| 论文题目 | 第一作者 | 发表刊物 | 
| QR-3S: A High Payload QR code Secret Sharing System for Industrial Internet of Things in 6G Networks | 熊礼治 | IEEE Transactions on Industrial Informatics | 
| Graph classification algorithm based on graph structure embedding | 马廷淮 | EXPERT SYSTEMS WITH APPLICATIONS | 
| Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing | 许小龙 | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS | 
| Ensemble Learning based Meteorological Cloud Classification Meets Internet of Dependable and Controllable Things | 张敬林 | IEEE INTERNET OF THINGS JOURNAL | 
| A brain-computer interface system for smart home control based on single trial motor imagery EEG | 庄伟 | INTERNATIONAL JOURNAL OF SENSOR NETWORKS | 
| A Self-play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario | 荣欢 | IEEE Transactions on Knowledge and Data Engineering | 
| Identifying forged seal imprints using positive and unlabeled learning | 闫雷鸣 | Multimedia Tools and Applications | 
| Service Offloading with Deep Q-Network for Digital Twinning Empowered Internet of Vehicles in Edge Computing | 许小龙 | IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS | 
| Multiple source domain adaptation in micro-expression recognition | 张小瑞 | JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING | 
| Image splicing localization using residual image and residual-based fully convolutional network | 陈北京 | JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION | 
| A contactless sensing system for indoor fall recognition based on channel state information | 庄伟 | INTERNATIONAL JOURNAL OF SENSOR NETWORKSJournal of Sensor Networks | 
| A secure controlled quantum image steganography algorithm | 瞿治国 | QUANTUM INFORMATION PROCESSING | 
| Fuzzy-based Trustworthiness Evaluation Scheme for Privilege Management in Vehicular Ad Hoc Networks | 苗田田 | IEEE Transactions on Fuzzy SystemsIEEE Transactions on Fuzzy Systems | 
| A Secure Edge Monitoring Approach to Unsupervised Energy Disaggregation using Mean Shift Algorithm in Residential Buildings | 刘琦 | Computer Communications | 
| A partitioning approach to RFID identification | 苏健 | IEEE-ACM TRANSACTIONS ON NETWORKING | 
| Image Splicing Detection Based on Convolutional Neural Network with Weight Combination Strategy | 王金伟 | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS | 
| Low Rank Component Induced Spatial-spectral Kernel Method for Hyperspectral Image Classification | 孙乐 | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY | 
| A Sensory Similarities Approach to Load Disaggregation of Charging Stations in Internet of Electric Vehicles | 刘琦 | IEEE Sensors Journal | 
| A serial image copy-move forgery localization scheme with source/target distinguishment | 陈北京 | IEEE Transactions on Multimedia | 
| A novel coherence-based quantum steganalysis protocol | 瞿治国 | Quantum Information Processing | 
| Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks | 沈剑 | IEEE Transactions on Dependable and Secure Computing | 
| Capture-aware identification of mobile RFID tags with unreliable channels | 苏健 | IEEE Transactions on Mobile Computing | 
| Optimal discriminative feature and dictionary learning for image set classification | 张国庆 | Information Sciences | 
| Weighted Collaborative Sparse and L1/2 Low-Rank Regularizations With Superpixel Segmentation for Hyperspectral Unmixing | 孙乐 | IEEE Geoscience and Remote Sensing Letters | 
| Moment-Guided Discriminative Manifold Correlation Learning on Ordinal Data | 田青 | ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY | 
| Secure and Efficient Data Sharing in Dynamic Vehicular Networks | 沈剑 | IEEE INTERNET OF THINGS JOURNAL | 
| Intelligent Offloading for Collaborative Smart City Services in Edge Computing | 许小龙 | IEEE INTERNET OF THINGS JOURNAL | 
| Deep Residual Network with Adaptive Learning Framework for Fingerprint Liveness Detection | 袁程胜 | IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS | 
| Dynamic Resource Provisioning With Fault Tolerance for Data-Intensive Meteorological Workflows in Cloud | 许小龙 | IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS | 
| Privacy-aware offloading for training tasks of generative adversarial network in edge computing | 许小龙 | INFORMATION SCIENCES | 
| Blockchain-based trust establishment mechanism in the internet of multimedia things | 任勇军 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| JSNet: A simulation network of JPEG lossy compression and restoration for robust image watermarking against JPEG attack | 陈北京 | COMPUTER VISION AND IMAGE UNDERSTANDING | 
