学者信息

史亮 (Liang Shi)

信息学院

合作者

已发表成果:

WOK 论文 28 篇;中文核心 9 篇;其它论文 7 篇;

  • Any-to-Any Voice Conversion With Multi-Layer Speaker Adaptation and Content Supervision

    IEEE/ACM Transactions on Audio Speech and Language Processing,2329-9290,2023.
    Xu, Xuexin; Shi, Liang; Chen, Xunquan; Lin, Pingyuan; Lian, Jie; Chen, Jinhui; Zhang, Zhihong; Hanc...
    WOS:001089305500004   EI:20233514639054   10.1109/TASLP.2023.3306716
    收录情况:SCIE、EI
  • Unsupervised Ensemble Learning with Noisy Label Correction

    SIGIR 2021 - Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval,,2021-07-11.
    Zou, Xupeng; Zhang, Zhongnan; He, Zhen; Shi, Liang
    WOS:000719807900296   EI:20213110719017   10.1145/3404835.3463081
    收录情况:EI、CPCI-S
  • Two-Pathway Style Embedding for Arbitrary Voice Conversion

    Proceedings of the Annual Conference of the International Speech Communication Association, INTERSPEECH,2308-457X,2021.
    Xu, Xuexin; Shi, Liang; Chen, Jinhui; Chen, Xunquan; Lian, Jie; Lin, Pingyuan; Zhang, Zhihong; Hanc...
    WOS:000841879501096   EI:20214711194554   10.21437/Interspeech.2021-506
    收录情况:EI、CPCI-S
  • Seismic Facies Classification Algorithm Based on the EarthTransNet

    Proceedings - 2021 2nd International Conference on Computer Science and Management Technology, ICCSMT 2021,,2021.
    Liang, Haoran (1); Yang, Yanxin (1); Shi, Liang (1); Wu, Qingqiang (1)
    EI:20222712317956   10.1109/ICCSMT54525.2021.00058
    收录情况:EI
  • A Topic Detection Method Based on Microblog Weight

    Proceedings - 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2015,,2015-10-26.
    Guo, Kaijie(1); Shi, Liang(1)
    WOS:000380437200036   EI:20161302147064   10.1109/CyberC.2015.20
    收录情况:EI、CPCI-S
  • Analysis of file pollution in P2P networks with epidemic model

    Journal of Internet Technology,1607-9264,2015-07.
    Li, Zhongwen(1,2); Li, Kuan-Ching(3); Xie, Yi(4); Jiang, Hai(5); Shi, Liang(4)
    WOS:000359612800014   EI:20153301168409   10.6138/JIT.2015.16.4.20140728
    收录情况:SCIE、EI
  • A survey of Internet public opinion mining

    PIC 2014 - Proceedings of 2014 IEEE International Conference on Progress in Informatics and Computing,,2014-12-02.
    Guo, Kaijie(1); Shi, Liang(1); Ye, Weilong(1); Li, Xiang(1)
    EI:20145200358120   10.1109/PIC.2014.6972319
    收录情况:EI
  • An new agent based distributed adaptive intrusion detection system

    Advanced Materials Research,1022-6680,2012.
    Liu, Yangbin (1); Shi, Liang (1); Wang, Beizhan (1); Wu, Yuanqin (1); Wang, Panhong (1)
    EI:20124615672121   10.4028/www.scientific.net/AMR.532-533.624
    收录情况:EI
  • Software vulnerability discovery techniques: A survey

    Proceedings - 2012 4th International Conference on Multimedia and Security, MINES 2012,,2012.
    Liu, Bingchang (1); Shi, Liang (1); Cai, Zhuhua (1); Li, Min (1)
    WOS:000320868300038   EI:20130615995161   10.1109/MINES.2012.202
    收录情况:EI、CPCI-S
  • An improved credibility method based on matrix weight

    2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011,,2011.
    Chen, Minkui(1); Shi, Liang(1); Wang, Beizhan(1); Wang, Xu(1)
    EI:20113914378729   10.1109/ICCSN.2011.6014762
    收录情况:EI
  • A method for HMM-based system calls intrusion detection based on hybrid training algorithm

    2011 IEEE International Conference on Information and Automation, ICIA 2011,,2011.
    Wang, Panhong(1); Shi, Liang(1); Wang, Beizhan(1); Liu, Yangbin(1); Wu, Yuanqin(1)
    EI:20113314229163   10.1109/ICINFA.2011.5949013
    收录情况:EI
  • The mechanism to control file-pollution based on hybrid trust-model in P2P network

