Click here to load reader
Upload
dangthu
View
214
Download
0
Embed Size (px)
Citation preview
论文题目 作者 期刊/会议名称 卷期页码 备注1 A Survey on Software Fault Localization
W. Eric Wong, Ruizhi Gao, Yihao Li, Rui Abreu, Franz Wotawa
IEEE Transactions on Software Engineering(TSE)
2016,28(8): 1971-1985 CCF A
2DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
He Kun; Chen Jing; Du Ruiying;Wu Qianhong; Xue Guoliang; Zhang Xiang
IEEE Transactions on Computers(TOC)
2016,65(12): 3631-3645 CCF A
3Write Mode Aware Loop Tiling for High Performance Low Power Volatile PCM in Embedded Systems
Qiu Keni; Li Qingan; Hu Jingtong; Zhang Weigong; Xue Chun Jason
IEEE Transactions on Computers(TOC)
2016,65(7): 2313-2324 CCF A
4Automatic Clustering via Outward Statistical Testing on Density Metrics
Wang, Guangtao; Song, QinbaoIEEE Transactions on Knowledge and Data Engineering (TKDE)
2016,28(8): 1971-1985 CCF A
5Bosting parallel fils system performance via heterogeneity-aware selective data layout
Shuibing He, Yang Wang,Xian-He SunIEEE Transactions on Parallel and Distributed Systems(TPDS)
2016,27(9): 2492-2505 CCF A
6Improving Performance of Parallel I/O Systems through Selective and Layout-Aware SSD Cache
He Shuibing; Wang Yang; Sun Xian-HeIEEE Transactions on Parallel and Distributed Systems(TPDS)
2016,27(10): 2940-2952 CCF A
7Multi-Label Dictionary Learning for Image Annotation
Jing, Xiao-Yuan,Wu, Fei,Li, Zhiqiang,Hu, Ruimin,Zhang, David
IEEE Transactions on Image Processing(TIP)
2016,25(6): 2712-2725 CCF A
8Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
Hu Shengshan,Wang Qian, Wang Jingjun,Qin Zhan,Ren Kui
IEEE Transactions on Image Processing(TIP)
2016,25(7): 3411-3425 CCF A
9 Beyond the Sparsity-Based Target Detector: A Hybrid Sparsity and Statistics-
Du Bo,Zhang Yuxiang,Zhang Liangpei, Tao Dacheng
IEEE Transactions on Image Processing(TIP)
2016,25(11): 5345-5357 CCF A
Based Detector for Hyperspectral Images
10Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Wang Huaqun*,He Debiao*,Tang Shaohua
IEEE Transactions on Information Forensics & Security(TIFS)
2016, 11(6): 1165-1176 CCF A
11
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
He Debiao, Zeadally Sherali, Kumar Neeraj, Wu Wei
IEEE Transactions on Information Forensics & Security(TIFS)
2016,11(9): 2052-2064 CCF A
12Nopol: Automatic Repair of Conditional Statement Bugs in Java Programs
Jifeng Xuan, Matias Martinez, Favio DeMarco, Maxime Clement, Sebastian Lamelas Marcote, Thomas Durieux, Daniel Le Berre
IEEE Transactions on Software Engineering(TSE)
2016 在线 CCF A
13An Improved SDA Based Defect Prediction Framework for Both Within-Project and Cross-Project Class-Imbalance Problems
Jing Xiao-Yuan*, Wu Fei, Dong Xiwei, Xu Baowen
IEEE Transactions on Software Engineering(TSE)
2016 在线 CCF A
14Super-Resolution Person Re-Identification With Semi-Coupled Low-Rank Discriminant Dictionary Learning
Jing Xiao-Yuan*, Zhu Xiaoke, Wu Fei, Hu Ruimin,
IEEE Transactions on Image Processing(TIP)
2016 在线 CCF A
15Palette-Based Image Recoloring Using Color Decomposition Optimization
Zhang Qing, Xiao Chunxia*, Sun Hanqiu, Tang Feng
IEEE Transactions on Image Processing(TIP)
2016 在线 CCF A
16Structure-Based Low-Rank Model With Graph Nuclear Norm Regularization for Noise Removal
Ge Qi,Jing Xiao-Yuan*(通讯作者) IEEE Transactions on Image Processing(TIP)
2016 在线 CCF A
17 HARL: Optimizing Parallel File Systems with Heterogeneity-Aware Region-Level
He Shuibing, Wang Yang, Sun Xian-He, Xu, Chengzhong*
IEEE Transactions on Computers
2016 在线 CCF A
Data Layout (TOC)
