序号 | 论文名称 | 第一作者 | 通讯作者 | 发表年月 | 刊物/会议名称 | 收录类型 |
1 | Frequent Itemset Mining Algorithm Based on Differential Privacy in Vertical StructureFrequent Itemset Mining Algorithm Based on Differential Privacy in Vertical Structure | 龙士工 | 陈婷婷 | 1/1/2022 | International Journal of Network Security | EI源刊 |
2 | 一种基于强化学习的云应用弹性伸缩算法 | 帅斌 | 龙士工 | 2/1/2022 | 计算机应用与软件 | 中文核心 |
3 | A Blockchain-Based Continuous Query Difffferential Privacy Algorithm | 欧阳恒 | 龙士工 | 3/1/2022 | International Conference on Parallel and Distributed Computing: Applications and Technologies,PDCAT 2021 | EI会议 |
4 | Differential Privacy Protection and Game Analysis of Intelligent Transportation Data | 张珺铭 | 龙士工 | 3/1/2022 | 12th International Symposium on Parallel Architectures, Algorithms and Programming(PAAP) | EI会议 |
5 | 一种基于诱导机制的间谍软件检测方法 | 郭春 | 崔允贺 | 4/1/2022 | 电子学报 | EI源刊 |
6 | Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT | Linjie Wang | 田有亮 | 5/1/2022 | Digital Communications and Networks | SCI-1区 |
7 | FVP-EOC: Fair, Verifiable and Privacy-Preserving Edge Outsourcing Computing in 5G-enabled IIoT | Ta Li | 田有亮 | 6/1/2022 | IEEE Transactions on Industrial Informatics | SCI-1区 |
8 | A potential game-based outsourcing computation framework for multiple calculators | Duo Zhang | 田有亮 | 6/1/2022 | Digital Communications and Networks | SCI-1区 |
9 | Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT | Renwan Bi | 田有亮 | 8/1/2022 | Digital Communications and Networks | SCI-1区 |
10 | Achieving Lightweight and Privacy-preserving Object Detection for Connected Autonomous Vehicles | Renwan Bi | 田有亮 | 10/1/2022 | IEEE Internet of Things Journal | SCI-1区 |
11 | GDP vs. LDP: A Survey from the Perspective of Information-Theoretic Channel | 刘海 | 彭长根 | 3/1/2022 | Entropy | SCI-3区 |
12 | VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things | Zhou Zhou | 田有亮 | 9/1/2022 | Concurrency and Computation: Practice and Experience | SCI-4区 |
13 | Blockchain-enabled Secure and Trusted Federated Data Sharing in IIoT | 周洲 | 田有亮 | 10/1/2022 | IEEE Transactions on Industrial Informatics | SCI-1区 |
14 | Game-based Theory Rational Delegation Learning Scheme. | Kang Xiang | 田有亮 | 1/1/2022 | Journal of Information Science & Engineering | SCI-4区 |
15 | K-Implicit Tracking Data Publishing Scheme Against Geo-Matching Attacks. | Kun Niu | 彭长根 | 1/1/2022 | Journal of Information Science & Engineering | SCI-4区 |
16 | 基于代理重加密的区块链数据受控共享方案 | 郭庆 | 田有亮 | 7/1/2022 | 电子学报 | EI源刊 |
17 | 面向群智感知应用的基于协作的位置认证方案 | 田有亮 | 田有亮 | 9/1/2022 | 通信学报 | EI源刊 |
18 | 基于 SM2 盲签名的电子投票方案 | 王应娥 | 田有亮 | 2022 | 六盘水师范学院学报 | 其他 |
19 | 差分隐私下的权重社交网络隐私保护 | 徐花 | 田有亮 | 4/1/2022 | 西安电子科技大学学报 | EI源刊 |
20 | Traitor tracing scheme for relational databases based on blockchain | Weiqiang Jiang | 田有亮 | 5/1/2022 | International Conference on Computer Application and Information Security (ICCAIS 2021) | EI会议 |