    ASID 2011 - Proceedings: 2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification,,2011.
    Li, Zhongwen(1); Yao, Jing(2); Shi, Liang(3)
    EI:20113614294269   10.1109/ASID.2011.5967407
    收录情况:EI
  • An improved combination feature selection based on relieff and genetic algorithm

    ICCSE 2010 - 5th International Conference on Computer Science and Education, Final Program and Book of Abstracts,,2010.
    Wang, Xu(1); Wang, Beizhan(1); Shi, Liang(1); Chen, Minkui(1)
    EI:20104813440056   10.1109/ICCSE.2010.5593712
    收录情况:EI
  • Survey on HMM based anomaly intrusion detection using system calls

    ICCSE 2010 - 5th International Conference on Computer Science and Education, Final Program and Book of Abstracts,,2010.
    Wang, Panhong(1); Shi, Liang(1); Wang, Beizhan(1); Wu, Yuanqin(1); Liu, Yangbin(1)
    EI:20104813440182   10.1109/ICCSE.2010.5593839
    收录情况:EI
  • Authentication in peer-to-peer network: Survey and research directions

    NSS 2009 - Network and System Security,,2009.
    Li, Zhongwen(1); Xu, Xiaochen(2); Shi, Liang(2); Liu, Jian(2); Liang, Chen(2)
    EI:20095312599596   10.1109/NSS.2009.30
    收录情况:EI
  • Image retrieval based on improved MCD and EHD of MPEG-7

    Proceedings of the International Symposium on Test and Measurement,,2009.
    Yanhong, Zhao(1); Beizhan, Wang(1); Su, Ye(1); Yinhuan, Zheng(1); Liang, Shi(1)
    EI:20101712882008   10.1109/ICTM.2009.5412982
    收录情况:EI
  • An initialization method for clustering high-dimensional data

    Proceedings - 2009 1st International Workshop on Database Technology and Applications, DBTA 2009,,2009.
    Chen, Luying(1); Chen, Lifei(2); Jiang, Qingshan(1); Wang, Beizhan(1); Shi, Liang(1)
    WOS:000274239000108   EI:20094712477199   10.1109/DBTA.2009.87
    收录情况:EI、CPCI-S
  • A improved CF model base on normal distribution and Euclidean distance

    Proceedings of 2009 4th International Conference on Computer Science and Education, ICCSE 2009,,2009.
    Zhenpeng, Zhan(1); Beizhan, Wang(1); Liang, Shi(1); Lida, Lin(1)
    WOS:000271688600042   EI:20094512424776   10.1109/ICCSE.2009.5228495
    收录情况:EI、CPCI-S、CPCI-SSH
  • Estimation of software projects effort based on function point

    Proceedings of 2009 4th International Conference on Computer Science and Education, ICCSE 2009,,2009.
    Yinhuan, Zheng(1); Beizhan, Wang(1); Yilong, Zheng(2); Liang, Shi(1)
    WOS:000271688600202   EI:20094512424609   10.1109/ICCSE.2009.5228317
    收录情况:EI、CPCI-S、CPCI-SSH
  • Reduction and dynamic discretization of multi-attribute based on rough set

    2009 WRI World Congress on Software Engineering, WCSE 2009,,2009.
    Tinghui, Lin(1); Liang, Shi(2); Qingshan, Jiang(2); Beizhan, Wang(2)
    WOS:000278560800011   EI:20095312599882   10.1109/WCSE.2009.26
    收录情况:EI、CPCI-S
  • An intrusion detection method based on outlier ensemble detection

    Proceedings - International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009,,2009.
    Huang, Bin(1); Li, Wen-Fang(1); Chen, De-Li(1); Shi, Liang(2)
    EI:20093012206890   10.1109/NSWCTC.2009.292
    收录情况:EI
  • Mobile agent system security mechanism for large scale network applications

    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China,1001-0548,2007-12.
    Shi, Liang(1); Wang, Bei-Zhan(1); Jiang, Qing-Shan(1); Chen, Li-Fei(1)
    EI:20080811110901  
    收录情况:EI
  • Supervised feature selection for DoS detection problems using a new clustering criterion

    Journal of Computational Information Systems,1553-9105,2007-10.
    Chen, Lifei(1); Shi, Liang(2); Jiang, Qingshan(2); Wang, Shoujue(2,3)
    EI:20080211012884  
    收录情况:EI
  • Gabor representation based probabilistic subspace analysis for face recognition

