一、近三年发表期刊论文

[1]第一作者及通讯作者论文

1)Yulin Wu, Xuan Wang, Zoe L. Jiang, etc. Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing, IEEE Transactions on Dependable and Secure Computing, 2020 (SCI, IF 6.404, JCR-Q1)

2)Zhengzhong Yi, Junbin Fang, Puxi Lin, Xiaojun Wen, Zoe Lin Jiang, Xuan Wang. Efficient Quantum Key Distribution Protocol Based on Classical-quantum Polarized Channels, Quantum Information Processing, 18(356), 1-24, 2019.10. (SCI, IF 2.222, JCR-Q1)

3)Fengwei Jia, Xuan Wang, Jian Guan, et.al.: Bi-Connect Net for salient object detection. Neurocomputing 384: 142-155 (2020) (SCI, IF 4.027, JCR-Q1)

4)Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zeo L. Jiang and Xuan Wang*,Key Based Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing,Future Generation Computer Systems, 2016.9, 62, pp. 40-50.

5)Shuhan Qi, Fanglin Wang, Xuan Wang*, Jia Wei, Hainan Zhao. Live multimedia brand-related data identification in microblog. Neurocomputing , SCI 2.089.

6)Shuhan Qi, Fanglin Wang, Xuan Wang* , Yue Guan, Jia Wei, Jian Guan Multiple level visual semantic fusion method for image re-ranking. Multimedia Systems Journal, SCI 2.207 CCF C类.

7)Hainan Zhao, XuanWang*. Robust Visual Tracking via Discriminative Appearance Model based on Sparse Coding, Multimedia Systems Journal, SCI 2.207 CCF C类.

8)Jiangtao Zhang, Hejiao Huang, Xuan Wang*. Resource Provision Algorithms in Cloud Computing: A Survey,Journal of Network and Computer Applications, SCI 2.229.

9)Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Xuan Wang*, Chonglin gu, Zhixiang He , A unified algorithm for virtual desktops placement in distributed cloud computing Mathematical Problems in Engineering.SCI 0.762.

10)Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zeo L. Jiang and Xuan Wang* .Key Based Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing, Future Generation Computer Systems, SCI, 2.786.

11)Jian Guan, Xuan Wang*, Pengming Feng, Jing Dong, Jonathon Chambers, Zoe L. Jiang, and Wenwu Wang. Polynomial Dictionary Learning Algorithms in Sparse Representations, Signal Processing. SCI 3.11.

12)Shuhan Qi, Peiguang Jing, Xuan Wang*, Liqiang Nie Quality biased multimedia data retrieval in microblogs Journal of Visual Communication ans Image Representation, SCI 1.51.

13)Shuhan Qi, Xuan Wang*,Xi Zhang, Xuemeng Song, Zoe L.Jiang Scalable Graph Based Non-negative Multi-view Embedding for Image Ranking , Neurocomputing , SCI 3.317.

14)Jian Guan, Xuan Wang*, Wenwu Wang, and Lei Huang Sparse Blind Speech Deconvolution with Dynamic Range Regularization and Indicator FunctionCircuits, Systems and Signal Processing. SCI 1.694.

15)ZAisha Sikandar, Waqas Anwar, Usama Ijaz Bajwa, Xuan Wang*, Misba Sikandar, Lin Yao, Zoe L. Jiang, Chunkai Zhang. Decision Tree Based Approaches for Detecting Protein Complex in Protein Interaction Network (PPI) via Link and Sequence Analysis.IEEE Access, 2018, SCI 3.44.

16)Zoe L. Jiang, Ruoqing Zhang, Zechao Liu, S.M. Yiu, Lucas C.K. Hui, Xuan Wang*, Junbin Fang A Revocable Outsourcing Attribute-based Encryption Scheme "SPNCE2016 Mobile Networks and Applications (Special issue). SCI 1.538.