21 | Efficient persistent memory file systems using virtual superpages with multi-level allocator | 杨朝树 | 刘铎 | 8/1/2022 | Journal of Systems Architecture | SCI-2区 |
22 | Data Transmission Strategy Based on Node Motion Prediction IoT System in Opportunistic Social Networks | 苟芳芳 | 吴嘉 | 6/1/2022 | Wireless Personal Communications | SCI-4区 |
23 | Security Enhancement of Power System State Estimation With An Effective and Low-cost Moving Target Defense | 张镇勇 | 邓瑞龙 | 11/1/2022 | IEEE Transactions on Systems, Man and Cybernetics:Systems | SCI-1区 |
24 | CoRE: Constrained Robustness Evaluation of Machine Learning-based Stability Assessment for Power Systems | 张镇勇 | David K. Y. Yau | 9/1/2022 | IEEE/CAA Journal of Automatica Sinica | SCI-1区 |
25 | Detecting the One-shot Dummy Attack on the Power Industrial Control Processes with An Unsupervised Data-Driven Approach | 张镇勇 | 张镇勇 | 8/1/2022 | IEEE/CAA Journal of Automatica Sinica | SCI-1区 |
26 | Impact Analysis of Moving Target Defense on the Frequency Stability in Smart Grid | 张镇勇 | 张镇勇 | 6/1/2022 | IEEE/CAA Journal of Automatica Sinica | SCI-1区 |
27 | Physics-Constrained Robustness verification of Intelligent Security Assessment for Power Systems | 张镇勇 | 孙铭阳 | 5/1/2022 | IEEE Transactions on Power Systems | SCI-1区 |
28 | A Double-Benefit Moving Target Defense Against Cyber-Physical Attacks in Smart Grid | 张镇勇 | 邓瑞龙 | 9/1/2022 | IEEE Internet of Things Journal | SCI-1区 |
29 | SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid | 张镇勇 | 程鹏 | 11/1/2022 | IEEE Transactions on Information Forensics & Security | SCI-1区 |
30 | Connecting macroscopic diffusion metrics of cardiac diffusion tensor imaging and microscopic myocardial structures based on simulation | 王丽会 | 秦永彬 | 4/1/2022 | Medical Image Analysis | SCI-1区 |
31 | Learn Less, Infer More: Learning in the Fourier Domain for Quantitative Susceptibility Mapping | He, Junjie | 王丽会 | 2/1/2022 | Frontiers in Neuroscience | SCI-3区 |
32 | Multimodal MRI Image Decision Fusion-Based Network for Glioma Classification. | Guo, Shunchao | 王丽会 | 2/1/2022 | Frontiers in Oncology | SCI-2区 |
33 | Glioma grade prediction using a cross-fusion network based on unsegmented multi-sequence magnetic resonance images | 王丽会 | 11/1/2022 | The 16th IEEE International Conferenceon Signal Processing ( ICSP) | EI会议 | |
34 | Accelerating multi-echo MRI in k-space with complex-valued diffusion probabilistic model | 王丽会 | 11/1/2022 | The 16th IEEE International Conferenceon Signal Processing ( ICSP) | EI会议 | |
35 | Adaptive temporal information fusion network for in vivo cardiac DTI motion compensation | 王丽会 | 11/1/2022 | The 16th IEEE International Conferenceon Signal Processing ( ICSP) | EI会议 | |
36 | A dual-flow neural network for medical image registration | 王丽会 | 11/1/2022 | The 16th IEEE International Conferenceon Signal Processing ( ICSP) | EI会议 | |