    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology,1009-5896,2007-03.
    Long, Fei(1); Dong, Huai-Lin(1); Wang, Bei-Zhan(1); Shi, Liang(1)
    EI:20071810576395  
    收录情况:EI
  • An intrusion detection system based on the clustering ensemble

    2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID,,2007.
    Fangfei, Weng(1); Qingshan, Jiang(1); Liang, Shi(1); Nannan, Wu(1)
    WOS:000250042400029   EI:20073910833359   10.1109/IWASID.2007.373710
    收录情况:EI、CPCI-S
  • An outlier mining-based method for anomaly detection

    2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID,,2007.
    Nannan, Wu(1); Liang, Shi(1); Qingshan, Jiang(1); Fangfei, Weng(1)
    WOS:000250042400036   EI:20073910833366   10.1109/IWASID.2007.373717
    收录情况:EI、CPCI-S
  • Innovated precision grinding by exploiting grinding point movement in radial direction and forward backward feeding of wheel

    Key Engineering Materials,1013-9826,2007.
    Yao, B.(1); Xi, W.M.(1); Chen, C.R.(1); Shi, L.(1)
    EI:20070410386736   10.4028/0-87849-416-2.63
    收录情况:EI
  • Alerts information association analysis technology based on intrusion intention

    Jisuanji Gongcheng/Computer Engineering,1000-3428,2006-07-20.
    Shi, Liang; Wang, Bei-Zhan; Yao, Jun-Feng
    EI:20063410084395  
    收录情况:EI
  • 一个群签名方案的安全性分析

    计算机工程,1000-3428,2013-04-15.
    黄斌;史亮;邓小鸿
    CSCD核心 理工二类核心
  • 2个代理签名方案的安全性分析

    厦门大学学报(自然科学版),0438-0479,2013-03-28.
    黄斌;史亮
    CSCD核心 理工二类核心
  • 自适应高容量医学图像可逆数据隐藏算法

    计算机应用,1001-9081,2012.
    黄斌;史亮;邓小鸿;陈志刚
    CSCD核心 理工二类核心
  • 基于银行数据仓库的元数据管理系统

    计算机工程 ,1000-3428 ,2009.
    谢福成;王备战;史亮;姜青山
    理工二类核心
  • 连续属性的频数监督断点离散化技术

    计算机工程与应用 ,1002-8331 ,2009.
    林汀辉;史亮;姜青山
    理工二类核心
  • 一种新的蛋白质序列模式挖掘算法

    计算机工程 ,1000-3428 ,2009.
    郭顺;姜青山;王备战;史亮
    理工二类核心
  • 基于孤立点挖掘的入侵检测技术

    计算机工程,1000-3428,2008-02-05.
    黄斌;史亮;姜青山;吴楠楠
    理工二类核心
  • 求解大规模0-1背包问题的主动进化遗传算法

    计算机工程,1000-3428,2007-07-05.
    史亮;董槐林;王备战;龙飞
    理科核心
  • 基于入侵意图的报警信息关联分析技术

    计算机工程,1000-3428,2006-07-20.
    史亮;王备战;姚俊峰
    理科核心
  • 一种处理混合型属性的聚类算法在计算机取证中的应用

    陕西科技大学学报(自然科学版),1000-5811,2010.
    黄斌;史亮;陈德礼;陈俊杰;周超
  • 一种基于融合孤立点挖掘的入侵检测技术

    现代计算机(专业版) ,1007-1423 ,2009.
    黄斌;史亮
  • 一种基于聚类和关联规则修正的入侵检测技术

    莆田学院学报 ,1672-4143 ,2009.
    黄斌;史亮;陈德礼
  • 一种基于BIRCH的异常检测技术

    太原师范学院学报(自然科学版),1672-2027,2008-12-25.
    黄斌;史亮;陈德礼
  • 面向大规模网络应用的移动主体系统安全机制

    电子科技大学学报,1001-0548,2007-12-20.
    史亮;王备战;姜青山;陈黎飞
  • 基于二维直方图信息熵的图像检索方法

    广西师范大学学报(自然科学版),1001-6600,2007-12-15.
    洪清启;王备战;史亮;董槐林;陈兵
  • 一种基于Gabor描述的概率子空间人脸识别方法

    电子与信息学报,1009-5896,2007-03-30.
    龙飞;董槐林;王备战;史亮