| Multiple clustering and selecting algorithms with combining strategy for selective clustering ensemble | 马廷淮 | SOFT COMPUTING | 
| Soft Tissue Deformation Model Based on Marquardt Algorithm and Enrichment Function | 张小瑞 | CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES | 
| Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates | 王金伟 | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY | 
| Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities | 沈剑 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 
| IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems | 沈剑 | IEEE TRANSACTIONS ON SERVICES COMPUTING | 
| Dynamically Spatiotemporal Regularized Correlation Tracking | 郑钰辉 | IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS | 
| A unitary operator construction solution based on Pauli group for maximal dense coding with a class of symmetric states | 刘文杰 | QUANTUM INFORMATION PROCESSING | 
| Multi-objective resource allocation in mobile edge computing using PAES for Internet of Things | 刘琦 | WIRELESS NETWORKS | 
| Content-centric Group User Authentication for Secure Social Networks | 沈剑 | IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING | 
| Improved collaborative filtering recommendation algorithm based on differential privacy protection | 尹春勇 | JOURNAL OF SUPERCOMPUTING | 
| Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems | 沈剑 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 
| Trust-Aware Service Offloading for Video Surveillance in Edge Computing Enabled Internet of Vehicles | 许小龙 | IEEE Transactions on Intelligent Transportation Systems | 
| Integrating SIFT and CNN Feature Matching for Partial-Duplicate Image Detection | 周志立 | IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE | 
| Exposing AI-generated videos with motion magnification | 费建伟 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| A (t, n) threshold quantum visual secret sharing | 刘文杰 | INTERNATIONAL JOURNAL OF SENSOR NETWORKS | 
| BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing | 许小龙 | IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS | 
| A time and energy saving based frame adjustment strategy (TES-FAS) tag identification algorithm for UHF RFID systems | 苏健 | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | 
| Trust-Oriented IoT Service Placement for Smart Cities in Edge Computing | 许小龙 | IEEE INTERNET OF THINGS JOURNAL | 
| Anonymous data collection scheme for cloud-aided mobile edge networks | 王安喜 | DIGITAL COMMUNICATIONS AND NETWORKS | 
| Quantum identity authentication protocol based on three-photon quantum error avoidance code in edge computing | 瞿治国 | Transactions on emerging telecommunications technologies | 
| Edge Server Quantification and Placement for Offloading Social Media Services in Industrial Cognitive IoV | 许小龙 | IEEE Transactions on Industrial Informatics | 
| Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain | 许小龙 | ACM Transactions on Internet Technology | 
| LGIEM: Global and local node influence based community detection | 马廷淮 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 
| Energy-Efficient Virtual Machine Scheduling across Cloudlets in Wireless Metropolitan Area Networks | 许小龙 | MOBILE NETWORKS & APPLICATIONS | 
| Joint Optimization of Offloading Utility and Privacy for Edge Computing Enabled IoT | 许小龙 | IEEE INTERNET OF THINGS JOURNAL | 
| Optimal Discriminative Projection for Sparse Representation-based Classification via Bilevel Optimization | 张国庆 | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY | 
| Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing | 沈剑 | IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING | 
| Near-duplicate Image Detection System Using Coarse-to-Fine Matching Scheme based on Global and Local CNN Features | 周志立 | Mathematics | 
| Application of gravity passive aided strapdown inertial navigation in underwater vehicles | 王其 | International Journal of SensorNetworks | 
| Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks | 许小龙 | MOBILE NETWORKS & APPLICATIONS | 
| From M-ary query to bit query: a new strategy for efficient large-scale RFID identification | 苏健 | IEEE Transactions on Communications | 
| Multi-objective computation offloading for Internet of Vehicles in cloud-edge computing | 许小龙 | WIRELESS NETWORKS | 
| Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing | 许小龙 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| Visual Tracking via Auto-Encoder Pair Correlation Filter | 程旭 | IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS | 
| A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection | 夏志华 | IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 
