首页-->科学研究-->科研成果

近三年SCI检索论文

时间:2015-10-30 10:08:43 文章来源 : 浏览量:<span id="hitcount714552">97</span><script src="http://search.hznu.edu.cn/zcms/counter?Type=Article&ID=714552&DomID=hitcount714552"></script>

1.     Zhang MM, Lin L, Pan ZG, Xiang N. Topology-independent 3D garment fitting for virtual clothing. Multimedia Tools and Applications. 2015;74(9):3137-53.

2.     Yuan ZM, Huang C, Sun XY, Li XX, Xu DR. A microblog recommendation algorithm based on social tagging and a temporal interest evolution model. Frontiers of Information Technology & Electronic Engineering. 2015;16(7):532-40.

3.     Yu L, Liu C, Zhang ZK. Multi-linear interactive matrix factorization. Knowledge-Based Systems. 2015;85:307-15.

4.     You ZQ, Han XP, Lu LY, Yeung CH. Empirical Studies on the Network of Social Groups: The Case of Tencent QQ. PloS one. 2015;10(7):19.

5.     Yao MQ, Yang K, Xu CY, Shen JZ. Design of a novel RTD-based three-variable universal logic gate. Frontiers of Information Technology & Electronic Engineering. 2015;16(8):694-9.

6.     Xie Y, Xu WW, Yang Y, Guo XH, Zhou K. Agile structural analysis for fabrication-aware shape editing. Computer Aided Geometric Design. 2015;35-36:163-79.

7.     Xie Q, Hu B, Wu T. Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card. Nonlinear Dynam. 2015;79(4):2345-58.

8.     Xia Y, Xu W, Zhang L, Shi X, Mao K. Integrating 3D structure into traffic scene understanding with RGB-D data. Neurocomputing. 2015;151, Part 2(0):700-9.

9.     Xia Y, Wang C, Shi X, Zhang L. Vehicles overtaking detection using RGB-D data. Signal Process. 2015;112(0):98-109.

10.   Xia Y, Chen J, Wang C. Formalizing Computational Intensity of Big Traffic Data Understanding and Analysis for Parallel Computing. Neurocomputing. 2015;169:158-68.

11.   Wang S, Cao Z, Xie Q, Liu W. Practical identity-based encryption in multiple private key generator (PKG) environments. Secur Commun Netw. 2015;8(1):43-50.

12.   Tan X, Huang Q, Wong DS. Concurrent signature without random oracles. Theoretical Computer Science. 2015;562(0):194-212.

13.   Shan ZY, Zhu QQ. Camera location for real-time traffic state estimation in urban road network using big GPS data. Neurocomputing. 2015;169:134-43.

14.   Liu FC, Martin T, Yeung SK, Gross M. Efficient direct rendering of deforming surfaces via shared subdivision trees. Comput Aided Design. 2015;58:132-40.

15.   Li J, Xu WW, Cheng ZQ, Xu K, Klein R. Lightweight wrinkle synthesis for 3D facial modeling and animation. Comput Aided Design. 2015;58:117-22.

16.   Zhu FM, Li XE, Shen LF. Subwavelength guiding of channel plasmon polaritons in a semiconductor at terahertz frequencies. Appl Optics. 2014;53(26):5896-900.

17.   Zhou YZ, Xia YJ. Epidemic spreading on weighted adaptive networks. Physica A. 2014;399:16-23.

18.   Zhang CX, Zhang ZK, Yu L, Liu C, Liu H, Yan XY. Information filtering via collaborative user clustering modeling. Physica A. 2014;396:195-203.

19.   Yuan BK, Wang J, Zang YF, Liu DQ. Amplitude differences in high-frequency fMRI signals between eyes open and eyes closed resting states. Front Hum Neurosci. 2014;8.

20.   Xu WW, Umentani N, Chao QW, Mao J, Jin XG, Tong X. Sensitivity-optimized Rigging for Example-based Real-Time Clothing Synthesis. Acm T Graphic. 2014;33(4).

21.   Xu WW, Shi ZX, Xu ML, Zhou K, Wang JD, Zhou B, et al. Transductive 3D Shape Segmentation using Sparse Reconstruction. Comput Graph Forum. 2014;33(5):107-15.

