在Information Sciences、IEEE Transactions on Neural Networks and Learning Systems、IEEE Transactions on Vehicular Technology、IEEE Network等国际学术刊物发表了一批学术论文。近5年来的部分论文列表如下:
[1]DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive. IEEE Transactions on Dependable and Secure Computing, 18(5): 2438-2455 (2021)
[2]Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System. IEEE Transactions on Industrial Informatics 17(11): 7618-7627 (2021)
[3]Multi-View Gait Image Generation for Cross-View Gait Recognition. IEEE Transactions on Image Processing, vol. 30, pp 3041-3055 (2021)
[4]Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances. IEEE Transactions on Information Theory 67(5): 2786-2792 (2021)
[5]Orthogonal Least Squares Detector for Generalized Spatial Modulation. IEEE Transactions on Wireless Communications 20(8): 5071-5082 (2021)
[6]Effects of Different Proximity-Based Feedback on Virtual Hand Pointing in Virtual Reality. CGI 2021: 608-620
[7]Incorporating Global Context into Multi-task Learning for Session-Based Recommendation. KSEM 2021: 627-638
[8]Sample Balancing for Deep Learning-Based Visual Recognition. IEEE Transactions on Neural Networks and Learning Systems 31(10): 3962-3976 (2020)
[9]Peripheral-free Device Pairing by Randomly Switching Power. CoRR abs/2002.11288 (2020)
[10]DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks. CoRR abs/2005.08016 (2020)
[11]A hybrid universal blind quantum computation. Information Sciences 498: 135-143 (2019)
[12]Novel Properties of Successive Minima and Their Applications to 5G Tactile Internet. IEEE Transactions on Industrial Informatics 15(5): 3068-3076 (2019)
[13]BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET. IEEE Transactions on Vehicular Technology, 68(1): 822-831 (2019)
[14]Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications. CoRR abs/1909.03367 (2019)
[15]Long Optimal or Small-Defect LRC Codes with Unbounded Minimum Distances. CoRR abs/1910.07267 (2019)
[16]Fully distributed certificateless threshold signature without random oracles. Science China Information Sciences, 61(9): 098101:1-098101:3 (2018)
[17]REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks.IEEE Network, 32(5): 118-123 (2018)
[18]Single-server blind quantum computation with quantum circuit model. Quantum Information Processing 17(6): 134 (2018)
[19]Multiple-Task Learning and Knowledge Transfer Using Generative Adversarial Capsule Nets. Australasian Conference on Artificial Intelligence 2018: 669-680
[20] Machine Learning-Based Malicious Application Detection of Android. IEEE Access 5: 25591-25601 (2017)
[21]Indistinguishability of pure orthogonal product states by LOCC. Quantum Information Processing, 16(7): 168 (2017)
[22]Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. Security and Communication Networks, 2017: 5704865:1-5704865:8 (2017)