院 版权所有.