Feng-jing Shao, Yi Sui, Yong-hong Zhou, Ren-cheng Sun. Complex network model of the Treatise on Cold Damage Disorders. Physica A: Statistical Mechanics and its Applications. Volume 460, 15 October 2016, Pages 152-161.
Shouguo Qian, Xiangqing Lv, Yanhua Cao, Fengjing Shao. Parameter Estimation for a 2D Tidal Model with POD 4D VAR Data Assimilation. Mathematical Problems in Engineering. Volume 2016, Article ID 6751537.
Shunyao Wu, Fengjing Shao, Jun Ji, Rencheng Sun, Rizhuang Dong, Yuanke Zhou, Shaojie Xu, Yi Sui, Jianlong Hu. Network Propagation with Dual Flow for Gene Prioritization. PLoS One 10(2): e0116505.
Shun-yao Wu, Feng-jing Shao, Ren-cheng Sun, Yi Sui, Ying Wang, Jin-long Wang. Analysis of human genes with protein-protein interaction network for detecting disease genes. Physica A: Statistical Mechanics and its Applications. Volume 398, 15 March 2014,pp.217-228.
Fengjing Shao, Yi Sui. REORGANIZATIONS OF COMPLEX NETWORKS: COMPOUNDING AND REDUCING. International Journal of Modern Physics C. Vol. 25, No. 5 (2014) 1440001
Gengxin Sun. Fengjing Shao. Sheng Bin. A private data transfer protocol based on a new high secure computer architecture. Journal of Networks. v7, nl; 179-186, 2012. (EI: 20120614750175)
Gengxin Sun, Fengjing Shao, Sheng Bin. IPC model checking of a high secure operating system. Lecture Notes in Electrical Fngineeringv, 143 LNEE. n VOL.1: 44-51, 2012. (EI:20120814781201)
SUN G, SHAO F, BIN S. A Private Data Transfer Protocol for Inter-subsystem Based on A New Secure Computer Architecture with Single CPU and Dual Bus[J]. Journal of Computational Information Systems, 2010, 6(11): 3669-3676. (EI: 20105013480031)
Gengxin Sun. Fencing Shao, Sheng Bin. Performance test of an embedded real-time operating system based on a new high-security network computer. International Journal of Digital Content Technology and its Applications. v4. n8: 252-259. 2010. (EI: 20104913468580)
Yi Sui, Fengjing Shao , Rencheng Sun, Jingshu Li. Coevolving Between Structure and Dynamics of Growing Networks. 9th International Symposium on Neural Networks, Lecture notes in Computer Science, LNCS(7368), 307-315. Shenyang, China, July 11-14, 2012.
Yi Sui, Fengjing Shao, Rencheng Sun, Jingshu Li. Space Evolution Model and Empirical Analysis of Urban Public Transport Network. Physica A: Statistical Mechanics and its Applications. 2012, 391(14): 3708-3717.
*Jia Yu,Kui Ren, Cong Wang. “Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates”. IEEE Transactions on Information Forensics and Security, 2016, 11(6),1362-1375. DOI 10.1109/TIFS.2016.2528500(SCI收录) CCF A类
*Wengting Shen,Jia Yu(通信作者), Rong Hao, Xu an Wang, A Public Cloud Storage Auditing Scheme for Resource-Constrained Clients, Journal of High Performance Systems Architecture, 2016.(EI收录)已录用
*Hui Xia,Jia Yu, Cheng-liang Tian, Zhen-kuan Pan, Edwin Sha.. Light-weight Trust-enhanced On-demand Multi-path Routingin Mobile Ad Hoc Networks, Journal of Network and Computer Applications,2016, Vol 62, 2016, pp. 112–127(SCI收录) CCF C类
*Hui Xia,Jia Yu,Zhenkuan Pan, Xiangguo Cheng, Edwin H. -M. Sha.. Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wireless Networks, 2016(SCI收录) 已录用.CCF C类
*Guangyang Yang,Jia Yu(通信作者), Wenting Shen, Qianqian Su, Zhangjie Fu, Rong Hao. Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability. Journal of Systems and Software, Vol. 113, 2016.(SCI收录)CCF B类
*Chaowen Guan, Kui Ren, Fangguo Zhang, Kerschbaum, Florian andJia Yu. "Symmetric-Key Based Proofs of Retrievability Supporting Public Verification", Proc. of 20th European Symposium on Research in Computer Security (ESORICS'15), LNCS 9326, pp 203-223, 2015.(EI收录) CCF B类
*Jia Yu,Kui Ren, Cong Wang, VijayVaradharajan.“Enabling Cloud Storage Auditing with Key-Exposure Resistance”. IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1167 – 1179.(SCI收录)IF:2.409 CCF A类
*Jia Yu,Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan. “Intrusion-Resilient Identity-Based Signature: Security Definition and Construction”, Journal of Systems and Software, Elsevier Press, Volume 85, Issue 2, 2012. 382-391.(SCI收录)CCF B类
*Jia Yu,Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao. “Non-Interactive Forward-Secure Threshold Signature without Random Oracles”, Journal of Information Science and Engineering, Vol. 28, No.3, 2012.571-586(SCI收录)