[2]其他

1)Qing Liao, Ye Ding, Lin Jiang, Xuan Wang, Chunkai Zhang, Qian Zhang Multi-task Deep Convolutional Neural Network for Cancer Diagnosis, Neurocomputing, 2018, 3.317.

2)Chunkai Zhang, Panbo Tian, Xudong Zhang, Zoe L Jiang, Lin Yao, Xuan Wang, Fast Eclat algorithms based on minwise hashing for large scale transactions, IEEE Internet of Things Journal, 5.863,2018.

3)Chunkai Zhang, Panbo Tian, Xudong Zhang, Liao Qing, Zoe L Jiang,Xuan Wang, HashEclat: An efficient frequent itemset algorithm, International Journal of Machine Learning and Cybernetics(JMLC), 2.692,2018.

4)Tao Chen , Ruifeng Xu , Yulan He , Xuan Wang, Improving Sentiment Analysis via Sentence Type Classification using BiLSTM-CRF and CNN,Expert Systems with Applications, ?Expert Systems with Applications · November 2016?with?51 ReadsDOI: 10.1016/j.eswa.2016.10.065.

5)J Zhang,Xuan Wang,H Huang,S Chen ,Clustering based virtual machines placement in distributed cloud computing, Future Generation Computer Systems, 2017, 66:1-10.

6)Jiangtao Zhang, Hejiao Huang, Xuan Wang, Resource Provision Algorithms in Cloud Computing: A Survey, Journal of Network and Computer Applications, 2016, 64:23-42.

2.近三年发表会议论文

1)Jian Guan, Xuan Wang*, Zongxia Xie,Shuhan Qi, and Wenwu Wang Joint l1-l2 Regularisation for Blind Speech Deconvolution. The 2017 Pacific-Rim Conference on Multimedia (PCM 2017), EI, CCF C类.

2)Jian Guan, Xuan Wang*, Shuhan Qi, Jing Dong, and Wenwu Wang, Blind Speech Deconvolution via Pretrained Polynomial Dictionary and Sparse Representation, The 2017 Pacific-Rim Conference on Multimedia (PCM 2017), EI, CCF C类.

3)Jian Guan, Xuan Wang*,Pengming Feng, Jing Dong, and Wenwu WangMatrix of Polynomials Model based Polynomial Dictionary Learning Method INTERSPEECH 2017 EI CCF C类.

4)Ye Li, Zoe L. Jiang*, Xuan Wang, S.M. Yiu, Privacy-preserving C4.5 over arbitrarily partitioned data, IEEE International Conference on Data Science in Cyberspace (IEEE DSC 2017) EI.

5)Zechao Liu, Zoe L. Jiang*, Xuan Wang, S.M. Yiu, Chunkai Zhang and Xiaomeng Zhao Dynamic Attribute-Based Access Control in Cloud Storage Systems, the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), EI CCF C类.

6)Shuhan Qi, Kyaw Zawlin, Hanwang Zhang, Xuan Wang, Ke Gao, Lin Yao, Tat-Seng Chua Saliency meets spatial quantization: A practical framework for large scale product search 2016 IEEE International Conference on Multimedia and Expo Workshops (ICMEW2016), EI CCF B.

7)Jian Guan, Xuan Wang*, Wenwu Wang, and Zongxia Xie, Blind Deconvolution for Sparse Acoustic System, 11th IMA International Conference on Mathematics in Signal Processing.

8)Xiaoyan Liu, Zoe L. Jiang, S.M. Yiu, Xuan Wang*, Chuting Tan, Ye Li, Zechao Liu, Yabin Jin, Junbin Fang, Outsourcing Two-party Privacy Preserving K-means Clustering Protocol In Wireless Sensor Networks. The 11th International Conference on Mobile Ad-hoc and Sensor Networks (IEEE MSN2015) CCF C类.

9)Yuechen Chen, Zoe L. Jiang(co-corresponding author), S.M. Yiu, M.H. Au, and Xuan Wang, Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator the 2014 International Conference on Information and Communications Security (ICICS2014) EI CCF C类.

