大数据技术与智慧城市研究院
 首页 | 研究院概况 | 机构设置 | 研究队伍 | 交流合作 | 招生招聘 | 研究成果 | 研究生培养 
站内搜索:
 
  研究成果
 科研项目 
 科研奖励 
 代表性论著 
 
  代表性论著  
当前位置: 首页>>研究成果>>代表性论著

智能信息系统及复杂网络方向

  1. 邵峰晶,于忠清. 数据挖掘原理与算法. 北京:中国水利水电出版社.2003年8月第1版

  2. 邵峰晶,于忠清,王金龙,孙仁诚. 数据挖掘原理与算法(第二版). 北京:科学出版社,2009.8

  3. Feng-jing Shao, Yi Sui, Yong-hong Zhou, Ren-cheng Sun. Complex network model of the Treatise on Cold Damage Disorders. Physica A: Statistical Mechanics and its Applications. Volume 460, 15 October 2016, Pages 152-161.

  4. Shouguo Qian, Xiangqing Lv, Yanhua Cao, Fengjing Shao. Parameter Estimation for a 2D Tidal Model with POD 4D VAR Data Assimilation. Mathematical Problems in Engineering. Volume 2016, Article ID 6751537.

  5. 隋毅,邵峰晶,孙仁诚,李淑静,吴舜尧.基于向量空间的多子网复合复杂网络模型动态组网运算的形式描述.软件学报,2015,26(8):2007−2019.

  6. Shunyao Wu, Fengjing Shao, Jun Ji, Rencheng Sun, Rizhuang Dong, Yuanke Zhou, Shaojie Xu, Yi Sui, Jianlong Hu. Network Propagation with Dual Flow for Gene Prioritization. PLoS One 10(2): e0116505.

  7. Shun-yao Wu, Feng-jing Shao, Ren-cheng Sun, Yi Sui, Ying Wang, Jin-long Wang. Analysis of human genes with protein-protein interaction network for detecting disease genes. Physica A: Statistical Mechanics and its Applications. Volume 398, 15 March 2014,pp.217-228.

  8. Fengjing Shao, Yi Sui. REORGANIZATIONS OF COMPLEX NETWORKS: COMPOUNDING AND REDUCING. International Journal of Modern Physics C. Vol. 25, No. 5 (2014) 1440001

  9. Gengxin Sun. Fengjing Shao. Sheng Bin. A private data transfer protocol based on a new high secure computer architecture. Journal of Networks. v7, nl; 179-186, 2012. (EI: 20120614750175)

  10. Gengxin Sun, Fengjing Shao, Sheng Bin. IPC model checking of a high secure operating system. Lecture Notes in Electrical Fngineeringv, 143 LNEE. n VOL.1: 44-51, 2012. (EI:20120814781201)

  11. SUN G, SHAO F, BIN S. A Private Data Transfer Protocol for Inter-subsystem Based on A New Secure Computer Architecture with Single CPU and Dual Bus[J]. Journal of Computational Information Systems, 2010, 6(11): 3669-3676. (EI: 20105013480031)

  12. Gengxin Sun. Fencing Shao, Sheng Bin. Performance test of an embedded real-time operating system based on a new high-security network computer. International Journal of Digital Content Technology and its Applications. v4. n8: 252-259. 2010. (EI: 20104913468580)

  13. 邵峰晶;周永红;孙仁诚;隋毅. 基于多子网复合复杂网络的《伤寒论》研究. 大数据下复杂网络的机遇与挑战:第九届全国复杂网络会议论文集. 2013.09.13-09.15

  14. 吴舜尧,邵峰晶,王金龙等.基于语义资源融合关键词的文本聚类.计算机工程, 40(4), pp 223-227, 2014

  15. 邵峰晶, 孙仁诚, 李淑静, 隋毅. 多子网复合复杂网络及其运算研究. 复杂系统与复杂性科学. 2012, 第9卷第4期,20-25.

  16. Yi Sui, Fengjing Shao , Rencheng Sun, Jingshu Li. Coevolving Between Structure and Dynamics of Growing Networks. 9th International Symposium on Neural Networks, Lecture notes in Computer Science, LNCS(7368), 307-315. Shenyang, China, July 11-14, 2012.

