论文
论文
 论文 
 专利 
 主要项目课题 
 联合培养 
 取得成果 

  

2016年度发表论文统计

 

 

序号 论文题目 论文作者 期刊/会议名称 期刊/会议类别 文章链接
1 MIMO Relay Channel Signal Transmission in Transformed Subspace Yong Wang, Sufang Ma, Qiao Liu, Yanling Liu, Hui Li Digital Signal Processing SCI 三区 http://www.sciencedirect.com/science/article/pii/S1051200416300744
2 PINOCCHIO: Probabilistic Influence-based Location Selection over Moving Objects Meng Wang, Hui Li, Jiangtao Cui, Ke Deng, Sourav S Bhowmick, Zhenhua Dong IEEE Transactions on Knowledge and Data Engineering SCI 一区、CCF A http://ieeexplore.ieee.org/document/7490399/
3 A Reusable and Single-interactive Model for Secure Approximate k-Nearest Neighbor Query in Cloud Yanguo Peng, Jiangtao Cui, Hui Li*, Jianfeng Ma Information Sciences SCI 一区、CCF B http://www.sciencedirect.com/science/article/pii/S0020025516305527
4 Effects of link-orientation methods on robustness against cascading failures in complex networks Zhong-Yuan Jiang, Jian-Feng Ma, Yu-Long Shen, Yong Zeng Physica A-Statistical Mechanics and Its Applications SCI JCR 二区,中科院三区 http://www.sciencedirect.com/science/article/pii/S0378437116301054
5 Deployment of check-in nodes in complex networks Zhong-Yuan Jiang, Jian-Feng Ma Scientific Reports SCI JCR 一区,中科院二区 https://www.nature.com/articles/srep40428
6 Check-in based routing strategy in scale-free networks Zhong-Yuan Jiang, Jian-Feng Ma Physica A-Statistical Mechanics and Its Applications SCI JCR 二区,中科院三区 http://www.sciencedirect.com/science/article/pii/S0378437116308159
7 An efficient local cascade defense method in complex networks Zhong-Yuan Jiang, Jian-Feng Ma International Journal of Modern Physics C SCI JCR 三区,中科院四区 http://www.worldscientific.com/doi/ref/10.1142/S0129183117500310
8 Context-Aware Verifiable Cloud Computing Z. Yan*, X.X. Yu, W.X. Ding IEEE Access SCI 四区 http://ieeexplore.ieee.org/document/7849191/
9 Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature W. Feng, Z. Yan*, H.M. Xie IEEE Access SCI 四区 http://ieeexplore.ieee.org/document/7876819/
10 Fusing and Mining Opinions for Reputation Generation Z. Yan*, X.Y. Jing, W. Pedrycz Information Fusion SCI 二区 http://www.sciencedirect.com/science/article/pii/S1566253516301592
11 CloudFile: A Cloud Data Access Control System based on Mobile Social Trust Z. Yan*, W.Y. Shi Journal of Network and Computer Applications SCI 三区 http://www.sciencedirect.com/science/article/pii/S1084804516302879
12 Secure Pervasive Social Communications based on Trust in a Distributed Way C.Y. Huang, Z. Yan*, N. Li, M. J. Wang IEEE Access SCI 四区 http://ieeexplore.ieee.org/document/7805137/
13 Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation L.J. Gao, Z. Yan*, L.T. Yang IEEE Transactions on Cloud Computing EI  http://ieeexplore.ieee.org/document/7755733/
14 Key Technologies for 5G, the Next Generation of Mobile Networks and Services Z. Yan*, V. Niemi, L.T. Yang International Journal of Communication Systems SCI 四区 http://onlinelibrary.wiley.com/doi/10.1002/dac.3226/full
15 A Hybrid Approach of Mobile Malware Detection in Android F. Tong, Z. Yan* Journal of Parallel and Distributed Computing SCI 四区 http://www.sciencedirect.com/science/article/pii/S074373151630140X
16 Cryptography and Data Security in Cloud Computing Z. Yan*, R.H. Deng, V. Varadharajan Information Sciences SCI 二区 http://www.sciencedirect.com/science/article/pii/S0020025516322411