37 | Spatial Attention based Semantic Decouple Network for Breast Tumor Segmentation | 王丽会 | 11/1/2022 | The 16th IEEE International Conferenceon Signal Processing ( ICSP) | EI会议 | |
38 | LGST-Drop: label-guided structural dropout for spatial–temporal convolutional neural networks | 崔虎 | 黄初华 | 5/1/2022 | Journal of Electronic Imaging | SCI-4区 |
39 | 基于异步多时域特征的动态手势识别方法 | 崔虎 | 黄初华 | 11/1/2022 | 计算机工程与应用 | 中文核心 |
40 | 基于DRQN的视觉SLAM参数自适应调整 | 陈青梅 | 黄初华 | 12/1/2022 | 计算机工程与设计 | 中文核心 |
41 | Feature Fusion Method for Low-Illumination Images | 李亚男 | 黄初华 | 12/1/2022 | Journal of Computers | EI源刊 |
42 | Siamese network with transformer and saliency encoder for object tracking | 刘磊 | 孔广黔 | 5/1/2022 | Applied Intelligence | SCI-3区 |
43 | No-reference Video Quality Assessment Based on Spatio-temporal Perception Feature Fusion | 谭娅娅 | 孔广黔 | 6/1/2022 | Neural Processing Letters | SCI-3区 |
44 | HVAE: A Deep Generative Model via Hierarchical Variational Auto-Encoder for Multi-view Document Modeling | 白瑞娜 | 黄瑞章 | 11/1/2022 | Infomration Sciences | SCI-2区 |
45 | Structure enhanced deep clustering network via a weighted neighbourhood auto-encoder | 白瑞娜 | 黄瑞章 | 11/1/2022 | Neural Networks | SCI-2区 |
46 | 融合ELECTRA和文本局部信息的中文语法错误检测方法 | 陈柏霖 | 黄瑞章 | 8/1/2022 | 计算机工程 | 中文核心 |
47 | Multi-view document clustering with joint contrastive learning | 白瑞娜 | 黄瑞章 | 9/1/2022 | The 11th CCF International Conference on Natural Language Processing and Chinese Computing (NLPCC2022) | CCF C类 |
48 | A Sentence Prediction Approach Incorporating Trial Logic Based on Abductive Learning | 欧阳隆 | 黄瑞章、秦永彬 | 2022 | APPLIED SCIENCES-BASEL | SCI-3区 |
49 | A blockchain-empowered authentication scheme for worm detection in wireless sensor network | 陈玉玲 | 陈玉玲 | 4/1/2022 | Digital Communications and Networks. | SCI-1区 |
50 | A trusted de-swinging k-anonymity scheme for location privacy protection. | Manxiang Yang | 陈玉玲 | 1/1/2022 | Journal of Cloud Computing-Advances Systems and Applications | SCI-3区 |
51 | An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model | Yun Luo | 陈玉玲 | 6/1/2022 | Journal of Organizational and End User Computing | SCI-3区 |
52 | A designated verifier multi-signature scheme in multi-clouds | Tan | 陈玉玲 | 10/1/2022 | Journal of Cloud Computing-Advances Systems and Applications | SCI-3区 |
53 | A Multi-Dimensional Data Utility Evaluate and Pricing Scheme in the Big Data Market | 陈玉玲 | 陈玉玲 | 10/1/2022 | Wireless Communications and Mobile Computing | SCI收录 |
54 | DE-RSTC: A rational secure two-party computation protocol based on direction entropy. | 陈玉玲 | Xianmin Wang | 11/1/2022 | International Journal of Intelligent Systems. | SCI-1区 |
55 | Energy trading scheme based on consortium blockchain and game theory. | 陈玉玲 | Qi Chen, Xianmin Wang. | 10/1/2022 | Computer Standards & Interfaces | SCI-3区 |
