近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
1.已发表专业相关论文40余篇,以下是部分论文列表:
[1]WeishanZhang,WuwuGuo,XinLiu*,YanLiu(Member,IEEE),JiehanZhou,BoLi,QinghuaLu,SuYang.LSTM-BasedAnalysisofIndustrialIoTEquipment(SCI),2018
[2]ZhangW,LvH,XuL,etal.AnOnline-OfflineCombinedBigDataMiningPlatform[C]//AnOnline-OfflineCombinedBigDataMiningPlatform.IEEEComputerSociety,2017.
[3]XinLiu,XiaomiaoZhang,WeishanZhang,WeiWei,YongjunZhao,YongkeXi,ShuaiCao.DataminingfromHaierair-conditionerequipmentrunningdataforfaultprediction,2018IEEESmartWorld,UbiquitousIntelligence&Computing,Advanced&TrustedComputing,ScalableComputing&Communications,Cloud&BigDataComputing,InternetofPeopleandSmartCityInnovations,2018.10.8-10.12,Guangzhou,China(SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI2018)
[4]XinLiu,XiaomiaoZhang,YiwenWang,JiehanZhou,SumiHelal,ZhidongXu,WeishanZhang,ShuaiCao.PARMTRD:ParallelAssociationRulesBasedMultiple-TopicRelationshipsDetection.ICWS2018:422-436,2018.6.25-6.30,Seattle,USA
[5]王奕文,刘昕*,田红磊、曹帅.基于并行关联规则的话题演化跟踪方法,计算机工程与设计,2019(4)
[6]王奕文,刘昕,曹帅,王丰.基于关联规则的热点事件时序分析方法,计算机与现代化,2018(8)
[7]XinLiu,PingjunZou,WeishanZhang,JiehanZhou,ChangyingDai,FengWang,XiaomiaoZhang.CPSFS:ACrediblePersonalizedSpamFilteringSchemebyCrowdsourcing,WirelessCommunicationsandMobileComputing,vol.2017,ArticleID1457870,9pages,2017.doi:10.1155/2017/1457870.
[8]XinLiu,FengWang,SumiHelal,ZhongweiLi,JiehanZhou,WeishanZhang,ShuaiCao,TopicdetectionBasedonSimilarNetworks,2017IEEE
InternationalConferenceonSystems,Man,andCybernetics(SMC),Banff,Canada,Oct.4-Oct.8
[9]XinLiu*,FengWang,YangYang,JiuyunXu,PingjunZouandYiwenWang.DefenseagainstmaliciousURLspreadinginmicro-blognetworkwithhubnodes,ConcurrencyandComputation:PracticeandExperience.v.29,no.14,2017July25
[10]刘昕,王晓,张卫山,汪建基,王飞跃.平行数据:从大数据到数据智能,模式识别与人工智能,2017,30(8),673-681
[11]WeishanZhang,DehaiZhao,ZhiChai,LaurenceT.Yang,XinLiu,FamingGong,SuYang:DeeplearningandSVM-basedemotionrecognitionfromChinesespeechforsmartaffectiveservices.《Software—practice&Experience》,2017,47(8):1127-1138
[12]XinLiu,YaoWang,DehaiZhao,WeishanZhang,LeyiShi.PatchingbyAutomaticallyTendingtoHubNodesBasedonSocialTrust,ComputerStandards&Interfaces,2016,44:94-101,DOI:10.1016/j.csi.2015.08.001,2016.02(Volume44,February2016,Pages94–101)
[13]WeishanZhang,PengchengDuan,XiaodanXie,FengXia,QinghuaLu,XinLiu,JiehanZhou:QoS4IVSaaS:aQoSmanagementframeworkforintelligentvideosurveillanceasaservice.PersonalandUbiquitousComputing20(5):795-808(2016)
[14]XinLi,XinLiu.Multi-segmentandmulti-stageprojectedtetrahedra,JournalofAmbientIntelligenceandHumanizedComputing,2016,Volume7,Issue5,pp639–648
[15]YangYang,HuiXu,YananLiu,ZhongweiLi,WeishanZhang,XinLiu.FeatureAnalysisofImportantNodesinMicroblog,The2ndIEEEInternationalConferenceonCyberSecurityandCloudComputing(CSCloud2015),2015.11.3-11.5,NewYork
[16]LeyiShi,YaoWang,XinLiu*.AnACO-BasedTrustInferenceAlgorithm.The9thInternationalConferenceonP2P,Parallel,Grid,CloudandInternetComputing,2014,2014.11.8-11.10Guangzhou
