已发表成果:
WOK 论文 28 篇;中文核心 9 篇;其它论文 7 篇;
Any-to-Any Voice Conversion With Multi-Layer Speaker Adaptation and Content Supervision
Unsupervised Ensemble Learning with Noisy Label Correction
Two-Pathway Style Embedding for Arbitrary Voice Conversion
Seismic Facies Classification Algorithm Based on the EarthTransNet
A Topic Detection Method Based on Microblog Weight
Analysis of file pollution in P2P networks with epidemic model
A survey of Internet public opinion mining
An new agent based distributed adaptive intrusion detection system
Software vulnerability discovery techniques: A survey
An improved credibility method based on matrix weight
A method for HMM-based system calls intrusion detection based on hybrid training algorithm
The mechanism to control file-pollution based on hybrid trust-model in P2P network
An improved combination feature selection based on relieff and genetic algorithm
Survey on HMM based anomaly intrusion detection using system calls
Authentication in peer-to-peer network: Survey and research directions
Image retrieval based on improved MCD and EHD of MPEG-7
An initialization method for clustering high-dimensional data
A improved CF model base on normal distribution and Euclidean distance
Estimation of software projects effort based on function point
Reduction and dynamic discretization of multi-attribute based on rough set
An intrusion detection method based on outlier ensemble detection
Mobile agent system security mechanism for large scale network applications
Supervised feature selection for DoS detection problems using a new clustering criterion
Gabor representation based probabilistic subspace analysis for face recognition
An intrusion detection system based on the clustering ensemble
An outlier mining-based method for anomaly detection
Innovated precision grinding by exploiting grinding point movement in radial direction and forward backward feeding of wheel
Alerts information association analysis technology based on intrusion intention
一个群签名方案的安全性分析
计算机工程,1000-3428,2013-04-15.2个代理签名方案的安全性分析
厦门大学学报(自然科学版),0438-0479,2013-03-28.自适应高容量医学图像可逆数据隐藏算法
计算机应用,1001-9081,2012.基于银行数据仓库的元数据管理系统
计算机工程 ,1000-3428 ,2009.连续属性的频数监督断点离散化技术
计算机工程与应用 ,1002-8331 ,2009.一种新的蛋白质序列模式挖掘算法
计算机工程 ,1000-3428 ,2009.基于孤立点挖掘的入侵检测技术
计算机工程,1000-3428,2008-02-05.求解大规模0-1背包问题的主动进化遗传算法
计算机工程,1000-3428,2007-07-05.基于入侵意图的报警信息关联分析技术
计算机工程,1000-3428,2006-07-20.一种处理混合型属性的聚类算法在计算机取证中的应用
陕西科技大学学报(自然科学版),1000-5811,2010.一种基于融合孤立点挖掘的入侵检测技术
现代计算机(专业版) ,1007-1423 ,2009.一种基于聚类和关联规则修正的入侵检测技术
莆田学院学报 ,1672-4143 ,2009.一种基于BIRCH的异常检测技术
太原师范学院学报(自然科学版),1672-2027,2008-12-25.面向大规模网络应用的移动主体系统安全机制
电子科技大学学报,1001-0548,2007-12-20.基于二维直方图信息熵的图像检索方法
广西师范大学学报(自然科学版),1001-6600,2007-12-15.一种基于Gabor描述的概率子空间人脸识别方法
电子与信息学报,1009-5896,2007-03-30.