| A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems | 许小龙 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 
| Adaptive Computation Offloading With Edge for 5G-Envisioned Internet of Connected Vehicles | 许小龙 | IEEE Transactions on Intelligent Transportation Systems | 
| DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication | 熊礼治 | Signal Processing | 
| A Convex Discriminant Semantic Correlation Analysis for Cross-View Recognition | 田青 | IEEE Transactions on Cybernetics | 
| Weighted Nonlocal Low-Rank Tensor Decomposition Method for Sparse Unmixing of Hyperspectral Images | 孙乐 | IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING | 
| B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs | 王晨 | IEEE Transactions on Emerging Topics in Computing | 
| Structure-Exploiting Discriminative Ordinal Multioutput Regression | 田青 | IEEE Transactions on Neural Networks and Learning Systems | 
| Self-adaptive parameter and strategy based particle swarm optimization for large-scale feature selection problems with multiple classifiers | 薛羽 | APPLIED SOFT COMPUTING | 
| Frame-level Bit Allocation Optimization Based on Video Content Characteristics for HEVC | 潘兆庆 | ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS | 
| A group-based binary splitting algorithm for UHF RFID anti-collision systems | 苏健 | IEEE Transactions on Communications | 
| Introduction to the special issue on deep learning for real-time information hiding and forensics | 周志立 | JOURNAL OF REAL-TIME IMAGE PROCESSING | 
| Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection | 袁程胜 | JOURNAL OF REAL-TIME IMAGE PROCESSING | 
| Dynamic resource provisioning for workflow scheduling under uncertainty in edge computing environment | 许小龙 | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 
| Security and Privacy Issues of UAV: A Survey | 支悦言 | MOBILE NETWORKS & APPLICATIONS | 
| Confusing-Keyword Based Secure Search over Encrypted Cloud Data | 付章杰 | MOBILE NETWORKS & APPLICATIONS | 
| Motion and disparity vectors early determination for texture video in 3D-HEVC | 潘兆庆 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| Cost-sensitive joint feature and dictionary learning for face recognition | 张国庆 | Neurocomputing | 
| Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security | 刘登志 | Multimedia Tools and Applications | 
| Continuous-variable quantum network coding protocol based on butterfly network model | 瞿治国 | INTERNATIONAL JOURNAL OF SENSOR NETWORKS | 
| Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs | 沈剑 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY | 
| Multi-Task Deep Dual Correlation Filters for Visual Tracking | 郑钰辉 | IEEE TRANSACTIONS ON IMAGE PROCESSING | 
| Multitask Multisource Deep Correlation Filter for Remote Sensing Data Fusion | 程旭 | IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING | 
| Efficient In-Loop Filtering Based on Enhanced Deep Convolutional Neural Networks for HEVC | 潘兆庆 | IEEE TRANSACTIONS ON IMAGE PROCESSING | 
| A Novel Cubic Convolutional Neural Network for Hyperspectral Image Classification | 王金伟 | IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING | 
| Physical-Layer Security in Space Information Networks: A Survey | 李斌 | IEEE INTERNET OF THINGS JOURNAL | 
| Region-level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search | 周志立 | ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS | 
| A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things | 夏志华 | IEEE Transactions on Industrial Informatics | 
| A novel node selection scheme for energy-efficient cooperative spectrum sensing using D-S theory | 金子龙 | WIRELESS NETWORKS | 
| Secure big data communication for energy efficient intra-cluster in WSNs | 王安喜 | INFORMATION SCIENCES | 
| Relationships Self-Learning Based Gender-Aware Age Estimation | 田青 | NEURAL PROCESSING LETTERS | 
| CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad hoc Networks | 沈剑 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY | 
| Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks | 王晨 | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 
| Spatiotemporal Fusion of Satellite Images via Very Deep Convolutional Networks | 郑钰辉 | REMOTE SENSING | 
| Domain adaptive collaborative representation based classification | 张国庆 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing | 沈剑 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 
| Secure multimedia distribution in cloud computing using re-encryption and fingerprinting | 熊礼治 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| DOG: A new background removal for object recognition from images | 方巍 | NEUROCOMPUTING | 