[17]ZHANGWeiShan,CHENLiCheng,LIUXin,LUQingHua,ZHANGPeiYing,YANGSu.AnOSGi-basedflexibleandadaptivepervasivecloudinfrastructure.SCIENCECHINAInformationSciences,2014,57(3):032107(11)
[18]XinLiu,ZhaojunXin,LeyiShi,YaoWang.ADecentralizedandPersonalizedSpamFilterBasedonSocialComputing,The10thIEEEInternationalWirelessCommunicationsandMobileComputingConference,Aug,4-8,2014,Nicosia,Cyprus,IWCMCInfo.Team
[19]刘昕,贾春福,石乐义,辛兆君.基于社会计算的IM恶意代码防御机制,电子学报2013,Vol.41(6):1130-1139
[20]LiuXin,XinZhaojun,ShiLeyi.AutomaticPatchingBasedonSocialComputinginP2PNetwork,The4thInternationalConferenceonEmergingIntelligentDataandWebTechnologies(EIDWT-2013)Xi’an,China,2013.9.pp.471-478基于社会计算的P2P网络自动补丁机制,September9-11,2013
[21]LiuXin,ShiLeyi,WangYao,XinZhaojun,FuWenjing.ADynamicTrustInferenceAlgorithmforSocialNetwork.the8thInternationalConferenceonP2P,Parallel,Grid,CloudandInternetComputing,2013,10.28-10.30,UNIVERSITYOFTECHNOLOGYOFCOMPIEGNE,COMPIEGNE,FRANCE,340-346
[22]刘昕,贾春福,刘国友,胡志超,王冬.基于社会信任的恶意网页协防机制,通信学报,2012,33(12):11-18
[23]刘昕,贾春福,胡志超,刘国友,王冬.对抗P2P蠕虫的邻居选择机制,天津大学学报,45(11),p1030-1038,2012
[24]LiuXin,HuZhichao,LiuGuoyou,JiaChunfu.DefendingP2PNetworksBasedonBenignWorms,JournalofComputationalInformationSystems,2011(7),p2532-2539
[25]JiaChunfu,LiuXin,HuZhichao,LiuGuoyou.DefendingP2PNetworksagainstMaliciousWormsBasedonBenignWorms,AdvancesinElectricandElectronics,155LNEE,p653-660,2012
[26]JianxiFan,XiaohuaJia,XinLiu,ShukuiZhang,JiaYu.Efficientunicastinbijectiveconnectionnetworkswiththerestrictedfaultynodeset,InformationSciences,181(11),p2303-2315,2011
[27]石乐义,姜蓝蓝,刘昕,贾春福.拟态式蜜罐诱骗特性的博弈理论分析,电子与信息学报,2013,Vol.35(5):1063-1068
[28]JiaChunfu,LiuXin,LiuGuoyou,HuZhichao.WormContainmentBasedonDouble-neighborListsinP2POverlayNetworks,Proceedingsof2010IEEEInternationalConferenceonInformationTheoryandInformationSecurity(ICITIS2010),p558-562,Beijing,China,December17-19,2010
[29]LeyiShi,XiaoruiWang,WenjingFu,XinLiu,ZhenQin.Animprovedanti-collisionalgorithmforISO15693RFIDsystems.CSS2012(InternationalSymposiumonCyberspaceSafetyandSecurity),LectureNotesinComputerScience,LNCS7672,Springer,Melbourne,Australia,2012.12,p339-351.
[30]石乐义,李婕,刘昕,贾春福.基于动态阵列蜜罐的协同网络防御策略研究.通信学报,33(11),p159-164,2012
[31]ChunfuJia,ZhiWang,KaiLu,XinhaiLiu,XinLiu.DirectedHidden-CodeExtractorforEnvironment-SensitiveMalwares,PhysicsProcedia,Volume24,PartC,p1621-1627,2012
[32]贾春福,王志,刘昕,刘昕海.路径模糊:一种有效抵抗符号执行的二进制混淆技术,计算机研究与发展,48(11),p2111-2119,2011
[33]LeyiShi,XiaoruiWang,WenjingFu,XinLiu,andZhenQin.AnImprovedAnti-collisionAlgorithmforISO15693RFIDSystems.LectureNotesinComputerScience,2012.12
[34]LeyiShi,WenjingFu,CongJia,XinLiu,ChunfuJia.ASensorAnonymityEnhancementSchemeBasedonPseudonymforClusteredWirelessSensorNetworkChinaCommunications,2014.9
2.教学论文:
[1]面向计算思维的数据结构课程教学改革,刘昕等,计算机教育,2013年16期
[2]刘昕,以问题为中心加强计算思维培养.当代教育科学,2014年7月
[3]石乐义,刘昕.“云模式”IT专业校企合作人才培养模式探索.职教论坛,2014年2期,72-74
[4]李克文;刘昕;崔学荣;张红霞.研究生培养主体模式创新研究,教育评论,2015(10)