sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · web viewfumin qi, xiao-yuan...

24

Click here to load reader

Upload: dangthu

Post on 31-Jan-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

论文题目 作者 期刊/会议名称 卷期页码 备注1 A Survey on Software Fault Localization

W. Eric Wong, Ruizhi Gao, Yihao Li, Rui Abreu, Franz Wotawa

IEEE Transactions on Software Engineering(TSE)

2016,28(8): 1971-1985 CCF A

2DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

He Kun; Chen Jing; Du Ruiying;Wu Qianhong; Xue Guoliang; Zhang Xiang

IEEE Transactions on Computers(TOC)

2016,65(12): 3631-3645 CCF A

3Write Mode Aware Loop Tiling for High Performance Low Power Volatile PCM in Embedded Systems

Qiu Keni; Li Qingan; Hu Jingtong; Zhang Weigong; Xue Chun Jason

IEEE Transactions on Computers(TOC)

2016,65(7): 2313-2324 CCF A

4Automatic Clustering via Outward Statistical Testing on Density Metrics

Wang, Guangtao; Song, QinbaoIEEE Transactions on Knowledge and Data Engineering (TKDE)

2016,28(8): 1971-1985 CCF A

5Bosting parallel fils system performance via heterogeneity-aware selective data layout

Shuibing He, Yang Wang,Xian-He SunIEEE Transactions on Parallel and Distributed Systems(TPDS)

2016,27(9): 2492-2505 CCF A

6Improving Performance of Parallel I/O Systems through Selective and Layout-Aware SSD Cache

He Shuibing; Wang Yang; Sun Xian-HeIEEE Transactions on Parallel and Distributed Systems(TPDS)

2016,27(10): 2940-2952 CCF A

7Multi-Label Dictionary Learning for Image Annotation

Jing, Xiao-Yuan,Wu, Fei,Li, Zhiqiang,Hu, Ruimin,Zhang, David

IEEE Transactions on Image Processing(TIP)

2016,25(6): 2712-2725 CCF A

8Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data

Hu Shengshan,Wang Qian, Wang Jingjun,Qin Zhan,Ren Kui

IEEE Transactions on Image Processing(TIP)

2016,25(7): 3411-3425 CCF A

9 Beyond the Sparsity-Based Target Detector: A Hybrid Sparsity and Statistics-

Du Bo,Zhang Yuxiang,Zhang Liangpei, Tao Dacheng

IEEE Transactions on Image Processing(TIP)

2016,25(11): 5345-5357 CCF A

Page 2: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

Based Detector for Hyperspectral Images

10Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Wang Huaqun*,He Debiao*,Tang Shaohua

IEEE Transactions on Information Forensics & Security(TIFS)

2016, 11(6): 1165-1176 CCF A

11

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures

He Debiao, Zeadally Sherali, Kumar Neeraj, Wu Wei

IEEE Transactions on Information Forensics & Security(TIFS)

2016,11(9): 2052-2064 CCF A

12Nopol: Automatic Repair of Conditional Statement Bugs in Java Programs

Jifeng Xuan, Matias Martinez, Favio DeMarco, Maxime Clement, Sebastian Lamelas Marcote, Thomas Durieux, Daniel Le Berre

IEEE Transactions on Software Engineering(TSE)

2016 在线 CCF A

13An Improved SDA Based Defect Prediction Framework for Both Within-Project and Cross-Project Class-Imbalance Problems

Jing Xiao-Yuan*, Wu Fei, Dong Xiwei, Xu Baowen

IEEE Transactions on Software Engineering(TSE)

2016 在线 CCF A

14Super-Resolution Person Re-Identification With Semi-Coupled Low-Rank Discriminant Dictionary Learning

Jing Xiao-Yuan*, Zhu Xiaoke, Wu Fei, Hu Ruimin,

IEEE Transactions on Image Processing(TIP)

2016 在线 CCF A

15Palette-Based Image Recoloring Using Color Decomposition Optimization

Zhang Qing, Xiao Chunxia*, Sun Hanqiu, Tang Feng

IEEE Transactions on Image Processing(TIP)

2016 在线 CCF A

16Structure-Based Low-Rank Model With Graph Nuclear Norm Regularization for Noise Removal

Ge Qi,Jing Xiao-Yuan*(通讯作者) IEEE Transactions on Image Processing(TIP)