56 | A differential privacy protection protocol based on location entropy | Guo Ping | Yuling Chen | 1/1/2022 | TSINGHUA SCIENCE AND TECHNOLOGY | SCI收录 |
57 | 基于DLIN加密的可监管联盟链隐私保护方案 | 何建江 | 陈玉玲 | 11/1/2022 | 计算机工程 | 中文核心 |
58 | A Security Transaction Model Based on HTLC | Xiaochuan He | 陈玉玲 | 8/1/2022 | (iThings/GreenCom/CPSCom/SmartData/Cyber- matics),2022 | EI收录 |
59 | The optimal attack-defense scheme for secret sharing | Juan Ma | 陈玉玲 | 8/1/2022 | (iThings/GreenCom/CPSCom/SmartData/Cyber- matics),2022 | EI收录 |
60 | A Secure Multiparty Computation Round Optimization Scheme Based on Standard Assumption | Yun Luo | 陈玉玲 | 8/1/2022 | (iThings/GreenCom/CPSCom/SmartData/Cyber- matics),2022 | EI收录 |
61 | A Secure Comparison Protocol in the Malicious Model | Junhong Tao | 陈玉玲 | 8/1/2022 | (iThings/GreenCom/CPSCom/SmartData/Cyber- matics),2022 | EI收录 |
62 | Data Confirmation Scheme based on Auditable CP-ABE | Lingyun Zhang | 陈玉玲 | 8/1/2022 | (iThings/GreenCom/CPSCom/SmartData/Cyber- matics),2022 | EI收录 |
63 | A Multipath Source Location Privacy Protection Scheme in Wireless Sensor Networks via Proxy Node | Jing Sun | 陈玉玲 | 8/1/2022 | (iThings/GreenCom/CPSCom/SmartData/Cyber- matics),2022 | EI收录 |
64 | A Blockchain-based Scalable Electronic Contract Signing System | Kaicheng Yang | 陈玉玲 | 8/1/2022 | (iThings/GreenCom/CPSCom/SmartData/Cyber- matics),2022 | EI收录 |
65 | A K-anonymity Optimization Algorithm Under Attack Model | Manxiang Yang | 陈玉玲 | 8/1/2022 | (iThings/GreenCom/CPSCom/SmartData/Cyber- matics),2022 | EI收录 |
66 | TSHML: Token Shuffling under Haircut Policy Based on Machine Learning | Yilei Wang | Tao Li | 8/1/2022 | (iThings/GreenCom/CPSCom/SmartData/Cyber- matics),2022 | EI收录 |
67 | 基于安全多方计算的DPOS改进方案 | 蒋翊彬 | 汪学明 | 7/1/2022 | 计算机工程与设计 | 中文核心 |
68 | 格上基于身份的可链接环签名方案 | 刘梦情 | 汪学明 | 5/1/2022 | 计算机应用研究 | 中文核心 |
69 | 融合项目属性和用户兴趣迁移的协同过滤算法 | 李豆豆 | 汪学明 | 5/1/2022 | 计算机仿真 | 中文核心 |
70 | A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC) | JAW EBRIMA | 汪学明 | 3/1/2022 | PeerJ Computer Science | SCI-4区 |
71 | Boundary assembling method for joint entity and relation extraction | 唐瑞雪 | 陈艳平 | 8/1/2022 | Knowledge-Based Systems | SCI-2区 |
72 | A Joint Model for Entity Boundary Detection and Entity Span Recognition | 念永明 | 陈艳平 | 8/1/2022 | Journal of King Saud University - Computer and Information Sciences | SCI-1区 |
73 | 一种采用机器阅读理解模型的中文分词方法 | 周裕林 | 陈艳平 | 8/1/2022 | 西安交通大学学报 | EI源刊 |
74 | A Marker Collaborating Model for Entity and Relation Extraction | 吴宜钊 | 陈艳平 | 9/1/2022 | Journal of King Saud University - Computer and Information Sciences | SCI-1区 |
75 | A Boundary Regression Model for Nested Named Entity Recognition | 陈艳平 | 陈艳平 | 9/1/2022 | Cognitive Computation | SCI-2区 |
76 | 基于机器阅读理解的司法实体识别优化策略研究 | 余俊晖 | 陈艳平 | 9/1/2022 | 广西科学 | 中文核心 |
77 | 基于提示学习的生物实体关系抽取 | 文坤建 | 陈艳平 | 9/1/2022 | 计算机科学 | 中文核心 |
78 | 边界回归的谓语中心词识别 | 郭晓 | 陈艳平 | 1/1/2022 | 计算机工程与应用 | 中文核心 |