10)Ye Li, Zoe L. Jiang, Xuan Wang*, Zechao Liu, Meng Liu, Yabin Jin, S.M. Yiu, and Lucas C.K. Hui Outsourcing privacy-preserving ID3 decision tree over horizontal partitioned data for multiple parties, The 11th International Conference on Green, Pervasive and Cloud Computing(GPC-2016).

11)Jiangtao Zhang, Zhixiang He, Hejiao Huang, Xuan Wang*, Chonglin Gu and Lingmin Zhang SLA Aware Cost Efficient Virtual Machines Placement in Cloud Computing,33rd IEEE International Performance Computing and Communications Conference. EI CCF C类.

12)Jiangtao Zhang, Shi Chen, Hejiao Huang, Xuan Wang* and Dingzhu Du,Dynamic resource provision for cloud broker with multiple reserved instance terms, 15th International Conference on Algorithms and Architectures for Parallel Processing. EI CCF C类.

13)Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zeo L. Jiang and Xuan Wang* :Key based reducer placement for data analytics across data centers considering bi-level resource provision in cloud computing.International Conference on Internet of Things and Big Data. EI.

14)Chuting Tan, Zoe L. Jiang, Xuan Wang, S.M. Yiu, Junbin Fang, Jin Li, Yabin Jin, Jiajun Huang Generic construction of publicly verifiable predicate encryption The 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016) CCF C类.

15)Jian Guan, Jing Dong, Xuan Wang*, and Wenwu Wang A Polynomial Dictionary Learning Method for Acoustic Impulse Response Modeling. The 12th International Conference on Latent Variable Analysis and Signal Separation (LVA/ICA 2015) INSPEC/ EI.

16)Yulin Wu, Zoe L. Jiang, Xuan Wang*, S.M. Yiu and Peng Zhang Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage The 20th IEEE International Conference on Computational Science and Engineering (CSE-2017) EI .

17)Yi Liu, Xuan Wang*, Shuhan Qi, Jian Guan, Fengwei Jia, Lin Yao Pixel meets regions: A Pratical Framework for Saliant Object Detection.IEEE International Conference on Multimedia and Expo 2018 EI CCF B.

18)Quan Zhou,Shuhan Qi,Xuan Wang*,Jian Guan, Fengwei Jia, Lin Yao.BALANCE THE LOSS: IMPROVING DEEP HASH VIA LOSS WEIGHTING AND SEMANTIC PRESERVING IEEE International Conference on Multimedia and Expo 2018. EI CCF B.

19)Zechao Liu, Zoe L. Jiang, Xuan Wang*, Siu-Ming Yiu Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating, Journal of Network and Computer Applications (JNCA).SCI 3.991,CCF C类.

20)Zechao Liu, Zoe L Jiang, Xuan Wang*, SM Yiu, Ruoqing Zhang, Yulin Wu.A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-2018). EI CCF C类.

21)Zechao Liu, Xuan Wang*, Lei Cui, Zoe L Jiang, Chunkai Zhang.White-box traceable dynamic attribute based encryption 2017 International Conference on Security , Pattern Analysis, and Cybernetics (SPAC) EI.

22)Zechao Liu, Zoe L Jiang, Xuan Wang*, Yulin Wu, SM Yiu Multi-Authority Ciphertext Policy Attribute-Based.

23)Yulin Wu, Xuan Wang*, Zoe L. Jiang, Xuan Li, Jin Li, S.M. Yiu, Zechao Liu, Hainan Zhao, and Chunkai Zhang.Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-duplicate Image Data Detection.The 18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2018) EI.

24)Qian Chen, Zoe L. Jiang, Junbin Fang, Siuming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang* Lucas C.K. Hui File Fragment Classification Using Grayscale Images and Deeplearning in Digital Forensics the International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE18), San Francisco, California, USA, May 24, 2018. EI.