| Ensemble interpolation of missing wind turbine nacelle wind speed data in wind farms based on robust particle swarm optimized generalized regression neural network | 杜杰 | International Journal of Green Energy | 
| Efficient inexact proximal gradient algorithms for structured sparsity-inducing norm | 顾彬 | NEURAL NETWORKS | 
| Self-Adaptive Particle Swarm Optimization for Large-Scale Feature Selection in Classification | 薛羽 | ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA | 
| Spatially Regularized Structural Support Vector Machine for Robust Visual Tracking | 郑钰辉 | IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS | 
| Quantum Privacy-Preserving Price E-Negotiation | 刘文杰 | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS | 
| A blockchain‐based computation offloading method for edge computing in 5G networks | 许小龙 | SOFTWARE-PRACTICE & EXPERIENCE | 
| Multi-Kernel Coupled Projections for Domain Adaptive Dictionary Learning | 郑钰辉 | IEEE TRANSACTIONS ON MULTIMEDIA | 
| Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain | 王金伟 | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY | 
| Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data | 付章杰 | IEEE TRANSACTIONS ON SERVICES COMPUTING | 
| A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system | 刘业鹏 | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS | 
| Text coverless information hiding based on compound and selection of words | 陈先意 | SOFT COMPUTING | 
| Multiobjective computation offloading for workflow management in cloudlet-based mobile cloud using NSGA-II | 许小龙 | COMPUTATIONAL INTELLIGENCE | 
| Color image-spliced localization based on quaternion principal component analysis and quaternion skewness | 王金伟 | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS | 
| Multilevel Model for Video Object Segmentation Based on Supervision Optimization | 陈亚当 | IEEE TRANSACTIONS ON MULTIMEDIA | 
| Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion | 熊礼治 | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS | 
| InfMatch: Finding isomorphism subgraph on a big target graph based on the importance of vertex | 马廷淮 | PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS | 
| Intelligent agent-based region division scheme for mobile sensor networks | 沈剑 | SOFT COMPUTING | 
| Difference co-occurrence matrix using BP neural network for fingerprint liveness detection | 袁程胜 | SOFT COMPUTING | 
| A Novel Sentiment Polarity Detection Framework for Chinese | 马廷淮 | IEEE Transactions on Affective Computing | 
| An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles | 许小龙 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 
| Coverless image steganography using partial-duplicate image retrieval | 周志立 | SOFT COMPUTING | 
| Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing | 沈剑 | PEER-TO-PEER NETWORKING AND APPLICATIONS | 
| Design of human activity recognition algorithms based on a single wearable IMU sensor | 庄伟 | INTERNATIONAL JOURNAL OF SENSOR NETWORKS | 
| BOEW: A Content-based Image Retrieval Scheme using Bag-of-Encrypted-Words in Cloud Computing | 夏志华 | IEEE Transactions on Services Computing | 
| Multiple Distances-based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search. | 周志立 | IEEE Transactions on big data | 
| Strategies for data stream mining method applied in anomaly detection | 孙汝霞 | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 
| Appearance-consistent Video Object Segmentation Based on a Multinomial Event Model | 陈亚当 | ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS | 
| ENERGY EFFICIENT TAG IDENTIFICATION ALGORITHMS FOR RFID: SURVEY, MOTIVATION AND NEW DESIGN | 苏健 | IEEE WIRELESS COMMUNICATIONS | 
| Adjacent Superpixel-Based Multiscale Spatial-Spectral Kernel for Hyperspectral Classification | 孙乐 | IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING | 
| A computation offloading method over big data for IoT-enabled cloud-edge computing | 许小龙 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 
| An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks | 许小龙 | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | 
| A framework of cloud service selection with criteria interactions | 孙乐1 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 
| Multi-model Ensemble Forecast of PM2.5 Concentration Based on the Improved Wavelet Neural Networks | 李涛 | JOURNAL OF IMAGING SCIENCE AND TECHNOLOGY | 
| CSDA: a novel cluster-based secure data aggregation scheme for WSNs | 方巍 | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 
