网络空间安全学院部分论文成果
作者 | 论文题目 | 期刊名称 | 论文级别 |
吴铤 | Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and **art card | NONLINEAR DYNAMICS | SCI 2区 |
吴铤 | Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care | JOURNAL OF MEDICAL SYSTEMS | SCI 4区 |
徐明 | An adaptive method to identify disk cluster size based on block content | DIGITAL INVESTIGATION | SCI 3区 |
徐明 | A metadata-based method for recovering files and file traces from YAFFS2 | Digital Investigation | SCI 4区 |
游林 | A novel key sharing fuzzy vault scheme | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | SCI 4区 |
游林 | A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge | INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | SCI 4区 |
游林 | A Key Sharing Fuzzy Vault Scheme | KSII Transactions on Internet and Information Systems | SCI 4区 |
游林 | Fast Scalar Multiplications on Hyperelliptic Curve Cryptosystems | FUNDAMENTA INFORMATICAE | SCI 4区、CCF C类期刊 |
胡耿然 | 随机非奇异Hermite标准型研究 | 数论期刊(JOURNAL OF NUMBER THEORY) | SCI 4区、CCF C类期刊 |
吴震东 | High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia | Soft Computing | SCI 4区、CCF C类期刊 |
吴震东 | A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation | JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING | SCI 4区 |
吴震东 | A twice face recognition algorithm | SOFT COMPUTING | SCI 4区 |
王秋华 | Analysis of the information theoretically secret key agreement by public discussion | SECURITY AND COMMUNICATION NETWORKS | SCI 4区、CCF C类期刊 |
伍益明 | Consensus of discrete-time multi-agent systems with adversaries and time delays | International Journal of General Systems | SCI 3区 |
胡丽琴 | The linear complexity of whiteman’s generalized cyclotomic sequences of period pm+1qn+1 | IEEE Transactions on Information Theory | SCI 2区 |
胡丽琴 | Gauss periods and codebooks from generalized cyclotomic sets of order four | Design Codes and Cryptography | SCI 3区 |
胡丽琴 | Linear complexity of cyclotomic sequences of order six and BCH codes over GF(3) | Advances in Mathematics of Communications | SCI 4区 |
游林 | A Secure Finger Vein Recognition Algorithm Based on MB-GLBP and Logistic Mapping | JOURNAL OF INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING | EI期刊 |
吴国华 | CHI Statistical Text Feature Selection Method Based on Information Entropy Optimization | International Journal of Database Theory and Application | EI期刊 |
吴国华 | A Fingerprint Feature Extraction Algorithm based on Optimal Decision for Text Copy Detection | International Journal of Security and Its Applications | EI期刊 |
徐明 | Microblogs Location Inferring Method based on Hybrid Language Model | Journal of Information Computational Science | EI期刊 |
徐明 | Acquisiting Text Documents Opened by Notepad from Windows7 RAM Image | Journal of Computational Information Systems | EI期刊 |
徐明 | Mining bursty topics from twitter text streams based on Labeled-LDA | Journal of Computational Information Systems | EI期刊 |
游林 | A key distribution scheme for WSN based on deployment knowledge and dual-key pools | INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | EI期刊 |
游林 | Fast scalar multiplications on the curve v2 = up - Au - b over the finite field of characteristic p | FUNDAMENTA INFORMATICAE | EI期刊 |
王秋华 | A New Information Reconciliation Protocol in Information Theoretically Secret Key Agreement | JOURNAL OF COMPUTATIONAL INFORMATION SYSTEMS | EI期刊 |
王秋华 | A New Bit Pair Iteration Advantage Distillation/Degeneration Protocol in Information Theoretically Secret Key Agreement | JOURNAL OF COMPUTATIONAL INFORMATION SYSTEMS | EI期刊 |
徐明 | A similarity metric method of obfuscated malware using function-call graph | Journal in Computer Virology | EI期刊 |
徐明 | A Malware Variant Detection Method Based on Byte Randomness Test | JOURNAL OF COMPUTERS | EI期刊 |
游林 | Characteristic polynomials of the curve v^2 = u^p-au-b over finite fields of characteristic p | FINITE FIELDS AND THEIR APPLICATIONS | EI期刊 |
任一支 | Google hacking defence based on honey pages | INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND STATISTICS | EI期刊 |
徐明 | A JPEG Image Blind Forensics Method for Copy-Move Forging | INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS | EI期刊 |
游林 | Finger Vein Images Enhancement Method Based on Fuzzy Set and Oriented Filter | INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS | EI期刊 |
游林 | Low complexity of a class of normal bases over finite fields | FINITE FIELDS AND THEIR APPLICATIONS | EI期刊 |
游林 | Computing the Characteristic Polynomials of a Class of Hyperelliptic Curves for Cryptographic Applications | MATHEMATICAL PROBLEMS IN ENGINEERING | EI期刊 |
游林 | A cryptographic key binding method based on fingerprint features and the threshold scheme | INTERNAL JOURNAL OF ADVANCEMENTS IN COMPUTING SCIENCES | EI期刊 |
游林 | An Improved WSQ Algorithm Based on Lifting Wavelet and Adaptive Run-length Encoding | INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS | EI期刊 |
游林 | Effective generalized equations of secure hyperelliptic curve digital signature algorithms | THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS | EI期刊 |
吴国华 | An Audio Watermark Method with Self-synchronization Based on Improved Counter-Propagation Neural Network | JOURNAL OF INFORMATION AND COMPUTATIONAL SCIENCE | EI期刊 |
游林 | 一类超椭圆曲线上的快速除子标量乘 | 电子学报 | 一级期刊 |
吴震东 | 无线传感器网络自适应并发多路由算法 | 电子学报 | 一级期刊 |
乔通 | Steg****ysis of JSteg algorithm using hypothesis testing theory | EURASIP Journal on Information Security | EI期刊 |
乔通 | 基于局部能量方差特性的数字图像取证 | 模式识别与人 工智能 | EI期刊 |
伍益明 | 通信时延下多智能体系统的安全一致性控制 | 控制理论与应用 | EI期刊 |