79 | 跨度语义增强的命名实体识别方法 | 耿汝山 | 陈艳平 | 3/1/2022 | 西安交通大学学报 | EI源刊 |
80 | 基于回归的唯一谓语中心词识别 | 尚千壹 | 陈艳平 | 4/1/2022 | 计算机工程与设计 | 中文核心 |
81 | 基于深度渗透网络的关系抽取方法研究 | 刘一军 | 陈艳平 | 9/1/2022 | WISA 2022 | EI会议 |
82 | 基于跨度回归的中文事件触发词抽取 | 赵宇豪 | 陈艳平 | 8/1/2022 | 应用科学学报 | 中文核心 |
83 | 结合预训练和自训练的法律信息抽取增强式方法研究 | 周裕林 | 陈艳平 | 8/1/2022 | 燕山大学学报 | 中文核心 |
84 | 基于多模态学习的试题知识点分类方法 | 李洋洋 | 陈艳平 | 3/1/2022 | 中文信息学报 | 中文核心 |
85 | 基于最佳子策略记忆的强化探索策略 | 周瑞朋 | 秦进 | 2022 | 计算机工程 | 中文核心 |
86 | 基于内在奖励的技能的获取和组合方法 | 赵英 | 秦进 | 2022 | 计算机应用研究 | 中文核心 |
87 | 结合新颖性和风险评估的内在奖励方法 | 赵英 | 秦进 | 2022 | 计算机工程与应用 | 中文核心 |
88 | MGA-YOLOv4: a multi-scale pedestrian detection method based on mask-guided attention | 王婷婷 | 万良 | 1/1/2022 | Applied Intelligence | SCI-3区 |
89 | MFEAFN: Multi-scale feature enhanced adaptive fusion network for image semantic segmentation | 李树胜 | 万良 | 9/1/2022 | PLoS One | SCI-3区 |
90 | DBKEM-AACS: A Distributed Key Escrow Model in Blockchain with Anonymous Authentication and Committee Selection | Axin Xiang | 万良 | 12/1/2022 | SCIENCE CHINA Information Sciences | SCI-2区 |
91 | 边缘协同的轻量级隐私保护分类框架 | 熊金波 | 万良 | 1/1/2022 | 通信学报 | EI源刊 |
92 | 基于Transformer的入侵检测方法研究 | 黄海彬 | 万良 | 9/1/2022 | 软件导刊 | 中文核心 |
93 | 基于可解释性的Android恶意软件检测 | 黄海彬 | 万良 | 11/1/2022 | 计算机系统应用 | 中文核心 |
94 | 深度可分离卷积在Android恶意软件分类的应用研究 | 褚堃 | 万良 | 5/1/2022 | 计算机应用研究 | 中文核心 |
95 | DWT和AKD自动编码器的DDoS攻击检测方法研究 | 王博 | 万良 | 11/1/2022 | 南京信息工程大学学报 | 中文核心 |
96 | EAI-Stereo: Error Aware Iterative Network for Stereo Matching | 赵浩良 | 张永军 | 12/1/2022 | The 16th Asian Conference on Computer Vision, ACCV2022 | CCF C类 |
97 | Dictionary learning and face recognition based on sample expansion | 张永军 | 张永军 | 3/1/2022 | Appl. Intell | SCI-3区 |
98 | Single Image Deraining Using Multi-Stage and Multi-Scale Joint Channel Coordinate Attention Fusion Network | 杨亦童 | 张永军 | 11/1/2022 | INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS | SCI-1区 |
99 | A robust edge-guided and color-guided network for single image dehazing | 徐毓杰 | 张永军 | 10/1/2022 | COMPUTERS & ELECTRICAL ENGINEERING | SCI-3区 |
100 | License plate detection and recognition based on YOLOv3 and ILPRNET | 邹永杰 | 张永军 | 8/1/2022 | Signal Image and Video Processing | SCI-4区 |
101 | Multi-Scale dehazing network via High Frequency feature fusion | 徐毓杰 | 张永军 | 10/1/2022 | COMPUTERS & GRAPHICS-UK | SCI-4区 |
102 | Improved Multiple Vector Representations of Images and Robust Dictionary Learning | 潘承昌 | 张永军 | 3/1/2022 | Electronics | SCI-4区 |
103 | MMPCANet: An Improved PCANet for Occluded Face Recognition | 王泽伟 | 张永军 | 3/1/2022 | APPLIED SCIENCES-BASEL | SCI-3区 |
104 | 基于自适应多尺度与轮廓梯度的遥感图像分割网络 | 牛梦佳 | 张永军 | 7/1/2022 | 激光与光电子学进展 | 中文核心 |
105 | 基于RDM-YOLOv3的头部检测 | 刘俊文 | 张永军 | 9/1/2022 | 激光与光电子学进展 | 中文核心 |
106 | 基于情景记忆的运动小目标行人检测神经网络 | 张本康 | 胡滨 | 8/1/2022 | 计算机工程与应用 | 中文核心 |
107 | 生物启发的人群突发局部聚集感知神经网络 | 刘倡 | 胡滨 | 8/1/2022 | 计算机工程与应用 | 中文核心 |