| An influence diagram based cloud service selection approach in dynamic cloud marketplaces | 孙乐1 | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 
| Fractional quaternion cosine transform and its application in color image copy-move forgery detection | 陈北京 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| 3D PEE mapping based reversible data hiding for color images | 徐萌 | Multimedia Tools and Applications | 
| A novel quantum image steganography algorithm based on exploiting modification direction | 瞿治国 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| Reversible data hiding scheme in multiple encrypted images based on code division multiplexing | 陈先意 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| Fast Splitting-Based Tag Identification Algorithm For Anti-Collision in UHF RFID System | 苏健 | IEEE TRANSACTIONS ON COMMUNICATIONS | 
| Accelerating Sequential Minimal Optimization via Stochastic Subgradient Descent | 顾彬 | IEEE Transactions on Cybernetics | 
| A new method estimating linear gaussian filter kernel by image PRNU noise | 王金伟 | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS | 
| Discrimination of Computer Generated and Photographic Images Based on CQWT Quaternion Markov Features | 王金伟 | IINTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE | 
| Low-Complexity Non-Intrusive Load Monitoring Using Unsupervised Learning and Generalized Appliance Models | 刘琦 | IEEE Transactions on Consumer Electronics | 
| 基于比特查询的多进制树标签防碰撞识别协议 | 苏健 | 电子学报 | 
| Secure Emergent Data Protection Scheme for a Space-Terrestrial Integrated Network | 沈剑 | IEEE NETWORK | 
| Writing in the Air with WiFi Signals for Virtual Reality Devices | 付章杰 | IEEE TRANSACTIONS ON MOBILE COMPUTING | 
| A comprehensive search for expert classification methods in disease diagnosis and prediction | Sunil Jha | EXPERT SYSTEMS | 
| A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment | 任勇军 | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 
| Anomaly detection model based on data stream clustering | 尹春勇 | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 
| Natural disaster topic extraction in Sina microblogging based on graph analysis | 马廷淮 | EXPERT SYSTEMS WITH APPLICATIONS | 
| DSM: a dynamic scheduling method for concurrent workflows in cloud environment | 薛胜军 | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 
| An IoT-Oriented data placement method with privacy preservation in cloud environment | 许小龙 | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | 
| Hyperspectral Mixed Denoising via Spectral Difference-Induced Total Variation and Low-Rank Approximation | 孙乐 | REMOTE SENSING | 
| Friends Classification of Ego Network Based on Combined Features | 贾静 | INTELLIGENT AUTOMATION AND SOFT COMPUTING | 
| Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption | 陈北京 | IET IMAGE PROCESSING | 
| A certificateless signcryption scheme for smart home networks | 季赛 | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 
| Artificial Intelligence Inspired Multi-Dimensional Traffic Control for Heterogeneous Networks | 沈剑 | IEEE NETWORK | 
| Robust ordinal regression induced by lp-centroid | 田青 | NEUROCOMPUTING | 
| Chunk Incremental Learning for Cost-Sensitive Hinge Loss Support Vector Machine | 顾彬 | PATTERN RECOGNITION | 
| High Efficient and Robust Quantum Watermarking Algorithm Based on Quantum Log-polar Images and Matrix Coding | 瞿治国 | JOURNAL OF INTERNET TECHNOLOGY | 
| Selection of regularization parameter in GMM based image denoising method | 郑钰辉 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| Few-shot learning for short text classification | 闫雷鸣 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| Feature selection using forest optimization algorithm based on contribution degree | 马廷淮 | INTELLIGENT DATA ANALYSIS | 
| The effect of quantum noise on two different deterministic remote state preparation of an arbitrary three-particle state protocols | 孙乐1 | Quantum Information Processing | 
| Quantum Relief algorithm | 刘文杰 | Quantum Information Processing | 
| Student's t-Hidden Markov Model for Unsupervised Learning Using Localized Feature Selection | 郑钰辉 | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY | 
| Semantic Aware Searching over Encrypted Data for Cloud Computing | 付章杰 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 
| Location Privacy Protection Research Based on Querying Anonymous Region Construction for Smart Campus | 孙汝霞 | Mobile Information Systems | 
| Ordinal space projection learning via neighbor classes representation | 田青 | COMPUTER VISION AND IMAGE UNDERSTANDING | 