2016 在线 CCF A

17 HARL: Optimizing Parallel File Systems with Heterogeneity-Aware Region-Level

He Shuibing, Wang Yang, Sun Xian-He, Xu, Chengzhong*

IEEE Transactions on Computers

2016 在线 CCF A

Page 3: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

Data Layout (TOC)

18Heterogeneity-Aware Collective I/O for Parallel I/O Systems with Hybrid HDD/SSD Servers

He Shuibing, Wang Yang*, Sun Xian-He, Huang, Chuanhe,Xu, Chengzhong*

IEEE Transactions on Computers(TOC)

2016 在线 CCF A

19Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks

Chen Jing*, He Kun, Yuan Quan, Xue Guoliang, Du Ruiying, Wang Lina

IEEE Transactions on Mobile Computing

2016 在线 CCF A

20AMR Steganalysis Based on Second-order Difference of Pitch Delay

Yanzhen Ren*, Jing Yang, Jinwei Wang, Lina Wang

IEEE Transaction on Information Forensics and Security

2016 在线 CCF A

21H-PARAFAC: Hierarchical Parallel Factor Analysis of Multidimensional Big Data

Dan Chen*, Yangyang Hu, Lizhe Wang, Albert Zomaya, Xiaoli Li

IEEE Transactions on Parallel and Distributed Systems

2016 在线 CCF A

22Using MinMax-Memory Claims to Improve In-Memory Workflow Computations in the Cloud

He Shuibing*, Wang Yang, Sun Xian-He, Xu, Chengzhong

IEEE Transactions on Parallel and Distributed Systems

2016 在线 CCF A

23DeyPoS:Deduplicatable Dynamic Proof of Storage for Multi-User Environments

Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang

IEEE Transactions on Computers(TOC)

2016 在线 CCF A

24Searchable Encryption over Feature-Rich Data

Wang Qian,Zou Qin,He Meiqi,Du,Minxin, Sherman S.M.Chow,Russell W.F.Lai

IEEE Transactions on Dependable and Secure Computing

2016 在线 CCF A

25Real-time and Spatio-temporal Crowd-sourced Social Network Data Publishing with Differential Privacy

Wang,Qian;Zhang,Yan;Lu,Xiao;Wang,Zhibo;Qin,Zhan;Ren,Kui

IEEE Transactions on Dependable and Secure Computing

2016 在线 CCF A

26 Alexey Vinel, A provably-secure cross- Debiao He, Neeraj Kumar, Huaqun IEEE Transactions on Depend 2016 在线 CCF A

Page 4: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

domain handshake scheme with symptoms-matching for mobile healthcare social network

Wang, Lina Wang, Kim-Kwang Raymond Choo

able and Secure Computing

27

Efficient Hierarchical Identity-Based Signature with Batch Verification for Automatic Dependent Surveillance-Broadcast System

Debiao He ; Neeraj Kumar ; Kim-Kwang Raymond Choo ; Wei Wu

IEEE Transactions on Information Forensics & Security

2016 在线 CCF A

28THEMIS:Collusion-Resistant and Fair Pricing Spectrum Auction Under Dynamic Supply

Wang,Qian;Sun Sun,Qihang;Ren,Kui;Jia,Xiaohua

IEEE Transactions on Mobile Computing

2016 在线 CCF A

29Cost-Aware Region-Level Data Placement in Multi-Tiered Parallel I/O Systems

He Shuibing, Wang YangIEEE Transactions on Parallel and Distributed Systems

2016 在线 CCF A

30Revisit of Automatic Debugging via Human Focus-tracking Analysis

Xiaoyuan Xie, Zicong Liu, Shuo Song, Zhenyu Chen, Jifeng Xuan, Baowen Xu

ICSE 2016 2016,pp.808-819 CCF A

31Missing Data Imputation Based on Low-rank Recovery and Semi-supervised Regression for Software Effort Estimation

Xiao-Yuan Jing, Fumin Qi, Fei Wu, Baowen Xu

ICSE 2016 2016,pp.607-618 CCF A

32

Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation

Fumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu, Li Cheng

ASE 2016 2016,P75-86, 2016 CCF A

33Scale-adaptive low-resolution person re-identification via learning a discriminating surface

Zheng Wang;Hu Ruimin; Yu Yi; Jiang Junjun; Chao Liang; Jinqiao Wang

IJCAI 2016 2016, P2669-2675 CCF A

34 Joint Models for Extracting Adverse Drug Fei Li, Yue Zhang, Meishan Zhang, IJCAI 2016 2016, P2838-2844 CCF A

Page 5: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

Events from Biomedical Text Donghong Ji*

35Video-based person re-identification by simultaneously learning intra-video and inter-video distance metrics