25)Qing Liao, Lin Jiang, Xuan Wang, Chunkai Zhang, Ye Ding Cancer Classification with Multi-task Deep Learning. IEEE International Conference on Security, Pattern Analysis, and Cybernetics (ICSPAC), 2017.

26)Chunkai Zhang, Jianwei Guo, Changqing Qi, Zoe L Jiang, Qing Liao, Lin Yao, Xuan Wang, EHSBoost: Enhancing ensembles for imbalanced data-sets by evolutionary hybrid-sampling 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).

27)Chunkai Zhang, Xudong Zhang, Zoe L Jiang, Qing Liao, Lin Yao, Xuan Wang.MINING INTER-TRANSACTION ASSOCIATION RULES FROM MULTIPLE TIME-SERIES DATA, 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).

28)Chunkai Zhang, Guoquan Wang, Zhou Ying, Zoe L Jiang, Feature Selection For High Demensional Imbalanced Class Data Based on F-Measure Optimization, 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).

29)Chunkai zhang, ao yin, yulin wu, yingyang chen, Xuan Wang fast time series discords detection with privacy preserving. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications(TrustCom) . CCF C类.

30)Chunkai Zhang, Ao Yin, Yepeng Deng, Panbo Tian, Xuan Wang, Lifeng Dong. a novel anomaly detection algorithm based on trident tree 2018 CLOUD Application and Industry Track. CCF C类.

31)Ao Yin, Chunkai Zhang, Zoe L. Jiang, Yulin Wu, Xing Zhang Keli Zhang, and Xuan Wang, PPLDEM: A Fast Anomaly Detection Algorithm With Privacy Preserving , International Conference on Algorithms and Architectures for Parallel Processing. CCF C类

哈尔滨工业大学计算机科学与技术学院许博文,王轩-哈尔滨工业大学(深圳)计算机科学与技术学院...相关推荐

  1. 知识图谱构建技术一览 #CSDN博文精选# #高效学习法# #系统化学习# #IT技术学习#

    大家好~我是小C,又见面啦!"文章过滤器"精选大咖干货.助力学习之路. <5天20篇CSDN精选博文带你掌握系统化学习方法>专栏将挑选有关"系统化学习方法&q ...

  2. 浙江工业大学计算机学院推免生,浙江工业大学2017年计算机科学与技术学院拟接收推免生名单...

    浙江工业大学2016和2017年研究生招生信息 浙江工业大学2017年计算机科学与技术学院拟接收推免生名单张宇翔男计算机科学与技术学院计算机科学与技术王曾媛女计算机科学与技术学院计算机科学与技术吴俊威 ...

  3. 上海科技大学计算机科学与技术录取分数线,这所新高水平大学2021年全国招生300人,设5个专业!分数线如何?...

    2021年,中国科学院将南下深圳,扩大办学规模,这所新设立的高校,就是中国科学院深圳理工大学. 据了解,中国科学院深圳理工大学将于2021年开始招生,第一年招生人数为300人,分设五个专业.这五个专业 ...

  4. 美国计算机科学本科录取人数,卡内基梅隆大学2020新生数据出炉!计算机学院录取率堪比藤校...

    原标题:卡内基梅隆大学2020新生数据出炉!计算机学院录取率堪比藤校 提起CMU,想必各位小伙伴肯定都不陌生,坐落在美国宾夕法尼亚州匹兹堡的它,可是美国25所新常春藤盟校之一.最近卡内基梅隆大学202 ...

  5. 武汉理工大学计算机学院教授,饶文碧:武汉理工大学计算机科学与技术学院教授...

    饶文碧,武汉理工大学计算机科学与技术学院博士.教授,1.1992.03-1998.09武汉工业大学计算机系讲师2.1998.10-2000.03武汉工业大学信息工程学院副教授3.2000.04-200 ...