17 Security in Software-Defined-Network: A Survey Z. Yao, Z. Yan* SpaCCS 2016 EI   https://link.springer.com/chapter/10.1007%2F978-3-319-49148-6_27
18 Privacy Protection in Mobile Recommender Systems: A Survey K. Xu, Z. Yan* SpaCCS 2016 EI  https://link.springer.com/chapter/10.1007%2F978-3-319-49148-6_26 
19 Security and Privacy in Big Data Lifecycle: A Review H.L. Chen, Z. Yan* TrustData 2016 EI  https://link.springer.com/chapter/10.1007%2F978-3-319-49145-5_1 
20 Game Theoretical Analysis on System Adoption and Acceptance: A Review X.Q. Liang, Z. Yan*. P. Zhang NOPE 2016 EI   https://link.springer.com/chapter/10.1007%2F978-3-319-49145-5_16
21 A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems Dongxu Ma, Zilong Wang, Hui Li IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences SCI https://www.jstage.jst.go.jp/article/transfun/E99.A/6/E99.A_1222/_article
22 A New Method to Construct Golay Complementary Set by Paraunitary Matrices and Hadamard Matrices Zilong Wang, Gaofei Wu and Dongxu Ma SEquences and Their Applications (SETA) 2016 EI  
23 Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He IEEE Access SCI  http://ieeexplore.ieee.org/document/7870585/?reload=true
24 A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth Qi Jiang, Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang,  Journal of Medical Systems SCI  https://link.springer.com/article/10.1007%2Fs10916-016-0587-1
25 A secure RFID application revocation scheme for IoT Kai Fan, Zhao Du, Yuanyuan Gong, Yue Wang, Tongjiang Yan, Hui Li, and Yintang Yang IEICE Transactions on information and systems SCI 4区 https://www.jstage.jst.go.jp/article/transinf/E99.D/8/E99.D_2015INP0008/_article
26 An Ultra-Lightweight RFID Authentication Scheme for Mobile Commerce Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su and Yintang Yang Peer-to-Peer Networking and Applications SCI 4区 https://link.springer.com/article/10.1007%2Fs12083-016-0443-6
27 Privacy Protection based Access Control Scheme in Cloud-based Services Kai Fan, Qiong Tian, Junxiong Wang, Hui Li, Yintang Yang China Communications SCI 4区 http://ieeexplore.ieee.org/document/7636861/
28 Secure Ultra-lightweight RFID Mutual Authentication Protocol Based on Transparent Computing for IoV Kai Fan, Wei Wang, Wei Jiang, Hui Li, Yintang Yang Peer-to-Peer Networking and Applications SCI 4区 https://link.springer.com/article/10.1007%2Fs12083-017-0553-9
29 Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol Kai Fan, Wei Wang, Yue Wang, Hui Li, Yintang Yang GLOBECOM 2016 B类会议 http://ieeexplore.ieee.org/document/7841663/
30 Privacy Protection based Access Control Scheme in Cloud-based Services Kai Fan, Qiong Tian, Nana Huang, Yue Wang, Hui Li, Yintang Yang ICCC 2016 C类会议 http://ieeexplore.ieee.org/document/7636861/
31 NFC Secure Payment and Verification Scheme for Mobile Payment Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, and Chao Yang WASA 2016 C类会议 https://link.springer.com/chapter/10.1007%2F978-3-319-42836-9_11
32 WBAN网络中条件隐私保护的远程用户认证方案 曹进,郑怡清,李晖 通信学报 EI http://kreader.cnki.net/Kreader/CatalogViewPage.aspx?dbCode=CJFQ&filename=TXXB2016S1010&tablename=CJFDLAST2017&compose=&first=1&uid=WEEvREcwSlJHSldRa1FhcEE0NXdoWGZlc2l3MEVET1ZjbXh3MkVScXhRVT0=$9A4hF_YAuvQ5obgVAqNKPCYcEjKensW4ggI8Fm4gTkoUKaID8j8gFw!!