108 | 案例教学法在高校课程思政建设中的实践与探索——以“计算机系统结构”课程为例 | 胡滨 | 胡滨 | 5/1/2022 | 教育教学论坛 | 其他 |
109 | 基于学业导师制的大学生创新力培养探索研究——以“单片机与接口技术”为例 | 胡滨 | 胡滨 | 7/1/2022 | 教育教学论坛 | 其他 |
110 | Defending Saturation Attacks on SDN Controller: A Confusable Instance Analysis-based Algorithm | 冉隆雁 | 崔允贺 | 8/1/2022 | computer networks | SCI-3区 |
111 | KIND: A Novel Image Mutual Information based Decision Fusion Method for Saturation Attack Detection in SD-IoT | 肖曼 | 崔允贺 | 7/1/2022 | internet of things journal | SCI-1区 |
112 | 面向IoT的边缘节点平台架构 | 邢照庆 | 崔允贺 | 5/1/2022 | 计算机系统应用 | 中文核心以外的SCD收录期刊 |
113 | Data privacy and utility trade-off based on mutual information neural estimator | 汤金川 | 11/1/2022 | Expert Systems with Applications | SCI-1区 | |
114 | Computing Sufficient and Necessary Conditions in CTL: A Forgetting Approach | Renyan Feng | Yisong Wang | 11/1/2022 | Information Science | SCI-2区 |
115 | A Q-Based Policy Gradient Optimization Approach for Doudizhu | Xiaomin Yu | Yisong Wang | 11/1/2022 | Applied Intelligence | SCI-3区 |
116 | Witnesses for Answer Sets of Logic Programs | Yisong Wang | 1/1/2022 | ACM Transactions on Computational Logic | SCI-3区 | |
117 | Fuzzy Multi-Context Systems | Lei Yang | 王以松 | 8/1/2022 | IEEE Transactions on Fuzzy Systems | SCI-1区 |
118 | Knowledge Forgetting in Propositional µ-calculus | Renyan Feng | Yisong Wang | 9/1/2022 | Annals of Mathematics and Artificial Intelligence | SCI-4区 |
119 | QLogicE: Quantum Logic Empowered Embedding for Knowledge Graph Completion | Panfeng Chen | 王以松 | 3/1/2022 | Knowledge-Based Systems | SCI-2区 |
120 | On Sufficient and Necessary Conditions in Bounded CTL: A Forgetting Approach | 冯仁艳 | 王以松 | 2022 | Annals of Mathematics and Artificial Intelligence (AMAI) | SCI 四区 |
121 | Deep structural enhanced network for document clustering | 任丽娜 | 秦永彬 | 9/1/2022 | Applied Intelligence | SCI-3区 |
122 | 司法机器阅读理解的优化策略研究 | 秦永彬 | 秦永彬 | 2022 | 华中科技大学学报(自然科学版) | EI源刊 |
123 | SSVAE:一种补充语义信息的深度变分文本聚类算法 | 薛菁菁 | 秦永彬 | 2022 | 数据分析与知识发现 | 中文核心 |
124 | GANRec: A negative sampling model with generative adversarial network for recommendation | 杨志 | 秦永彬 | 3/1/2022 | Expert Systems with Applications | SCI-2区 |
125 | SAD: Website Fingerprinting Defense Based on Adversarial Examples | Tang, Renzhi | 申国伟 | 5/1/2022 | Security and Communication Networks | SCI-4区 |
126 | Automatic liver tumor segmentation used the cascade multi-scale attention architecture method based on 3D U-Net | 吴云 | 6/1/2022 | International Journal of Computer Assisted Radiology and Surgery | SCI-4区 | |
127 | 高级语义修复策略的跨模态融合RGB-D显著性检测 | 吴云 | 7/1/2021 | 计算机科学与探索 | 中文核心 | |
128 | 基于MSFA-Net的肝脏CT图像分割方法 | 吴云 | 8/1/2021 | 计算机科学与探索 | 中文核心 | |
129 | 双感知门控交互的多任务推荐模型 | 吴云 | 10/1/2021 | 计算机科学与探索 | 中文核心 | |
130 | Map‐Assisted 3D Indoor Localization Using Crowd‐Sensing‐Based Trajectory Data and Error Ellipse‐Enhanced Fusion | 万桥 | 余跃 | 9/1/2022 | Remote Sensing | SCI-2区 |