18Heterogeneity-Aware Collective I/O for Parallel I/O Systems with Hybrid HDD/SSD Servers
He Shuibing, Wang Yang*, Sun Xian-He, Huang, Chuanhe,Xu, Chengzhong*
IEEE Transactions on Computers(TOC)
2016 在线 CCF A
19Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks
Chen Jing*, He Kun, Yuan Quan, Xue Guoliang, Du Ruiying, Wang Lina
IEEE Transactions on Mobile Computing
2016 在线 CCF A
20AMR Steganalysis Based on Second-order Difference of Pitch Delay
Yanzhen Ren*, Jing Yang, Jinwei Wang, Lina Wang
IEEE Transaction on Information Forensics and Security
2016 在线 CCF A
21H-PARAFAC: Hierarchical Parallel Factor Analysis of Multidimensional Big Data
Dan Chen*, Yangyang Hu, Lizhe Wang, Albert Zomaya, Xiaoli Li
IEEE Transactions on Parallel and Distributed Systems
2016 在线 CCF A
22Using MinMax-Memory Claims to Improve In-Memory Workflow Computations in the Cloud
He Shuibing*, Wang Yang, Sun Xian-He, Xu, Chengzhong
IEEE Transactions on Parallel and Distributed Systems
2016 在线 CCF A
23DeyPoS:Deduplicatable Dynamic Proof of Storage for Multi-User Environments
Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang
IEEE Transactions on Computers(TOC)
2016 在线 CCF A
24Searchable Encryption over Feature-Rich Data
Wang Qian,Zou Qin,He Meiqi,Du,Minxin, Sherman S.M.Chow,Russell W.F.Lai
IEEE Transactions on Dependable and Secure Computing
2016 在线 CCF A
25Real-time and Spatio-temporal Crowd-sourced Social Network Data Publishing with Differential Privacy
Wang,Qian;Zhang,Yan;Lu,Xiao;Wang,Zhibo;Qin,Zhan;Ren,Kui
IEEE Transactions on Dependable and Secure Computing
2016 在线 CCF A
26 Alexey Vinel, A provably-secure cross- Debiao He, Neeraj Kumar, Huaqun IEEE Transactions on Depend 2016 在线 CCF A
domain handshake scheme with symptoms-matching for mobile healthcare social network
Wang, Lina Wang, Kim-Kwang Raymond Choo
able and Secure Computing
27
Efficient Hierarchical Identity-Based Signature with Batch Verification for Automatic Dependent Surveillance-Broadcast System
Debiao He ; Neeraj Kumar ; Kim-Kwang Raymond Choo ; Wei Wu
IEEE Transactions on Information Forensics & Security
2016 在线 CCF A
28THEMIS:Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply
Wang,Qian;Sun Sun,Qihang;Ren,Kui;Jia,Xiaohua
IEEE Transactions on Mobile Computing
2016 在线 CCF A
29Cost-Aware Region-Level Data Placement in Multi-Tiered Parallel I/O Systems
He Shuibing, Wang YangIEEE Transactions on Parallel and Distributed Systems
2016 在线 CCF A
30Revisit of Automatic Debugging via Human Focus-tracking Analysis
Xiaoyuan Xie, Zicong Liu, Shuo Song, Zhenyu Chen, Jifeng Xuan, Baowen Xu
ICSE 2016 2016,pp.808-819 CCF A
31Missing Data Imputation Based on Low-rank Recovery and Semi-supervised Regression for Software Effort Estimation
Xiao-Yuan Jing, Fumin Qi, Fei Wu, Baowen Xu
ICSE 2016 2016,pp.607-618 CCF A
32
Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation
Fumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu, Li Cheng
ASE 2016 2016,P75-86, 2016 CCF A
33Scale-adaptive low-resolution person re-identification via learning a discriminating surface
Zheng Wang;Hu Ruimin; Yu Yi; Jiang Junjun; Chao Liang; Jinqiao Wang
IJCAI 2016 2016, P2669-2675 CCF A
34 Joint Models for Extracting Adverse Drug Fei Li, Yue Zhang, Meishan Zhang, IJCAI 2016 2016, P2838-2844 CCF A
Events from Biomedical Text Donghong Ji*
35Video-based person re-identification by simultaneously learning intra-video and inter-video distance metrics
Zhu Xiaoke,Jing Xiaoyuan*,Wu Fei,Hui Feng
IJCAI 2016 2016,P 3552-3558 CCF A
36Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data
Wang Qian,Hu Shengshan, Wang Jingjun, Wang Zhibo