Zhu Xiaoke,Jing Xiaoyuan*,Wu Fei,Hui Feng

IJCAI 2016 2016,P 3552-3558 CCF A

36Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data

Wang Qian,Hu Shengshan, Wang Jingjun, Wang Zhibo

INFOCOM 2016 2016 CCF A

37RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy

Wang Qian Zhang Yan,Lu Xiao,Wang Zhibo,Qin Zhang,Ren Kui

INFOCOM 2016 2016 CCF A

38An Efficient Auction Mechanism for Service Chains in The NFV Market

Sijia Gu, Zongpeng Li, Chuan Wu, Chuanhe Huang

INFOCOM 2016 2016 CCF A

39Topic Modeling for Short Texts with Auxiliary Word Embeddings

Chenliang Li *, Haoran, Wang, Zhiqian Zhang, Aixin Sun, Zongyang Ma

SIGIR 2016(Best Student Paper Award Honorable Mention)

2016,P165-174 CCF A

40Messages Behind the Sound:Real-Time Hidden Acoustic Signal Capture with Smartphones

Wang,Qian;Ren,Kui;Zhou,Man;Lei,TaoMOBICOM 2016

2016,P29-41 CCF A

41Multidomain Subspace Classification for Hyperspectral Images

Zhang Liangpei; Zhu Xiaojie; Zhang Lefei

IEEE Transactions on Geoscience and Remote Sensing

2016,54(10): 6138-6150 CCF B

42Knowledge-Based Coding of Objects for Multisource Surveillance Video Data

Xiao Jin; Hu Ruimin; Liao, Liang Chen Yu; Wang Zhongyuan; Xiong Zixiang

IEEE Transactions on Multimedia

2016,18(9): 1691-1706 CCF B

43 Person Reidentification via Ranking Aggregation of Similarity Pulling and

Ye Mang; Liang Cha; Yu Yi; Wang Zheng; Leng Qingming; Xiao, Chunxia;

IEEE Transactions on Multimedia

2016,18(12): 2553-2566 CCF B

Page 6: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

Dissimilarity Pushing Chen Jun; Hu, Ruimin

44Fast Service Process Fragment Indexing and Ranking

Zeng Cheng; Zhang Tao; Hung Patrick C. K

IEEE Transactions on Services Computing

2016,9(5): 672-685 CCF B

45Query Expansion Based on Crowd Knowledge for Code Search

Nie Liming; Jiang He; Ren Zhilei; Sun Zeyi; Li, Xiaochen

IEEE Transactions on Services Computing

2016,9(5): 771-783 CCF B

46Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks

Wang Qian; Ren Kui; Ning Peng; Hu Shengshan

IEEE Transactions on Vehicular Technology

2016,65(10): 8331-8344 CCF B

47Multiple kernel ensemble learning for software defect prediction

Wang Tiejian; Zhang Zhiwu; Jing Xiaoyuan; Zhang Liqiang

Automated Software Engineering

2016,23(4): 569-590CCF B

48Measure controllable volumetric mesh parameterization

Su Kehua; Chen Wei; Lei Na; Cui Li; Jiang Jian; Gu Xianfeng David

Computer-Aided Design 2016,78(): 188-198 CCF B

49Area-preserving mesh parameterization for poly-annulus surfaces based on optimal mass transportation

Su Kehua; Cui Li; Qian Kun; Lei Na; Zhang Junwei; Zhang Min; Gu Xianfeng David

Computer Aided Geometric Design

2016,46(): 76-91 CCF B

50Geometrically Based Linear Iterative Clustering for Quantitative Feature Correspondence

Yan Qingan; Yang Long; Liang, Chao; Liu Huajun; Hu Ruimin; Xiao, Chunxia

Computer Graphics Forum 2016,35(7): 1-10 CCF B

51A Distributed File System with Variable Sized Objects for Enhanced Random Writes

Gong Yili; Hu Chuang; Xu Yanyan; Wang Wenjie

Computer Journal 2016,59(10): 1536-1550 CCF B

52Context-Aware Integrated Scheme for Mobile Cloud Service Allocation

Li Chunlin; Li LaYuan Computer Journal 2016,59(1): 47-63 CCF B

53 Distributed Greedy Coding-aware Deterministic Routing for multi-flow in

Chen Jing; He Kun; Yuan Quan; Du Ruiying; Wang Lina; Wu Jie

Computer Networks 2016,105(): 194-206 CCF B

Page 7: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

wireless networks

54Automatic repair of real bugs in java: a large-scale experiment on the defects4j dataset