131 | Self-Calibrated Multi-Floor Localization Based on Wi-Fi Ranging/Crowdsourced Fingerprinting and Low-Cost Sensors | 万桥 | 余跃 | 10/1/2022 | Remote Sensing | SCI-2区 |
132 | Stochastic simulation of enzymatic kinetics for C-13 isotope labeling at the single cell scaleStochastic simulation of enzymatic kinetics for C-13 isotope labeling at the single cell scale | 罗昊 | 谢晓尧 | 7/1/2022 | Reaction Kinetics, Mechanisms and Catalysis | SCI-4区 |
133 | Adaptive Chinese Pinyin IME for Most Similar Representation | 蒋冬生 | 程欣宇 | 11/1/2022 | IEEE Access | SCI-3区 |
134 | TIIML: Study on Token Shuffling under Incomplete Information Based on Machine Learning | YIlei wang | 李涛 | 2022 | International Journal of intelligent systems | SCI-1区 |
135 | Vehicle re-identification based on keypoint segmentation of original image | 胡志军 | 徐勇 | 5/1/2022 | Applied Intelligence | SCI-2区 |
136 | Satisfiability threshold of the random regular (s,c,k)-SAT problem | 莫孝玲 | 许道云 | 5/1/2022 | Frontiers of computer science | SCI-2区 |
137 | Non-interactive verifiable privacy-preserving federated learning | 徐艺 | 彭长根 | 2022 | Future Generation Computer Systems | SCI-2区 |
138 | Forecasting Network Interface Flow Using a Broad Learning System Based on the Sparrow Search Algorithm | 李笑瑜 | 李少波 | 2022 | Entropy | SCI-3区 |
139 | Automatic Liver Tumor Segmentation Using the Cascade Multi-scale Attention Architecture Method Based on 3D U-Net | 沈怀艳 | 吴云 | 6/1/2022 | International Journal of Computer Assisted Radiology and Surgery | SCI-3区 |
140 | An efficient robust zero watermarking scheme for diffusion tensor-Magnetic resonance imaging high-dimensional data. | 高健 | 李智 | 6/1/2022 | Journal of Information Security and Applications | SCI-3区 |
141 | Local PatchMatch Based on Superpixel Cut for Efficient High-resolution Stereo Matching | 成先镜 | 赵勇 | 2022 | Brazilian Archives of Biology and Technology | SCI-4区 |
142 | A novel cell structure‐based disparity estimation for unsupervised stereo matching | 成先镜 | 赵勇 | 2022 | IET Image Processing | SCI-4区 |
143 | HLocalExp-CM: confidence map by hierarchical local expansion moves for accurate stereo matching | 成先镜 | 赵勇 | 2022 | Journal of Electronic Imaging | SCI-4区 |
144 | Two-view attention-guided convolutional neural network for mammographic image classification | 孙利雷 | 赵勇 | 2022 | CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY | SCI-4区 |
145 | Breast mass classification based on supervised contrastive learning and multi-view consistency penalty on mammography | 孙利雷 | 赵勇 | 2022 | IET BIOMETRICS | SCI-4区 |
146 | VNet: a versatile network to train real-time semantic segmentation models on a single GPU | 李文星 | 王子牛 | 2022 | Science China Information Sciences | SCI-4区 |
147 | An adaptive high capacity reversible data hiding algorithm in interpolation domain | 熊祥光 | 王丽会 | 2022 | Signal Processing | SCI-2区 |