INFOCOM 2016 2016 CCF A
37RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy
Wang Qian Zhang Yan,Lu Xiao,Wang Zhibo,Qin Zhang,Ren Kui
INFOCOM 2016 2016 CCF A
38An Efficient Auction Mechanism for Service Chains in The NFV Market
Sijia Gu, Zongpeng Li, Chuan Wu, Chuanhe Huang
INFOCOM 2016 2016 CCF A
39Topic Modeling for Short Texts with Auxiliary Word Embeddings
Chenliang Li *, Haoran, Wang, Zhiqian Zhang, Aixin Sun, Zongyang Ma
SIGIR 2016(Best Student Paper Award Honorable Mention)
2016,P165-174 CCF A
40Messages Behind the Sound:Real-Time Hidden Acoustic Signal Capture with Smartphones
Wang,Qian;Ren,Kui;Zhou,Man;Lei,TaoMOBICOM 2016
2016,P29-41 CCF A
41Multidomain Subspace Classification for Hyperspectral Images
Zhang Liangpei; Zhu Xiaojie; Zhang Lefei
IEEE Transactions on Geoscience and Remote Sensing
2016,54(10): 6138-6150 CCF B
42Knowledge-Based Coding of Objects for Multisource Surveillance Video Data
Xiao Jin; Hu Ruimin; Liao, Liang Chen Yu; Wang Zhongyuan; Xiong Zixiang
IEEE Transactions on Multimedia
2016,18(9): 1691-1706 CCF B
43 Person Reidentification via Ranking Aggregation of Similarity Pulling and
Ye Mang; Liang Cha; Yu Yi; Wang Zheng; Leng Qingming; Xiao, Chunxia;
IEEE Transactions on Multimedia
2016,18(12): 2553-2566 CCF B
Dissimilarity Pushing Chen Jun; Hu, Ruimin
44Fast Service Process Fragment Indexing and Ranking
Zeng Cheng; Zhang Tao; Hung Patrick C. K
IEEE Transactions on Services Computing
2016,9(5): 672-685 CCF B
45Query Expansion Based on Crowd Knowledge for Code Search
Nie Liming; Jiang He; Ren Zhilei; Sun Zeyi; Li, Xiaochen
IEEE Transactions on Services Computing
2016,9(5): 771-783 CCF B
46Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks
Wang Qian; Ren Kui; Ning Peng; Hu Shengshan
IEEE Transactions on Vehicular Technology
2016,65(10): 8331-8344 CCF B
47Multiple kernel ensemble learning for software defect prediction
Wang Tiejian; Zhang Zhiwu; Jing Xiaoyuan; Zhang Liqiang
Automated Software Engineering
2016,23(4): 569-590CCF B
48Measure controllable volumetric mesh parameterization
Su Kehua; Chen Wei; Lei Na; Cui Li; Jiang Jian; Gu Xianfeng David
Computer-Aided Design 2016,78(): 188-198 CCF B
49Area-preserving mesh parameterization for poly-annulus surfaces based on optimal mass transportation
Su Kehua; Cui Li; Qian Kun; Lei Na; Zhang Junwei; Zhang Min; Gu Xianfeng David
Computer Aided Geometric Design
2016,46(): 76-91 CCF B
50Geometrically Based Linear Iterative Clustering for Quantitative Feature Correspondence
Yan Qingan; Yang Long; Liang, Chao; Liu Huajun; Hu Ruimin; Xiao, Chunxia
Computer Graphics Forum 2016,35(7): 1-10 CCF B
51A Distributed File System with Variable Sized Objects for Enhanced Random Writes
Gong Yili; Hu Chuang; Xu Yanyan; Wang Wenjie
Computer Journal 2016,59(10): 1536-1550 CCF B
52Context-Aware Integrated Scheme for Mobile Cloud Service Allocation
Li Chunlin; Li LaYuan Computer Journal 2016,59(1): 47-63 CCF B
53 Distributed Greedy Coding-aware Deterministic Routing for multi-flow in
Chen Jing; He Kun; Yuan Quan; Du Ruiying; Wang Lina; Wu Jie
Computer Networks 2016,105(): 194-206 CCF B
wireless networks
54Automatic repair of real bugs in java: a large-scale experiment on the defects4j dataset
Martinez, Matias; Durieux, Thomas; Sommerard, Romain; Xuan, Jifeng; Monperrus, Martin
Empirical Software Engineering
2016,P1-29 CCF B
55B-Refactoring: Automatic test code refactoring to improve dynamic analysis
Xuan Jifeng; Cornu Benoit; Martinez Matias; Baudry Benoit; Seinturier Lionel; Monperrus Martin
Information And Software Technology
2016,76(): 65-80 CCF B