33 Efficient and Privacy-Preserving Online Medical Pre-Diagnosis Framework Using Nonlinear SVM Zhu Hui*, Liu Xiaoxia, Lu Rongxing, Li Hui IEEE Journal of Biomedical and Health Informatics SCI 二区 http://ieeexplore.ieee.org/document/7442772/
34 Efficient Privacy-Preserving Online Medical Primary Diagnosis Scheme on Naive Bayesian Classification Liu Xiaoxia, Zhu Hui*, Lu Rongxing Peer-to-Peer Network Application SCI 四区 https://link.springer.com/article/10.1007%2Fs12083-016-0506-8
35 Towards achieving flexible and verifiable search for outsourced
database in cloud computing
Jianfeng Wang, Xiaofeng Chen, Jin Li, Jiaolian Zhao, Jian Shen Future Generation Computer Systems SCI 二区 http://www.sciencedirect.com/science/article/pii/S0167739X16301108
36 Efficient and Secure Storage for Outsourced Data: A Survey. Jianfeng Wang, Xiaofeng Chen  Data Science and Engineering   https://link.springer.com/article/10.1007%2Fs41019-016-0018-9
37 Verifiable Computation over Large Database with Incremental Updates. Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou IEEE Transactions on Computers  SCI三区 https://link.springer.com/chapter/10.1007%2F978-3-319-11203-9_9
38 Secure three-party computational protocols for triangle area. Liang Liu, Xiaofeng Chen, Wenjing Lou International Journal of Information Security SCI四区 https://link.springer.com/article/10.1007%2Fs10207-015-0284-y
39 Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing Jianfeng Wang, Meixia Miao, Yaqian Gao, Xiaofeng Chen Soft Computing SCI三区 https://link.springer.com/article/10.1007%2Fs00500-015-1758-6
40 Efficient request-based comparable encryption scheme based on sliding window method. Peng Chen, Jun Ye, Xiaofeng Chen Soft Computing SCI三区 https://link.springer.com/article/10.1007%2Fs00500-015-1766-6
41 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Tao Jiang, Xiaofeng Chen, Jianfeng Ma: IEEE Transactions on Computers  SCI三区 http://ieeexplore.ieee.org/document/7004787/
42 Towards Efficient Fully Randomized Message-Locked Encryption.  Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou Australasian Conference on Information Security and Privacy C类会议 https://link.springer.com/chapter/10.1007%2F978-3-319-40253-6_22
43 N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks Zheli Liu, Dejiang Luo, Jin Li, Xiaofeng Chen, Chunfu Jia International Journal of Computer Mathematics SCI 三区 http://www.tandfonline.com/doi/full/10.1080/00207160.2014.917179
44 Big Data Acquisition under Failures in FiWi Enhanced Smart Grid Hongzhi Guo, Jiajia Liu, Lei Zhao IEEE Transactions on Emerging Topics in Computing SCI http://ieeexplore.ieee.org/document/7867091/
45 On Minimizing Energy Consumption in FiWi Enhanced LTE-A HetNets Hongzhi Guo, Jiajia Liu, Zubair Md. Fadlullah, and Nei Kato IEEE Transactions on Emerging Topics in Computing SCI http://ieeexplore.ieee.org/document/7534737/
46 Analytical Modeling of Resource Allocation in D2D Overlaying Multi-hop Multi-channel Uplink Cellular Networks Jiahao Dai, Jiajia Liu *, Yongpeng Shi, Shubin Zhang, and Jianfeng Ma IEEE Transactions on Vehicular Technology SCI 二区 http://ieeexplore.ieee.org/document/7866013/
47 Smart Attacks Against Intelligent Wearables in People-Centric Internet of Things Jiajia Liu, and Wen Sun IEEE Communications Magazine SCI 一区 http://ieeexplore.ieee.org/document/7786109/
48 Energy Consumption Minimization for FiWi Enhanced LTE-A HetNets with UE Connection Constraint Jiajia Liu, Hongzhi Guo, Zubair Md. Fadlullah, and Nei Kato IEEE Communications Magazine SCI 一区 http://ieeexplore.ieee.org/document/7744809/
49 Cooperative Jammer Placement for Physical Layer Security Enhancement Jiajia Liu, Zhihong Liu, Yong Zeng, and Jianfeng Ma IEEE Network Magazine SCI 二区 http://ieeexplore.ieee.org/document/7764300/