| A Solution Path Algorithm for General Parametric Quadratic Programming Problem | 顾彬 | IEEE Transactions on Neural Networks and Learning Systems | 
| A Self-adaptive Artificial Bee Colony Algorithm with Symmetry Initialization | 薛羽 | Journal of Internet Technology | 
| Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks | 任勇军 | Mobile Information Systems | 
| An incentive mechanism for crowdsourcing markets with social welfare maximization in cloud-edge computing | 许小龙 | Concurrency and Computation: Practice and Experience | 
| PSPLPA: Probability and similarity based Parallel label propagation algorithm on Spark | 马廷淮 | PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS | 
| Agricultural cyber physical system collaboration for greenhouse stress management | 郭萍 | COMPUTERS AND ELECTRONICS IN AGRICULTURE | 
| A Novel Latin-Square-Based Secre Sharing for M2M Communications | 沈剑 | IEEE Transactions on Industrial Informatics | 
| Quaternion discrete fractional random transform for color image adaptive watermarking | 陈北京 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things | 沈剑 | IEEE Internet of Things Journal | 
| Multi-objective particle swarm optimization algorithm based on objective space division for the unequal-area facility layout problem | 刘景发 | EXPERT SYSTEMS WITH APPLICATIONS | 
| Fuzzy-genetic approaches for estimation of microbial rock phosphate solubilization in sandy clay loam textured soil | Sunil Jha | COMPUTERS AND ELECTRONICS IN AGRICULTURE | 
| Secure data uploading scheme for a smart home system | 沈剑 | Information Sciences | 
| Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection | 夏志华 | Multimedia Tools and Applications | 
| An integer wavelet transform based scheme for reversible data hiding in encrypted images | 熊礼治 | Multidimensional Systems and Signal Processing | 
| A novel meteorological sensor data acquisition approach based on unmanned aerial vehicle | 李传龙 | INTERNATIONAL JOURNAL OF SENSOR NETWORKS | 
| Graph Classification Based on Graph Set Reconstruction and Graph Kernel Feature Reduction | 马廷淮 | NEUROCOMPUTING | 
| Implicit authentication protocol and self-healing key management for WBANs | 沈剑 | Multimedia Tools and Applications | 
| An Evolutionary Classification Method based on Fireworks Algorithm | 薛羽 | INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION | 
| Protection of location privacy for moving kNN queries in socialnetworks | 马廷淮 | Applied Soft Computing | 
| A self-adaptive artificial bee colony algorithm based on global best for global optimization | 薛羽 | Soft Computing | 
| A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data | 沈剑 | IEEE Transactions on Emerging Topics in Computing | 
| 一种时间高效的易于实现的多标签射频识别技术 | 苏健 | 电子学报 | 
| Anonymous and Traceable Group Data Sharing in Cloud Computing | 沈剑 | IEEE Transactions on Information Forensics and Security | 
| A novel subgraph -isomorphism method in social network based on graph similarity detection | 荣欢 | Soft Computing | 
| Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks | 沈剑 | Journal of Network and Computer Applications | 
| An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks | 谭畅 | JOURNAL OF SUPERCOMPUTING | 
| Compressive sampling and data fusion-based structural damage monitoring in wireless sensor network | 季赛 | JOURNAL OF SUPERCOMPUTING | 
| Efficient Frame-sequential Label Propagation for Video Object Segmentation | 陈亚当 | MULTIMEDIA TOOLS AND APPLICATIONS | 
| An intelligent agent‐based method for task allocation in competitive cloud environments | 孔燕 | Concurrency and Computation: Practice and Experience | 
| 带静不平衡约束的矩形装填问题的启发式算法 | 刘景发 | 软件学报 | 
| A regularization path algorithm for support vector ordinal regression | 顾彬 | Neural Networks | 
| Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing | 夏志华 | IEEE TRANSACTIONS ON CLOUD COMPUTING | 
| Joint gender classification and age estimation by nearly orthogonalizing their semantic spaces | 田青 | Image and Vision Computing | 
| A weighted collaboration network generalization method for privacy protection in C-DBLP | 马廷淮 | INTELLIGENT DATA ANALYSIS | 
| Adaptive Fractional-Pixel Motion Estimation Skipped Algorithm for Efficient HEVC Motion Estimation | 潘兆庆 | ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS | 
| Sparse regression with output correlation for cardiac ejection fraction estimation | 顾彬 | Information Sciences | 
| A lightweight multi-layer authentication protocol for wireless body area networks | 沈剑 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 