56Exploiting flexible-constrained K-means clustering with word embedding for aspect-phrase grouping
Xiong Shufeng; Ji Donghong Information Sciences 2016,367(): 689-699 CCF B
57Prioritizing Test Cases for Memory Leaks in Android Applications
Qian Ju; Zhou DiJournal Of Computer Science And Technology
2016,31(5): 869-882 CCF B
58Summarizing Software Artifacts: A Literature Review
Nazar Najam; Hu Yan; Jiang HeJournal Of Computer Science And Technology
2016,31(5): 883-909 CCF B
59A systematic mapping study on the combination of software architecture and agile development
Yang Chen; Liang, Peng; Avgeriou ParisJournal of Systems and Software
2016,111: 157-184CCF B
60A survey on software architectural assumptions
Yang Chen; Liang Peng; Avgeriou ParisJournal of Systems and Software
2016,113: 362-380CCF B
61METRIC: METamorphic Relation Identification based on the Category-choice framework
Chen Tsong Yueh; Poon Pak-Lok; Xie, Xiaoyuan
Journal of Systems and Software
2016,116: 177-190 CCF B
62A machine learning based software process model recommendation method
Song Qinbao; Zhu Xiaoyan; Wang Guangtao; Sun Heli; Jiang He; Xue Chenhao; Xu Baowen; Song Wei
Journal of Systems and Software
2016,118: 85-100 CCF B
63Multi-spectral low-rank structured dictionary learning for face recognition
Jing Xiao-Yuan; Wu Fei; Zhu Xiaoke; Dong Xiwei; Ma Fei; Li Zhiqiang
Pattern Recognition 2016,59: 14-25 CCF B
64Class relatedness oriented-discriminative dictionary learning for multiclass image classification
Zhang Dongyu; Liu Pengju; Zhang Kai; Zhang Hongzhi; Wang Qing; Jing, Xiaoyuan
Pattern Recognition 2016,59: 168-175 CCF B
65Uncorrelated multi-set feature learning for color face recognition
Wu Fei; Jing Xiao-Yuan; Dong Xiwei; Yue Dong;Wu Songsong; Liu Qian; Yang Jing-Yu
Pattern Recognition 2016,60: 630-646 CCF B
66One-to-many authentication for access control in mobile pay-TV systems
He Debiao; Kumar Neeraj; Shen Han; Lee Jong-Hyouk
Science China-Information Sciences
2016,59(5): CCF B
67Dynamic strategy based parallel ant colony optimization on GPUs for TSPs
Zhou Yi; He Fazhi; Qiu YiminScience China-Information Sciences
2016,60(6): CCF B
68Non-negative sparse-based SemiBoost for software defect prediction
Wang Tiejian; Zhang Zhiwu; Jing Xiaoyuan; Liu Yanli
Software Testing Verification & Reliability
2016,26(7): 498-515 CCF B
69Semi-supervised graph cut algorithm for drug repositioning by integrating drug, disease and genomic associations
Wu Guangsheng; Liu Juan; Wang Caihua
BIBM 2016 2016,P223-228 CCF B
70The prediction of human splicing branchpoints by multi-label learning
Zhang Wen; Zhu Xiaopeng; Fu Yu; Tsuji Junko; Weng Zhiping
BIBM 2016 2016,p 254-259 CCF B
71Integration of multiple heterogeneous omics data
Zhang Chuanchao,Liu Juan,Shi Qiangqian
BIBM 2016 2016,P564-569 CCF B
72Drug side effect prediction through linear neighborhoods and multiple data source integration
Zhang Wen; Chen Yanlin; Tu Shikui; Liu Feng; Qu Qianlong
BIBM 2016 2016,p 427-434 CCF B
73Effective document labeling with very few seed words: A topic modeling approach
Li Chenliang; Xing Jian; Sun Aixin; Ma Zongyang
CIKM 2016 2016,P85-94 CCF B
74Efficiently mining homomorphic patterns from large data trees
Wu Xiaoying;Theodoratos Dimitri; Peng Zhiyong
DASFAA 2016v 9642, p 180-196, 2016
CCF B
75Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor
Wang Qian*; Hu Shengshan; Wang Jingjun; Ren Kui
ICDCS 2016 2016,P700-710 CCF B
76 Boosted local classifiers for visual trackingRuan Weijian;Chen Jun; Wang Jinqiao; Luo Bo; Huang Wenjun; Hu Ruimin
ICME 2016 2016-August CCF B