  17. Yi Sui, Fengjing Shao, Rencheng Sun, Jingshu Li. Space Evolution Model and Empirical Analysis of Urban Public Transport Network. Physica A: Statistical Mechanics and its Applications. 2012, 391(14): 3708-3717.

  18. 李琳,邵峰晶,杨厚俊,孙仁诚,. 基于类FP-tree的多层关联分类器[J]. 计算机科学,2011,(8).176-178.

  19. 邵峰晶,孙仁诚, 李淑静. 一种具有抑制作用的多信息传播模型. 复杂系统与复杂性科学. 2010. 7(1), 47-51.

  20. 孙仁诚,邵峰晶. 青岛市公交线路网络复杂性分析. 复杂系统与复杂性科学,2009,6(3),63-68.

大数据安全方向

  1. *Jia Yu,Kui Ren, Cong Wang. “Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates”. IEEE Transactions on Information Forensics and Security, 2016, 11(6),1362-1375. DOI 10.1109/TIFS.2016.2528500(SCI收录) CCF A类

  2. *Wengting Shen,Jia Yu(通信作者), Rong Hao, Xu an Wang, A Public Cloud Storage Auditing Scheme for Resource-Constrained Clients, Journal of High Performance Systems Architecture, 2016.(EI收录)已录用

  3. *沈文婷,于佳(通信作者),杨光洋,程相国,郝蓉,具有私钥可恢复能力的共享数据云存储完整性检测方案,软件学报,27(6),2016.(一级期刊, EI收录)

  4. *Jia Yu, Hui Xia, Huawei Zhao, RongHao,Zhangjie Fu and XiangguoCheng, Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wireless Personal Communications, Vol.86, Iss. 3, pp 1467-1491,2016 (SCI收录)

  5. *Meng Li,Jia Yu(通信作者), Rong Hao. A CellularAutomata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer, Chinese Journal of Electronics,2016(SCI收录)已录用

  6. *寻甜甜,于佳(通信作者), 杨光洋,江秀秀. 密钥隔离的无证书聚合签名, 电子学报,(一级期刊, EI收录)已录用

  7. *Hui Xia,Jia Yu, Cheng-liang Tian, Zhen-kuan Pan, Edwin Sha.. Light-weight Trust-enhanced On-demand Multi-path Routingin Mobile Ad Hoc Networks, Journal of Network and Computer Applications,2016, Vol 62, 2016, pp. 112–127(SCI收录) CCF C类

  8. *Hui Xia,Jia Yu,Zhenkuan Pan, Xiangguo Cheng, Edwin H. -M. Sha.. Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wireless Networks, 2016(SCI收录) 已录用.CCF C类

  9. *Guangyang Yang,Jia Yu(通信作者), Wenting Shen, Qianqian Su, Zhangjie Fu, Rong Hao. Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability. Journal of Systems and Software, Vol. 113, 2016.(SCI收录)CCF B类

  10. *Jia Yu, Rong Hao, Huawei Zhao, Minglei Shu, Jianxi Fan. IRIBE: Intrusion-Resilient Identity-Based Encryption, Information Sciences.Elsevier Press Vol. 329, 90-104, 2016(SCI收录) IF: 4.038 CCF B类

  11. *Chaowen Guan, Kui Ren, Fangguo Zhang, Kerschbaum, Florian andJia Yu. "Symmetric-Key Based Proofs of Retrievability Supporting Public Verification", Proc. of 20th European Symposium on Research in Computer Security (ESORICS'15), LNCS 9326, pp 203-223, 2015.(EI收录) CCF B类

  12. *Jia Yu,Kui Ren, Cong Wang, VijayVaradharajan.“Enabling Cloud Storage Auditing with Key-Exposure Resistance”. IEEE Transactions on Information Forensics and Security, 2015, 10(6): 1167 – 1179.(SCI收录)IF:2.409 CCF A类

  13. *赵慧艳,于佳(通信作者),李朦,寻甜甜. 并行密钥隔离聚合签名, 电子学报,43(5),1035-1040, 2015.(一级期刊, EI收录)

  14. *Jia Yu,Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li.“One Forward-secure Signature Scheme Using Bilinear Maps and Its Applications”. Information Sciences.Elsevier Press, Volume 279, 2014.60–76(SCI收录) IF: 4.038 CCF B类

