近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
1. Qingshui Xue, Xingzhong Ju, Haozhi Zhu, Haojing Zhu, Fengying Li and Xiangwei Zheng. A Biometric-Based IoT Device Identity Authentication Scheme,AICON2019,Harbin,People’s Republic of China, May 25-27, 2019
2.薛庆水,李凤英. 基于云环境的双QoS约束多目标工作流调度.计算机工程与设计,Vol.40,No.8, 2019, pp. 2196-2203
3. Qingshui Xue, Haozhi Zhu, Xingzhong Ju, Haojing Zhu, Fengying Li and Xiangwei Zheng. A Video-Selection-Encryption Privacy Protection Scheme Based on Machine Learning in Smart Home Environment,AICON2019, Harbin, People’s Republic of China, May 25-27, 2019
4. 薛庆水,李凤英. 一种均衡的移动云计算任务迁移决策算法. 计算机应用与软件,Vol.36, No.12, 2019, pp.66-71
5. Xingzhong Ju,Qingshui Xue, Haifeng Ma, Jiageng Chen and Haozhi Zhu. The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment, ICCT 2019 ( 2019 IEEE 19th International Conference on Communication Technology),16-19 October 2019, Xi'an, China,pp. 312 - 316
6. Xiangwei Zheng, Yuang Zhang, Hui Zhang and Qingshui Xue. An RBF neural network–based dynamic virtual network embedding algorithm, Concurrency and Computation: Practice & Experience, March 2018
7. 薛庆水,李凤英. 我国走班制教学文献分析(2000-2017年):困境与发展. 现代远程教育研究,2018(3):78-88
8. 薛庆水,李凤英. 人工智能(AI)教育应用的安全风险与应对之策. 远程教育杂志, 2018(4):88-94
9. Qingshui Xue,Fengying Li, Xiangwei Zheng, Minglei Shu, Yunxiang Liu, Zhiyong Shan and Wenju Li. Secure-Positioning-Protocol-Based Symmetric Cryptography,2nd International Conference on Computational Modeling, Simulation and Applied Mathematics(CMSAM 2017),Oct. 22-23, 2017, Beijing, China, pp. 298-303
10. Mingli Wu, Na Ruan, Shiheng Ma, Haojin Zhu, Weijia Jia and Qingshui Xue. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter, The 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA2017), June 19-21, 2017,Guilin, China, LNCS 10251,pp. 124-135
11. Zhen Li,Xiangwei Zheng, Yuang Zhang and Qingshui Xue. Multi-objective Virtual Network Embedding Algorithm based on Global Resource Capacity, 20th International Conference on Computational Science and Engineering (IEEE CSE/EUC 2017), July 21-22, 2017, Guangzhou, China, Part 1, pp. 647 - 650
12. Hui Zhang, Xiangwei Zheng, Jie Tian and Qingshui Xue. A virtual network embedding algorithm based on RBF neural network. 20th International Conference on Computational Science and Engineering (IEEE CSE/EUC 2017 ), July 21-22, 2017, Guangzhou, China, Part 1, pp. 393 - 396
13. Jinli Zhong, Suguo Du, Lu Zhou, Haojin Zhu, Fan Cheng, Cailian Chen and Qingshui Xue. Security Modeling and Analysis on Intra Vehicular,2017 IEEE 86th Vehicular Technology Conference: VTC2017-Fall (IEEE VTC Fall 2017),24–27 September 2017, Toronto, Canada
14. Qingshui Xue, Huafeng Chen, Fengying Li, Huajun Zhang and Zhenfu Cao.Multi-Proxy Multi-Signature Binding Positioning Protocol, Security and Communication Networks,2016
15. Na Ruan, Qi Hu, Lei Gao, Haojin Zhu, Qingshui Xue and Weijia Jia. A Traffic Based Lightweight Attack Detection Scheme for VoLTE, IEEE GLOBECOM 2016, Dec. 4-8, Washington D.C., USA
16. Fengying Li,Qingshui Xue,Huajun Zhang and Erdong Deng. How to Improve Community Resident Autonomous Learning Based on Virtual Learning, International Management Review, 2016, Vol. 12, No. 1, pp. 60-72
17.Qingshui Xue, Fengying Li,Guojian Ge,Jiachen Shen and Zhenfu Cao.Position-Based Proxy Signcryption, The fourth IEEE/CIC International Conference on Communications (ICCC 2015), Shenzhen, China, Nov. 2-4, 2015
18. Fengying Li and Qingshui Xue. Research on community resident autonomous learning based on virtual learning, EEE'15 (The 2015 International Conference on e-Learning,e-Business, Enterprise Information Systems, and e-Government), July 27-30,2015, Las Vegas, USA
19. Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang and Zhenfu Cao. Multi-Proxy Multi-Signature Binding Positioning Protocol, The 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2015), Aug. 10-12, 2015, Qufu, Shandong, China, LNCS 9204, pp. 9-18
20. Qingshui Xue, Fengying Li and Zhenfu Cao. Proxy Multi-Signature Binding Positioning Protocol, IEEE/CIC ICCC 2014 (Symposium on Privacy and Security in Commutations), IEEE Xplore, Oct. 13-15, 2014, Shanghai, China, pp. 166-170
21. Qingshui Xue, Fengying Li and Zhenfu Cao. Threshold proxy signature based on position, SECURWARE 2014 (The Eighth International Conference on Emerging Security Information, Systems and Technologies), Nov. 16-20, 2014, Lisbon,Portugal. pp. 151-156
22. Qingshui Xue, Fengying Li and Zhenfu Cao. positioning-protocol-based digital signature, WICON 2014 (The 8th International Wireless Internet Conference - Symposium on Wireless and Vehicular Communication), Nov. 13-14, 2014, Lisbon, Portugal
23. Fengying Li,Qingshui Xue and Haixia Li.Research on energy expenditure and strategy of MOOC, Modern Distance Education Research, 2014 (in Chinese)
24.Fengying Li,Qingshui Xue and Jianping Xu. Fuzzy-Identity-Authentication-Based MOOC Online Examination Learner Identity Authentication Pattern and Solution, MEHS 2014 (International Symposium Modern on Education and Human Sciences), Oct. 25-26, 2014, Zhangjiajie, China
25. Fengying Li,Jianping Xu and Qingshui Xue. Research on Authentication Technology Based on Proxy in Mobile Learning, MEHS 2014 (International Symposium Modern on Education and Human Sciences), Oct. 25-26, 2014, Zhangjiajie, China
26. Juan Lin, Qingshui Xue and Zhenfu Cao. Proxy-based Immediate Attribute Revocation KP-ABE,Computer Engineering, 2013(in Chinese)
27. Fengying Li, Yuxin Qi and Qingshui Xue. Research on Security of Virtual Learning Community Based on Big Data:Collaboration Learning System Based on Threshold Proxy Signature, Journal of Distance Education, 2013,Vol. 4, pp.76-82(in Chinese)
28. Fengying Li, Qingshui Xue and Jiping Zhang. The Model and Solution of Privacy Protection for Mobile Learning Based on Authentication, Modern Distance Education Research, 2013, Vol. 3, pp. 72-77(in Chinese)
29. Fengying Li, Qingshui Xue and Weimin Wu. Collaboration learning research based on threshold proxy signature, e-Education Research, 2013,Vol. 10, pp. 66-70(in Chinese)