77Multichannel reduction based on sound field within two ears
Li Dengshi,Hu Ruimin,Wang Xiaochen ICME 2016 2016 CCF B
78
Distance learning by treating negative samples differently and exploiting impostors with symmetric triplet constraint for person re-identification
Zhu Xiaoke; Jing Xiao-Yuan; Wu Fei; Zheng Weishi; Hu Ruimin; Xiao, Chunxia
ICME 2016 2016 CCF B
79Service recommendation based on social balance theory and collaborative filtering
Qi Lianyong;Dou Wanchun; Zhang Xuyun
ICSOC 2016 2016, P637-645 CCF B
80
Mashup service clustering based on an integration of service content and network via exploiting a two-level topic model
Cao Buqing,Liu Xiaoqing,Li Bing ICWS 2016 2016,p212-219 CCF B
81Efficient computation of ordering relations with time and probability constraints for workflow models
Huang Hua,Peng Rong,Feng Zaiwen ICWS 2016 2016,P546-553 CCF B
82Interpolant synthesis for quadratic polynomial inequalities and combination with EUF
Gan Ting;Dai, Liyun; Xia Bican; Zhan Naijun; Kapur Deepak; Chen Mingshuai
IJCAR 2016 2016, P195-212 CCF B
83The Impact of Feature Selection on Defect Prediction Performance: An Empirical Comparison
Xu Zhou; Liu Jin; Yang Zijiang; An Gege; Jia Xiangyang
ISSRE 2016 2016,P309-320 CCF B
84Analyzing inter-objective relationships: A case study of software upgradability
Ren Zhilei;Jiang He; Xuan Jifeng; Tang, Ke; Hu Yan
PPSN 2016 2016, p 442-452 CCF B
85Technical debt in MDE: A case study on GMF/EMF-based projects
He Xiao*; Avgeriou Paris*; Liang Peng; Li Zengyang
MODELS 2016 2016, p 162-172 CCF B
86
MICHAC: Defect prediction via feature selection based on Maximal Information Coefficient with Hierarchical Agglomerative Clustering
Xu Zhou,Xuan Jifeng,Liu Jin,Cui Xiaohui SANER 2016 2016,P370-381 CCF B
87A multiple template approach for robust tracking of fast motion target
Sun Jun; He Fa-zhi; Chen Yi-lin; Chen Xiao
Applied Mathematics-A Journal of Chinese Universities Series B
2016,31(2): 177-197 CCF C
88A genetic algorithm-based weighted ensemble method for predicting transposon-derived piRNAs
Li Dingfang; Luo Longqiang; Zhang Wen; Liu Feng; Luo Fei
BMC Bioinformatics 2016,17(1): CCF C
89BioSynther: a customized biosynthetic potential explorer
Tu Weizhong; Zhang Haoran; Liu Juan; Hu, Qian-Nan
Bioinformatics 2016,32(3): 472-473 CCF C
90Meta-operation conflict resolution for human-human interaction in collaborative feature-based CAD systems
Cheng Yuan; He Fazhi; Wu Yiqi; Zhang Dejun
Cluster Computing 2016,19(1): 237-253 CCF C
91Supervised feature selection method via potential value estimation
Zhao Long; Jiang LinFeng; Dong XiangJun
Cluster Computing 2016,19(4): 2039-2049 CCF C
92
A new crossover mechanism for genetic algorithms with variable-length chromosomes for path optimization problems
Zhang Qiongbing; Ding LixinExpert Systems With Applications
2016,60(): 183-189 CCF C
93Source code fragment summarization with small-scale crowdsourcing based features
Nazar Najam; Jiang He; Gao Guojun; Zhang Tao; Li Xiaochen; Ren Zhilei
Frontiers of Computer Science
2016,10(3): 504-517 CCF C
94Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
He Debiao; Wang Huaqun; Khan Muhammad Khurram; Wang Lina
IET Communications 2016,10(14): 1795-1802 CCF C
95
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
Shen Han; Kumar Neeraj; He Debiao; Shen Jian; Chilamkurti Naveen
Journal Of Supercomputing 2016,72(9): 3588-3600 CCF C
96Template-Based Bitmap View Selection for Optimizing Queries Over Tree Data
Wu Xiaoying; Theodoratos DimitriInternational Journal of Cooperative Information Systems
