作者 |
文章名称 |
期刊名称 |
卷、期、页码 |
冯登国, 徐静, 兰晓 |
5G移动通信网络安全研究 |
软件学报 |
29,6,1813-1825 |
ZHEDONG ZHENG, LIANG ZHENG, YI YANG |
A Discriminatively Learned CNN Embedding for Person Reidentification |
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS |
14, 1, |
Weifeng Chen, Lei Shi, Wei Chen |
A Survey of Macroscopic Brain Network Visualization Technology |
CHINESE JOURNAL OF ELECTRONICS |
27,5, 889-899 |
Y. Liu, L. Zhang, and Z. Zhang |
A Survey of Test Based Automatic Program Repair |
Journal of Software |
13, 8, 437-452 |
Jianwen Li, Geguang Pu, Lijun Zhang, Moshe Y. Vardi, Jifeng He |
Accelerating LTL satisfiability checking by SAT solvers |
Journal of Logic and Computation |
28, 6, 1011-1030 |
Angsheng Li, Xianchen Yin, Bingxiang Xu, Danyang Wang, Jimin Han, Yi Wei, Yun Deng, Ying Xiong, Zhihua Zhang |
Decoding topologically associating domains with ultra-low resolution Hi-C data by graph structural entropy |
NATURE COMMUNICATIONS |
9 |
Ji Guan, Yuan Feng, Mingsheng Ying |
Decomposition of quantum Markov chains and its applications |
JOURNAL OF COMPUTER AND SYSTEM SCIENCES |
95, , 55-68 |
Qing Ai, Hui-yuan Li, Zhong-qing Wang |
Diagonalized Legendre spectral methods using Sobolev orthogonal polynomials for elliptic boundary value problems |
APPLIED NUMERICAL MATHEMATICS |
127, 196-210 |
G. Barmpalias, R. Elwes and A.E.M. Lewis |
Digital Morphogenesis via Schelling Segregation |
Nonlinearity |
31, 1593–1638 |
Bing Su, Xiaoqing Ding, Hao Wang, Ying Wu |
Discriminative Dimensionality Reduction for Multi-Dimensional Sequences |
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE |
40, 1, 77-91 |
Wen Zhang, Yuhang Dub, Taketoshi Yoshidac, Qing Wang |
DRI-RCNN: An approach to deceptive review identification using recurrent convolutional neural network |
INFORMATION PROCESSING & MANAGEMENT |
54, 4, 576-592 |
Suna Ma, Huiyuan Li, Zhimin Zhang |
Efficient Spectral Methods for Some Singular Eigenvalue Problems |
JOURNAL OF SCIENTIFIC COMPUTING |
77, 1, 657-688 |
Guozhen Zhao, Yan Ge, Biying Shen, Xingjie Wei, Hao Wang |
Emotion Analysis for Personality Inference from EEG Signals |
IEEE TRANSACTIONS ON AFFECTIVE COMPUTING |
9, 3, 362-371 |
Huang Kai, Jiang Xiaowen, Zhang Xiaomeng, Yan Rongjie, Wang Ke, Xiong Dongliang, Yan Xiaolang |
Energy-Efficient Fault-Tolerant Mapping and Scheduling on Heterogeneous Multiprocessor Real-Time Systems |
IEEE ACCESS |
6, , 57614-57630 |
Xiaowen Jiang, Kai Huang, Xiaomeng Zhang, Rongjie Yan, Ke Wang, Dongliang Xiong and Xiaolang Yan |
Energy-Efficient Scheduling of Periodic Applications on Safety-Critical Time-Triggered Multiprocessor Systems |
Electronics |
6, 57614-57630 |
Xiaolan Peng, Hui Chen, Lan Wang, Hongan Wang |
Evaluating a 3-D virtual talking head on pronunciation learning |
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES |
109, , 26-40 |
Fu-Jun Liu, Zhong-Qing Wang, Hui-yuan Li |
FULLY DIAGONALIZED CHEBYSHEV SPECTRAL METHODS FOR SECOND AND FOURTH ORDER ELLIPTIC BOUNDARY VALUE PROBLEMS |
INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING |
15, 1-2, 243-259 |
Lei Ma, Yanyun Chen, Yinling Qian, Hanqiu Sun |
Incremental Voronoi sets for instant stippling |
The Visual Computer |
34(6-8): 863-873 |
Zhenya Zhang, Peng Wu, Yu Zhang |
Localization of Linearizability Faults on the Coarse-Grained Level |
International Journal of Software Engineering and Knowledge Engineering |
27(9&10): 1483-1505 |
G. Barmpalias, R. Elwes and A. Lewis-Pye |
Minority population in the one-dimensional Schelling model of segregation |
Journal of Statistical Physics |
173(5), (2018) 1408–1458 |
Xinglong Liu, Fei Hou, Hong Qin, Aimin Hao |
Multi-view multi-scale CNNs for lung nodule type classification from CT images |
Pattern Recognition |
77, 262-275 |
George Barmpalias and Andrew Lewis-Pye |
