欢迎来到北京大学大数据技术研究室

Academic Works

2015年
  1. Jia Tong, Li Ying,Yuan Xiaoyong, Tang Hongyan, Wu Zhonghai, Characterizing and Predicting Bug Assignment in OpenStack, International Conference on Trustworthy Systems and their Applications (IEEE TSA 2015), Hualien, Taiwan, July 8-9, 2015. (SCI: 000380455200002)
  2. Yuan Xiaoyong, Tang Hongyan, Li Ying, Liu Tiancheng, Wu Zhonghai, A Competitive Penalty Model for Availability Based Cloud SLA, IEEE International Conference on Cloud Computing (IEEE Cloud 2015) , New York, USA , June 27-July 2, 2015. (EI: 20161102082400)
  3. Yuan Xiaoyong, Li Ying, Wu Zhonghai, Liu Tiancheng, An Analysis on Availability Commitment and Penalty in Cloud SLA, The 39th Annual International Computers, Software & Applications Conference (COMPSAC 2015) , Tai chung, Tai wan, July 1-5, 2015. (EI: 20161502208033)
  4. Chang Guo, Qingni Shen, Zhonghai Wu. UserRank: A User Influence-based Data Distribution Optimization Method, 39th Annual International Computers, Software & Applications Conference Workshops(COMPSAC 2015) , Tai chung, Tai wan, July 1-5, 2015. (EI: 20161402203400)
  5. Hongzhi Liu, Zhonghai Wu, Xing Zhang. Feature Selection Based on Data Clustering, International Conference on Intelligent Computing (ICIC2015), Fuzhou, China, August 20-23, 2015, Springer LNCS 9225, 227-236. (EI: 20154201382028)
  6. Hongzhi Liu, Zhonghai Wu, Xing Zhang, D. Frank Hsu. An Information-Theoretic Feature Selection Method Based on Estimation of Markov Blanket, IEEE, International Conference on Cognitive Informatics & Cognitive Computing (IEEE ICCI*CC 2015), Beijing, China, July 6-8, 2015: 327-332.  (EI: 20161202119007)
  7. 王洋, 刘宏志, 吴中海. 基于非线性滤波和纹理传输的图像风格化. 计算机辅助设计与图形学学报, 2015(7):1255-1262. (EI: 20153101095374)
  8. 张齐勋, 刘宏志, 刘诗祥, 贾堂, 曹健. 基于行业专有词典的TF-IDF特征选择算法改进, 全国嵌入式系统学术会议(ESTC 2015), 北京, 中国, 10月10-11日, 2015.
  9. 姜正申, 刘宏志. 基于概率校准的集成学习. 计算机应用, 2016, 36(2):291-294.
  10. 李伟平, 王武生, 莫同, 张志超, 褚伟杰, 吴中海. 情境计算研究综述. 计算机研究与发展, 2015, 52(2):542-552. (EI: 20151400720673)
  11. Zhang Xing, Jin Cancan, Li Cong, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai. Ciphertext-policy attribute-based encryption with user and authority accountability, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15), Dallas, United states, October 26- 29, 2015, Springer International Publishing, 2015:500-518. (EI: 20160801960546)
  12. Zhang Xing, Jin Cancan, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai. Attribute-based encryption without key escrow. International Conference on Cloud Computing and Security (ICCCS’15), Nanjing, China, August 13-15, 2015, Springer International Publishing, 2015: 74-87. (EI: 20160501857258)
  13. 张星, 文子龙, 沈晴霓, 方跃坚, 吴中海. 可追责并解决密钥托管问题的属性基加密方案. 计算机研究与发展, 2015, 52(10): 2293-2303. (EI: 20154601528833)
  14. Fang Yuejian, Wen Zilong, Shen Qingni, Yang Yahui, Wu Zhonghai. POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2015), Dallas, United states, October 26- 29, 2015, Springer International Publishing, 2015: 585-589. (EI: 20160801960556)
  15. Fang Yuejian, Wen Zilong, Shen Qingni, Yang Yahui, Wu Zhonghai. SEDOSN: A secure decentralized online social networking framework. 13th National Embedded System Technology Conference (ESTC 2015), Beijing, China, October 10-11, 2015. (SCI: 000371387100007)
  16. Yang Luo, Qingni Shen, Cong Li, Kang Chen, Zhonghai Wu. Probing the Scheduling Algorithms in the Cloud Based on OpenStack. 2015 International Conference on Cloud Computing and Security (ICCCS 2015), Nanjing, China, August 13-15, 2015, Springer International Publishing, 2015: 510-520. (EI: 20160501857252)
  17. 罗杨, 张齐勋, 沈晴霓, 刘宏志, 吴中海, 多层次的Android系统权限控制方法, 软件学报, 2015, 26(Suppl.2):263-271.
  18. Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu. Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. The Seventeenth International Conference on Information and Communications Security (ICICS 2015), Singapore, December 2-4, 2015, Springer LNCS: 429-435. (EI: 20161202119625)
  19. Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li. MB-DDIVR: A Map-based Dynamic Data Integrity Verification and Recovery scheme in Cloud Storage. The 17th International Conference on Information and Communications Security (ICICS 2015), Singapore, December 2-4, 2015, Springer LNCS: 312-318. (EI: 20161202119656)

Copyright © 2002-2016 All Rights Reserved 版权所有:北京大学大数据技术研究室
联系地址:北京大学理科一号楼1544