2016,25(3): 1-28 CCF C
97An Empirical Study of Ranking-Oriented Cross-Project Software Defect Prediction
You Guoan; Wang Feng; Ma YutaoInternational Journal of Software Engineering and Knowledge Engineering
2016,26(9-10): 1511-1538
CCF C
98Exploiting Correlation Subspace to Predict Heterogeneous Cross-Project Defects
Cheng Ming; Wu Guoqing; Wan Hongyan; You Guoan; Yuan, Mengting; Jiang Min
International Journal of Software Engineering and Knowledge Engineering
2016,26(9-10): 1571-1580
CCF C
99 A Multi-Source Approach for Bug TriageLiu Jin; Tian Yiqiuzi; Yu Xiao; Yang Zhijiang; Jia Xiangyang; Ma Chuanxiang; Xu Zheng
International Journal of Software Engineering and Knowledge Engineering
2016,26(9-10): 1593-1604
CCF C
100Critical data points-based unsupervised linear dimension reduction technology for science data
Wu Di; Xiong Naixue; He Jinrong; Huang Chuanhe
Journal of Supercomputing 2016,72(8): 2962-2976 CCF C
101Optimization of parallel iterated local search algorithms on graphics processing unit
Zhou Yi; He Fazhi; Qiu Yimin Journal of Supercomputing 2016,72(6): 2394-2416 CCF C
102A formalized framework for incorporating expert labels in crowdsourcing environment
Hu Qingyang; He Qinming; Huang Hao; Chiew Kevin; Liu Zhenguang
Journal of Intelligent Information Systems
2016,47(3): 403-425 CCF C
103Security analysis of a user registration approach
Luo Min; Zhang Jingyin; He Debiao; Shen Jian
Journal of Supercomputing 2016,72(3): 900-903 CCF C
104Score level fusion method based on multiple oblique gradient operators for face recognition
Li Zhaokui; Ding Lixin; Wang YanMultimedia Tools and Applications
2016,75(2): 819-837 CCF C
105Group recursive discriminant subspace learning with image set decomposition
Wu Fei; Jing Xiao-Yuan; Yao Yong-Fang; Yue Dong; Chen Jun
Neural Computing & Applications
2016,27(6): 1693-1706 CCF C
106Empirical analysis: stock market prediction via extreme learning machine
Li Xiaodong; Xie Haoran; Wang Ran; Cai Yi; Cao Jingjing; Wang, Feng; Min Huaqing; Deng Xiaotie
Neural Computing & Applications
2016,27(1): 67-78 CCF C
107Tri-Training for authorship attribution with limited training data: a comprehensive study
Qian Tieyun; Liu Bing; Chen Li; Peng Zhiyong; Zhong Ming; He Guoliang; Li Xuhui
Neurocomputing 2016,171: 798-806 CCF C
108
A batch-mode active learning framework by querying discriminative and representative samples for hyperspectral image classification
Wang Zengmao; Du Bo; Zhang Lefei; Zhang Liangpei
Neurocomputing 2016,179: 88-100 CCF C
109Probabilistic skyline queries on uncertain time series
He Guoliang; Chen Lu; Zeng Chen; Zheng Qiaoxian; Zhou Guofu
Neurocomputing 2016,191: 224-237 CCF C
110Local Rademacher complexity bounds based on covering numbers
Lei Yunwen; Ding Lixin; Bi Yingzhou Neurocomputing 2016,218: 320-330 CCF C
111Online social trust reinforced personalized recommendation
Cheng Yuehua; Liu Jin; Yu XiaoPersonal and Ubiquitous Computing
2016,20(3): 457-467 CCF C
112Automatically constructing course dependence graph based on association semantic link model
Zhou Pingyi; Liu Jin; Yang Xianzhao; Cui Xiaohui; Chang Liang; Zhang Shunxiang
Personal and Ubiquitous Computing
2016,20(5): 731-742 CCF C
113An energy-efficient source-anonymity protocol in surveillance systems
Niu Xiaoguang; Zhang Yihao; Yao Yalan; Chen Xu; Jornet Josep Miquel;Liu Jin
Personal and Ubiquitous Computing
2016,20(5): 771-783 CCF C
114Cryptanalysis of a certificateless aggregate signature scheme with efficient verification
Shen Han; Chen Jianhua; Shen Jian; He Debiao
Security and Communication Networks