22.   Xu S, Sun L, Rohde GK. Robust efficient estimation of heart rate pulse from video. Biomedical optics express. 2014;5(4):1124-35.

23.   Xie Q, Wang GL, Xia FB, Chen DR. Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme. Concurr Comp-Pract E. 2014;26(5):1038-51.

24.   Xie Q, Tan X, Wong DCS, Wang GL, Bao MJ, Dong N. A practical anonymous authentication protocol for wireless roaming. Secur Commun Netw. 2014;7(8):1264-73.

25.   Xie Q, Liu W, Wang S, Han L, Hu B, Wu T. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care. Journal of medical systems. 2014;38(9):91.

26.   Xie Q, Hu B, Tan X, Bao M, Yu X. Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network. Wireless Pers Commun. 2014;74(2):601-14.

27.   Xie Q, Hu B, Dong N, Wong DS. Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems. PloS one. 2014;9(7):e102747.

28.   Xie Q, Hong DZ, Bao MJ, Dong N, Wong DCS. Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks. Int J Distrib Sens N. 2014.

29.   Xia YJ, Zhang T, Wang SB. A Generic Methodological Framework for Cyber-ITS: Using Cyber-infrastructure in ITS Data Analysis Cases. Fund Inform. 2014;133(1):35-53.

30. Xia Y, Zhou Y. Synchronization induced by disorder of phase directions. International Journal of Modern Physics C. 2014;25(5).

31.   Ren XL, Lu LY, Liu RR, Zhang JL. Avoiding congestion in recommender systems. New J Phys. 2014;16.

32.   Liu X, Xia Y, Wang Y, Ren J. Discovering anomaly on the basis of flow estimation of alert feature distribution. Secur Commun Netw. 2014;7(10):1570-81.

33.   Hu B, Xie Q, Bao MJ, Dong N. Improvement of user authentication protocol with anonymity for wireless communications. Kuwait J Sci. 2014;41(1):155-69.

34.   Dong LD, Zhu D, Zhu CC, Xu SS. Region minimised monitor design for deadlock-prevention of (SPR)-P-4 nets. Iet Control Theory A. 2014;8(13):1224-37.

35.   Dong LD, Chi TY, Zhu CC, Yin J. Mixed Integer Programming-Based Liveness Test for FMS with Full Routing Flexibility. J Appl Math. 2014.

36.   Chen G-F, Sheu J-S. An optical music recognition system for traditional Chinese Kunqu Opera scores written in Gong-Che Notation. EURASIP Journal on Audio, Speech, and Music Processing. 2014;2014(1):7.

37.   Yao MQ, Zhang LB. Emitter-couple logic circuit design based on the threshold-arithmetic algebraic system. Journal of Zhejiang University-Science C-Computers & Electronics. 2013;14(10):808-14.

38. Xie Q, Zhao JM, Yu XY. Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dynam. 2013;74(4):1021-7.

39.   Xie Q, Zhang J, Dong N. Robust anonymous authentication scheme for telecare medical information systems. Journal of medical systems. 2013;37(2):9911.

40.   Xie Q, Dong N, Tan X, Wong DS, Wang GL. Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Inf Technol Control. 2013;42(3):231-7.

41.   Xia YJ, Li XM, Shan ZY. Parallelized Fusion on Multisensor Transportation Data: A Case Study in CyberITS. Int J Intell Syst. 2013;28(6):540-64.

42.   Xia YJ, Hu J, Fontaine MD. A Cyber-ITS Framework for Massive Traffic Data Analysis Using Cyber Infrastructure. Sci World J. 2013.

43.   Li XM, Yang GQ, Gao GC. Output SNR Analysis of the LPP-Hough Transform. Etri J. 2013;35(1):162-5.

44.   Li XM, Ju YT. Novel robust S transform based on the clipping method. J Syst Eng Electron. 2013;24(2):209-14.

45.   Chen SN, Pan ZG, Zhang MM, Shen HQ. A case study of user immersion-based systematic design for serious heritage games. Multimedia Tools and Applications. 2013;62(3):633-58.