  6. 湖北省计算机科学与技术排名,湖北省排名前十的大学:湖北最有实力的大学

    输入分数,查能上的大学 选择科目 测一测我能上哪些大学 高考成绩分析报告 选择科目 领取你的专属报告 > 选择省份 关闭 请选择科目 确定 v> 湖北作为高考报名人数排名前十五的省份,高考 ...

  7. 计算机学院在武汉大学,中国最美大学—武汉大学

    嗨,朋友们,我是秋风学姐(一名山大在读研究生),上期给大家分享了山东大学,这期给大家分享最美武大的考研分析,我真的好喜欢武汉这个城市呀,有没有小伴伴是武汉大学的,举个爪,让学姐羡慕一下. 学校简介: ...

  8. 卡耐基梅隆大学计算机工程录取率,热点:卡内基梅隆大学爆出2020年新生数据,计算机学院录取率堪比藤校...

    原标题:热点:卡内基梅隆大学爆出2020年新生数据,计算机学院录取率堪比藤校 卡内基梅隆大学(Carnegie Mellon University),简称CMU,坐落在美国宾夕法尼亚州的匹兹堡,美国2 ...

  9. 计算机科学与技术论文选题怎么选,比较好写的计算机科学与技术专业论文选题 计算机科学与技术专业论文题目如何取...

    [100道]关于比较好写的计算机科学与技术专业论文选题汇总,作为大学生的毕业生应该明白了计算机科学与技术专业论文题目如何取,选一个好的题目后续的计算机科学与技术专业论文写作起来会更轻松! 一.比较好写 ...

  10. 西安邮电大学计算机学院研究生分数,2020西安邮电大学考研复试分数线已公布...

    院校考研复试分数线是判别该考生能否进入院校重要评判标准,了解分数线是考研过程中的第一步,以便于给自己制定一个要求.点击查看-2020西安邮电大学考研复试分数线~~ 西安邮电大学2020年硕士研究生招生 ...

最新文章

  1. iOS使用自签名证书实现HTTPS请求
  2. 重新考虑数据中心的冷却方案—水冷却或将再次兴起
  3. zookeeper实现动态获取服务器列表代码示例(服务上下线监听/动态更新服务列表)
  4. Cesium中常用的一些地理数据文件 以及数据相关的东西
  5. 《掌握需求过程》阅读笔记三
  6. C++ 类型转换操作与操作符重载 operator type() 与 type operator()
  7. Twitter群推王:推特全方位营销利器
  8. android触屏对焦_Android摄像头自动对焦与触摸对焦实现
  9. zmud中的ansi颜色使用
  10. css3中-moz、-ms、-webkit、-o 各是什么意思
  11. Python数据类型(一)数字类型
  12. 【移动端】屏幕、像素、视口、 viewport 控制
  13. R语言计算多变量两两之间的相关关系及显著性
  14. 【ChatGPT机器人】打造你的私人聊天助手
  15. java毕业设计葡萄酒销售管理系统mybatis+源码+调试部署+系统+数据库+lw
  16. RabbitMQ 面试题目整理
  17. Cannot add property xxx, object is not extensible
  18. 一款MS SQL查询分析工具(1.3M)
  19. iOS字体号数与像素对应关系
  20. selenium模拟登录淘宝

热门文章

  1. json parser类的使用
  2. Win10系统 Python解释器:anaconda的安装
  3. 怎么实现类似星星闪烁的效果(box-shadow)
  4. 蓝本(blueprint)
  5. 【离散数学】平凡子群
  6. 笔记本电脑一直卡在logo界面重启转圈,进U盘PE黑屏
  7. 生信:2:sam格式文件解读
  8. eclipse vail_在Windows Home Server“ Vail”上安装Microsoft Security Essentials 2.0 Beta
  9. 初创公司需要哪些部门_哪些初创公司在安全方面犯了错误
  10. CTGU实验5_1-创建还书过程中的触发器