2016,9(13): 2217-2221 CCF C
115Message-locked proof of ownership and retrievability with remote repairing in cloud
Chen Jing; Zhang Lihong; He Kun; Chen Min; Du Ruiying; Wang Lina
Security and Communication Networks
2016,9(16): 3452-3466 CCF C
116A dynamic trust evaluation mechanism based on affective intensity computing
Zhou Guoqiang; Wang Kuang; Zhao Chen; Zhou Guofu
Security and Communication Networks
2016,9(16): 3752-37611 CCF C
117 A gamma-Strawman privacy-preserving Chen Jing; Zhang Bowen; Chen Min; Security and Communication 2016,9(18): 5625-5638 CCF C
scheme in weighted social networks Yuan Quan; Du Ruiying Networks
118Gaussian bare-bones artificial bee colony algorithm
Zhou Xinyu; Wu Zhijian; Wang Hui; Rahnamayan Shahryar
Soft Computing 2016,20(3): 907-924 CCF C
119Interactive differential evolution for user-oriented image retrieval system
Yu Fei; Li Yuanxiang; Wei Bo; Kuang Li Soft Computing 2016,20(2): 449-463 CCF C
120
Exploring mutual information-based sentimental analysis with kernel-based extreme learning machine for stock prediction
Wang Feng; Zhang Yongquan; Rao Qi; Li Kangshun; Zhang Hao
Soft Computing 2016 在线 CCF C
121Distance field guided L1-median skeleton extraction
Song Chengfang; Pang Zhiqiang; Jing Xiaoyuan; Xiao Chunxia
Visual Computer p 1-13,2016 CCF C
122Privacy-preserving data aggregation scheme against internal attackers in smart grids
He Debiao; Kumar Neeraj; Lee Jong-Hyouk
Wireless Networks 2016,22(2): 491-502 CCF C
123Modeling for noisy labels of crowd workers
Yan Qian; Huang Hao; Gao Yunjun; Ying Chen; Hu Qingyang; Qian Tieyun; He, Qinming
APWeb 2016 2016, p 227-238 CCF C
124Provably secure threshold paillier encryption based on hyperplane geometry
Xia Zhe;Yang Xiaoyun; Xiao Min; He Debiao
ACISP 2016 2016, p 73-86 CCF C
125A Comparative Study of the Effects of Pull Request on GitHub Projects Liu Jing; Li, Jiahao; He Lulu COMPSAC 2016 2016,P133-142 CCF C
126Code Coverage-Based Failure Proximity without Test Oracles Tu Jingxuan,Xie Xiaoyuan,Xu Baowen COMPSAC 2016 2016,P313-322 CCF C
127 Mining arbitrary shaped clusters and Huang Hao;Wang Song; Wu DEXA 2016 2016, p 153-168 CCF C
outputting a high quality dendrogramShuangke; Gao Yunjun; Lu Wei; He Qinming; Ying Shi
128Inferring lurkers’ gender by their interest tags
Zhu Peisong;Qian Tieyun; You Zhenni; Li Xuhui
DEXA 2016 2016, p 263-271 CCF C
129A reverse nearest neighbor based active semi-supervised learning method for multivariate time series classification
Li Yifei;He Guoliang; Xia, Xuewen; Li Yuanxiang
DEXA 2016 2016, p 272-286 CCF C
130An approach for prioritizing software features based on node centrality in probability network
Peng Zhenlian; Wang Jian; He Keqing; Li Hongtao
ICSR 2016 2016,P106-121 CCF C
131A ctive learning for multivariate time series classification with positive unlabeled data
He Guoliang; Duan Yong; Li Yifei; Qian Tieyun; He Jinrong; Jia Xiangyang
ICTAI 2016 2016,p178-185 CCF C
132Learning user embedding representation for gender prediction
Chen Li;Qian Tieyun; Zhu Peisong; You Zhenni
ICTAI 2016 2016,P263-269 CCF C
133Geodesic-based pavement shadow removal revisited
Zou Qin;Hu, Zhongwen; Chen Long; Wang Qian; Li Qingquan
ICASSP 2016 2016, p 1761-1765 CCF C
134Inferring users’ gender from interests: A tag embedding approach
Zhu Peisong;Qian Tieyun; Zhong Ming; Li Xuhui
ICONIP 2016 2016, p86-94 CCF C
135Robust Sparse Subspace Learning for unsupervised feature selection
Wang Feng,Rao Qi,Zhang Yongquan,Chen Xu
IJCNN 2016 2016,P4205-4212 CCF C
136Sparse tensor discriminative locality alignment for gait recognition