  15. *Huiyan Zhao,Jia Yu(通信作者), Shaoxia Duan, Xiangguo Cheng, Rong Hao. “Key-Insulated Aggregate Signature”, Frontiers of Computer Science, Springer-Verlag.2014. Volume 8, Issue 5, pp 837-846(SCI收录) CCF C类

  16. *于佳,陈养奎,郝蓉,孔凡玉,程相国,潘振宽. 无可信中心的可公开验证多秘密共享. 计算机学报.2014,37(5):1030-1038.(一级期刊, EI收录)

  17. *葛立荣,于佳(通信作者),程相国,郝蓉,赵慧艳,李朦. “标准模型下支持多协助器的强密钥隔离签名方案”. 计算机研究与发展. 2014,51(5): 1081-1088(一级期刊, EI收录)

  18. *Hui Xia, Shoujun Xia,Jia Yu, Zhiping Jia, Edwin H.-M. Sha, Applying link stability estimation mechanism to multicast routing in MANETs, Journal of Systems Architecture. Elsevier Press 60(5): 467-480 (2014)(SCI收录)CCF B类

  19. *于佳,程相国,李发根, 潘振宽, 孔凡玉, 郝蓉. “标准模型下可证明安全的入侵容忍公钥加密方案”. 软件学报, 2013,24(2):266-278(一级期刊, EI收录)

  20. *Jia Yu,Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan. “Intrusion-Resilient Identity-Based Signature: Security Definition and Construction”, Journal of Systems and Software, Elsevier Press, Volume 85, Issue 2, 2012. 382-391.(SCI收录)CCF B类

  21. *Jia Yu,Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao. “Non-Interactive Forward-Secure Threshold Signature without Random Oracles”, Journal of Information Science and Engineering, Vol. 28, No.3, 2012.571-586(SCI收录)

  22. *Jia Yu,Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen.“Forward-SecureIdentity-Based Signature: Security Notions and Construction”. Information Sciences.Elsevier Press, Volume 181, Issue 3, 2011. 648-660.(SCI收录) CCF B类

  23. *Jia Yu,Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan. “New Forward-Secure Signature Scheme with Untrusted Update”, Journal of Information Science and Engineering, Vol.27, No. 4, 2011. 1435-1448(SCI收录)

  24. *Jia Yu,Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan. “Forward-Secure Identity-Based Public-Key Encryption without Random Oracles”, Fundamenta Informaticae, 2011.Vol. 111, No.2, 241-256(SCI收录) CCF C类

  25. *Jianxi Fan, Xiaohua Jia, Baolei Cheng,Jia Yu. “An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges”. Theoretical Computer Science,Elsevier Press, 2011, 412(29): 3440-3450(SCI收录) CCF B类

  26. *Xi Wang, Jianxi Fan, Xiaohua Jia, Shukui Zhang,Jia Yu. “Embedding Meshes into Twisted-Cubes”. Information Sciences,Elsevier Press, 2011, 181(14): 3085- 3099(SCI收录) CCF B类

  27. *于佳, 郝蓉, 孔凡玉, 程相国, Guo Xiangfa. “标准模型下的前向安全多重签名:安全性模型和构造”. 软件学报. 2010, 21(11): 2920-2932(一级期刊, EI收录)

  28. *于佳,孔凡玉, 程相国, 郝蓉, Guo Xiangfa. “可证安全的入侵容忍签名方案”. 软件学报.2010, 21(9): 2352-2366.(一级期刊, EI收录)

  29. *于佳, 孔凡玉, 郝蓉, 李大兴. “一个基于双线性映射的前向安全门限签名方案的标注”. 计算机研究与发展. 2010, 47(4): 605-612.(一级期刊, EI收录)

  30. * 美国发明专利Key processing method and apparatus,授权号:US2015/0188703 A1, 2015.7

  31. * 美国发明专利Key insulation method and device,授权号:US2014/0301554 A1, 2014.10

科学技术部 | 教育部 | 工业和信息化部 | 山东省科学技术厅 | 山东省教育厅 | 国家海洋局北海分局 | 青岛市交通委 | 海洋一所 | 海信网络科技 | 青岛大学

大数据技术与智慧城市研究院 版权所有