50 Threshold Tuning Based Wearable Sensor Fault Detection for Reliable Medical Monitoring Using Bayesian Network Model Haibin Zhang, Jiajia Liu *, and Nei Kato IEEE Systems Journal SCI http://ieeexplore.ieee.org/document/7565577/
51 Distance Based Method for Outlier Detection of Body Sensor Networks Haibin Zhang, Jiajia Liu *, and Cheng Zhao EAI Transactions on Wireless Spectrum EI http://eudl.eu/doi/10.4108/eai.19-1-2016.151000
52 A Data Reconstruction Model Addressing Loss and Faults in Medical Body Sensor Networks Haibin Zhang, Jiajia Liu *, Ai-Chun Pang, and Rong Li IEEE GLOBECOM 2016 EI http://ieeexplore.ieee.org/document/7841491/
53 Design and Evaluation of a Data-driven Scenario Generation Framework for Game-based Training Linbo Luo(罗林波), Haiyan Yin, Wentong Cai, Jinghui Zhong, Michael Lees IEEE Transactions on Computational Intelligence and AI in Games SCI, JCR II区 http://ieeexplore.ieee.org/document/7431984/
54 Sampling-based adaptive bounding evolutionary algorithm for continuous optimization problems Linbo Luo(罗林波), Xiangting Hou, Jinghui Zhong, Wentong Cai, Jianfeng Ma Information Sciences SCI, JCR I区 http://www.sciencedirect.com/science/article/pii/S0020025516320412
55 Learning behavior patterns from video for agent-based
crowd modeling and simulation
Jinghui Zhong, Wentong Cai, Linbo Luo(罗林波), Mingbi Zhao Autonomous Agents and Multi-Agent Systems SCI, JCR II区 https://link.springer.com/article/10.1007%2Fs10458-016-9334-8
56 Modeling Gap Seeking Behaviors for Agent-based Crowd Simulation Linbo Luo(罗林波), Cheng Chai, Suiping Zhou, Jianfeng Ma 29th International Conference on Computer Animation and Social Agents 2016 CCF C类会议 http://dl.acm.org/citation.cfm?doid=2915926.2915944
57 Measuring the risk value of sensitive dataflow path in Android application 冯鹏斌、孙聪、马建峰 Security and Communication Networks SCI http://onlinelibrary.wiley.com/doi/10.1002/sec.1746/abstract;jsessionid=7C7CF514DE190660A6AD71178C41F8D0.f04t04
58 APPLET: a privacy-preserving framework for location-aware recommender system 马鑫迪、李辉、马建峰、姜奇、高胜、习宁、卢笛 Science China Information Science SCI https://www.researchgate.net/publication/309280878_APPLET_a_privacy-preserving_framework_for_location-aware_recommender_system
59 RTRC: A Reputation-Based Incentive Game Model for Trustworthy Crowdsourcing Service 马鑫迪、马建峰、李辉、姜奇、高胜 China Communication SCI http://www.cqvip.com/read/read.aspx?id=671145751
60 AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service 马鑫迪、马建峰、李辉、姜奇、高胜 Peer-to-Peer Networking and Applications SCI https://link.springer.com/article/10.1007%2Fs12083-017-0545-9
61 轻量级位置感知推荐系统隐私保护框架 马鑫迪、李辉、马建峰、习宁、姜奇、高胜、卢笛 计算机学报 EI http://kreader.cnki.net/Kreader/CatalogViewPage.aspx?dbCode=CJFQ&filename=JSJX20160922000&tablename=CAPJLAST&compose=&first=1&uid=
62 Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android Fabo Wang,Yuqing Zhang, Kai Wang,Peng Liu, Wenjie Wang European Symposium on Research in Computer Security ccf b类会议 https://link.springer.com/chapter/10.1007%2F978-3-319-45744-4_23
63 Congestion-aware Communication Paradigm for Sustainable Dense Mobile Crowdsensing Wen Sun, and Jiajia Liu * IEEE Communications Magazine SCI 一区 http://ieeexplore.ieee.org/document/7876959/
64 New complementary sets of length $2^m$ and size 4 Gaofei Wu, Yuqing Zhang, Xuefeng Liu Adv.in Math.of Comm.  SCI四区 http://www.aimsciences.org/journals/displayArticlesnew.jsp?paperID=13241
65 Several classes of optimal ternary cyclic codes with minimal distance four Lisha Wang, Gaofei Wu Finite Fields Their Appl. SCI三区 http://www.sciencedirect.com/science/article/pii/S1071579716300028

西安电子科技大学 移动互联网安全创新引智基地   版权所有2016-2017
地址:陕西省西安市太白南路2号西安电子科技大学 邮编:710071 电话:029-88204749
技术支持:电院网络中心