Optimal redundancy in computations from random oracles |
Journal of Computer and System Sciences |
92 (2018) 1–8. |
George Barmpalias, Andrew Lewis-Pye, Angsheng Li |
Pointed computations and Martin-Loef randomness |
Computability |
7, 2-3, 171-177 |
Bin Zhang, Chao Xu, Dengguo Feng |
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking |
JOURNAL OF CRYPTOLOGY |
31, 2, 394-433 |
Christian Eisentraut, Jens Chr. Godskesen, Holger Hermanns, Lei Song, Lijun Zhang |
Probabilistic Bisimulation for Realistic Schedulers |
Acta Informatica |
55, 6, 461-488 |
Kunpeng Bai, Chuankun Wu, Zhenfeng Zhang |
Protect white-box AES to resist table composition attacks |
IET INFORMATION SECURITY |
12, 4, 305-313 |
Ting Gan, Mingshuai Chen, Yangjia Li, Bican Xia, Naijun Zhan |
Reachability analysis for solvable dynamical systems |
IEEE Transaction on Automatic Control |
63, 7, 2003-2018 |
Wen Zhang, Yuhang Du, Taketoshi Yoshida, Qing Wang, Xiangjun Li |
SamEn-SVR: using sample entropy and support vector regression for bug number prediction |
IET SOFTWARE |
12, 3, 183-189 |
Sirui Lu, Shilin Huang, Keren Li, Jun Li, Jianxin Chen, Dawei Lu, Zhengfeng Ji, Yi Shen, Duanlu Zhou, Bei Zeng |
Separability-entanglement classifier via machine learning |
PHYSICAL REVIEW A |
98, 1, |
Peng Zhang, Bin Fu, Linqing Tang |
Simpler and Better Approximation Algorithms for the Unweighted Minimum Label s-t Cut Problem |
ALGORITHMICA |
80, 1, 398-409 |
Yi Xu, Jigen Peng, Wencheng Wang, Binhai Zhu |
The connected disk covering problem |
Journal of Combinatorial Optimization |
35, 2, 538-554 |
Su Ning, Liang Xinyu, Zhai Fei-Fei, Zhou Li-Xin, Ni Jun, Yao Ming, Tian Feng, Zhang Shu-Yang, Jin Zheng-Yu, Cui Li-Ying, Gong Gaolang, Zhu Yi-Cheng |
The consequence of cerebral small vessel disease: Linking brain atrophy to motor impairment in the elderly |
HUMAN BRAIN MAPPING |
39,11,4452-4461 |
ZHIWU XU, PING LU, HAIMING CHEN |
Towards an effective syntax and a generator for deterministic standard regular expressions |
The Computer Journal |
https://doi.org/10.1093/comjnl/bxy110 |
YING JIANG, JIAN LIU, GILLES DOWEK, KAILIANG JI |
Towards Combining Model Checking and Proof Checking |
The Computer Journal |
http://dx.doi.org/10.1093/comjnl/bxy112 |
Chao Wang, Yi Lv and Peng Wu |
TSO-to-TSO linearizability is undecidable |
Acta Informatica |
55, 649–668 |
Zhiqiang Zeng, Zhihui Li, De Cheng, Huaxiang Zhang, Kun Zhan, Yi Yang |
Two-Stream Multirate Recurrent Neural Network for Video-Based Pedestrian Reidentification |
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS |
14, 7, 3179-3186 |
Jiang Tao, Shi Lei, Zhao Ye, Zhang Xiatian, Lu Yao, Huang Congcong |
Visual Comparison of Customer Stickiness in Retail Stores |
CHINESE JOURNAL OF ELECTRONICS |
27, 5, 951-958 |
曹巍, 吴恩华 |
本构模型在基于物理的变形模拟中的应用 |
郑州大学学报(理学版) |
, 4, 35-42 |
李英玲, 王青 |
持续集成测试用例集优化综述研究 |
软件学报 |
29, 10, 3021-3050 |
赵威 |
多核模型检测工具CTAV的实现与优化 |
计算机系统应用 |
27, 9, 176-181 |
郑晓琳, 邓玉欣, 付辰, 雷国庆 |
互模拟准局部验证算法的扩展与实现 |
软件学报 |
29,6,1517-1526 |
张晓航, 石清磊, 王斌, 王炳蔚, 王永吉, 陈力, 吴敬征 |
机器学习算法在中医诊疗中的研究综述 |
计算机科学 |
45, z2, 32-36 |
姚乃明, 郭清沛, 乔逢春, 陈辉, 王宏安 |
基于生成式对抗网络的鲁棒人脸表情识别 |
自动化学报 |
44,5,865-877 |
焦迪, 杨猛, 杨刚 |
基于物理的花开花落与叶片时变动态算法 |
系统仿真学报 |
30,6,2076-2085 |
姬强, 金蓓弘, 崔艳玲, 张扶桑 |
基于信令流的高速公路车辆实时分类 |
计算机工程与设计 |
39, 5, 1439-1505 |
刘胜航, 陈辉, 朱嘉奇, 武汇岳, 熊金泉, 王宏安 |
基于语义三角形的自然人机交互模型 |
中国科学. 信息科学 |
48,4,466-474 |
杨克, 贺也平, 马恒太, 王雪飞 |
精准执行可达性分析:理论与应用 |
软件学报 |
29,1,1-22 |
冯元, 应明生 |
量子程序验证 |
软件学报 |
29,4,1085-1093 |
张瀚, 李静, 吕品, 徐永志, 刘格林 |
六角格网的弧线矢量数据量化拟合方法 |
计算机辅助设计与图形学学报 |
30,4,557-567 |
吴文玲 |
认证加密算法研究进展 |
密码学报 |
5,1,70-82 |
刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民 |
软件与网络安全研究综述 |
软件学报 |
29,1,42-68 |
谢冰, 魏峻, 彭鑫, 孙海龙 |
数据驱动的软件智能化开发方法与技术专题前言 |
软件学报 |
29, 8, 2177-2179 |
王德鑫, 王青 |
支持软件过程可信评估的可信证据 |
软件学报 |
29, 11, 3412-3434 |
范俊君, 田丰, 杜一, 刘正捷, 戴国忠 |
智能时代人机交互的一些思考 |
中国科学. 信息科学 |
48,4,361-375 |