Zhao Nengwen,Zhang Lefei,Du Bo IJCNN 2016 2016, p 4489-4495 CCF C
137Denoising auto-encoders toward robust unsupervised feature representation
Xiong Wei,Du Bo,Zhang Lefei IJCNN 2016 2016,P4721-4728 CCF C
138Public integrity auditing for dynamic regenerating code based cloud storage
He Kai, Huang Chuanhe,Shi Jiaoli ISCC 2016 2016,P581-588 CCF C
139Research on perception sensitivity of elevation angle in 3D sound field
Wu Yafei;Wang Xiaochen; Yang Cheng; Gao Ge; Chen Wei
PCM 2016 p 242-249, 2016 CCF C
140Fine-grained vehicle recognition in traffic surveillance
Wang Qi;Wang Zhongyuan; Xiao Jing; Xiao Jun; Li Wenbin
PCM 2016 2016, p 285-295 CCF C
141Head related transfer function interpolation based on aligning operation
Wu Tingzhao;Hu Ruimin; Wang Xiaochen; Gao Li; Ke Shanfa
PCM 2016 2016, p 418-427 CCF C
142An analysis-oriented ROI based coding approach on surveillance video data
Liao Liang;Hu Ruimin; Xiao Jing; Zhan Gen; Chen Yu; Xiao Jun
PCM 2016 2016, p 428-438 CCF C
143A stepwise frontal face synthesis approach for large pose non-frontal facial image
Wei Xueli;Hu Ruimin; Han Zhen; Chen Liang; Ding Xin
PCM 2016 2016, p 439-448 CCF C
144Salient object detection in video based on dynamic attention center
Shao Mengling;Hu Ruimin; Wang Xu; Wang Zhongyuan; Xiao Jing; Gao Ge
PCM 2016 2016, p 458-468 CCF C
145Criminal investigation oriented saliency detection for surveillance videos
Chen Yu;Hu Ruimin; Xiao Jing; Liao Liang; Xiao Jun; Zhan Gen
PCM 2016 2016, p 487-496 CCF C
146Audio bandwidth extension using audio super-resolution
Lin Jiang,Ruimin Hu,Xiaochen Wang PCM 2016 2016, p 540-549 CCF C
147An approach of service discovery based on service goal clustering
Zhang Neng; Wang Jian; He Keqing; Li Zheng
SCC 2016 2016,P114-121 CCF C
148Where to fix temporal violations: A novel handling point selection strategy for business cloud workflows
Luo Haoyu,Liu Xaio,Liu Jin SCC 2016 2016,P155-162 CCF C
149A time-aware method to process behavioral similarity calculation
Huang Hua,Peng Rong,Feng Zaiwen SCC 2016 2016,P395-402 CCF C
150A ranking-oriented approach to cross-project software defect prediction: An empirical study
You Guoan;Ma Yutao SEKE 2016 2016,P159-164 CCF C
151Heterogeneous defect prediction via exploiting correlation subspace
Cheng Ming,Wu Guoqing,Jiang Min SEKE 2016 2016,P171-176 CCF C
152Developer recommendation with awareness of accuracy and cost
Liu Jin,Tian Yiqiuzi,Hong Liang SEKE 2016 2016,P213-218 CCF C
153A multi-source tradaboost approach for cross-company defect prediction
Yu Xiao; Liu Jin*; Fu Mandi, ; Ma Chuanxiang*; Nie Guoping4; Chen Xu
SEKE 2016 2016,P237-242 CCF C
154Securing fast learning! Ridge regression over encrypted big data
Hu Shengshan,Wang QianWang JingjunTrustCom/BigDataSE/ISPA 2016
2016,P19-26 CCF C
155Virtual TPM dynamic trust extension suitable for frequent migrations
Yu Fajiang*; Chen Lie; Zhang HuanguoTrustCom/BigDataSE/ISPA 2016
2016,P57-65 CCF C
156Android app malicious behavior detection based on user intention
Fu Jianming;Li Pengwei; Lin, Yan; Ding Shuang
TrustCom/BigDataSE/ISPA 2016
2016,P560-567 CCF C
157OSim: An OLAP-based similarity search service solver for dynamic information networks
Niu Xiaoguang;Zhang Yihao; Huang Ting; Wu Xiaoping
WASA 2016 2016, 536-547 CCF C
158Planning roadside units for information dissemination in urban VANET
Zhu Junyu; Huang, Chuanhe,; Fan Xiying
WASA 2016 2016,P548-559 CCF C
159Fast and accurate identification of implicit enterprise users in social media
You F Zhenni;Wu Diqian; Wang Yi; Qian Tieyun
WebDB 2016 2016 CCF C