Martinez, Matias; Durieux, Thomas; Sommerard, Romain; Xuan, Jifeng; Monperrus, Martin

Empirical Software Engineering

2016,P1-29 CCF B

55B-Refactoring: Automatic test code refactoring to improve dynamic analysis

Xuan Jifeng; Cornu Benoit; Martinez Matias; Baudry Benoit; Seinturier Lionel; Monperrus Martin

Information And Software Technology

2016,76(): 65-80 CCF B

56Exploiting flexible-constrained K-means clustering with word embedding for aspect-phrase grouping

Xiong Shufeng; Ji Donghong Information Sciences 2016,367(): 689-699 CCF B

57Prioritizing Test Cases for Memory Leaks in Android Applications

Qian Ju; Zhou DiJournal Of Computer Science And Technology

2016,31(5): 869-882 CCF B

58Summarizing Software Artifacts: A Literature Review

Nazar Najam; Hu Yan; Jiang HeJournal Of Computer Science And Technology

2016,31(5): 883-909 CCF B

59A systematic mapping study on the combination of software architecture and agile development

Yang Chen; Liang, Peng; Avgeriou ParisJournal of Systems and Software

2016,111: 157-184CCF B

60A survey on software architectural assumptions

Yang Chen; Liang Peng; Avgeriou ParisJournal of Systems and Software

2016,113: 362-380CCF B

61METRIC: METamorphic Relation Identification based on the Category-choice framework

Chen Tsong Yueh; Poon Pak-Lok; Xie, Xiaoyuan

Journal of Systems and Software

2016,116: 177-190 CCF B

62A machine learning based software process model recommendation method

Song Qinbao; Zhu Xiaoyan; Wang Guangtao; Sun Heli; Jiang He; Xue Chenhao; Xu Baowen; Song Wei

Journal of Systems and Software

2016,118: 85-100 CCF B

Page 8: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

63Multi-spectral low-rank structured dictionary learning for face recognition

Jing Xiao-Yuan; Wu Fei; Zhu Xiaoke; Dong Xiwei; Ma Fei; Li Zhiqiang

Pattern Recognition 2016,59: 14-25 CCF B

64Class relatedness oriented-discriminative dictionary learning for multiclass image classification

Zhang Dongyu; Liu Pengju; Zhang Kai; Zhang Hongzhi; Wang Qing; Jing, Xiaoyuan

Pattern Recognition 2016,59: 168-175 CCF B

65Uncorrelated multi-set feature learning for color face recognition

Wu Fei; Jing Xiao-Yuan; Dong Xiwei; Yue Dong;Wu Songsong; Liu Qian; Yang Jing-Yu

Pattern Recognition 2016,60: 630-646 CCF B

66One-to-many authentication for access control in mobile pay-TV systems

He Debiao; Kumar Neeraj; Shen Han; Lee Jong-Hyouk

Science China-Information Sciences

2016,59(5): CCF B

67Dynamic strategy based parallel ant colony optimization on GPUs for TSPs

Zhou Yi; He Fazhi; Qiu YiminScience China-Information Sciences

2016,60(6): CCF B

68Non-negative sparse-based SemiBoost for software defect prediction

Wang Tiejian; Zhang Zhiwu; Jing Xiaoyuan; Liu Yanli

Software Testing Verification & Reliability

2016,26(7): 498-515 CCF B

69Semi-supervised graph cut algorithm for drug repositioning by integrating drug, disease and genomic associations

Wu Guangsheng; Liu Juan; Wang Caihua

BIBM 2016 2016,P223-228 CCF B

70The prediction of human splicing branchpoints by multi-label learning

Zhang Wen; Zhu Xiaopeng; Fu Yu; Tsuji Junko; Weng Zhiping

BIBM 2016 2016,p 254-259 CCF B

71Integration of multiple heterogeneous omics data

Zhang Chuanchao,Liu Juan,Shi Qiangqian

BIBM 2016 2016,P564-569 CCF B

72Drug side effect prediction through linear neighborhoods and multiple data source integration

Zhang Wen; Chen Yanlin; Tu Shikui; Liu Feng; Qu Qianlong

BIBM 2016 2016,p 427-434 CCF B

Page 9: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

73Effective document labeling with very few seed words: A topic modeling approach

Li Chenliang; Xing Jian; Sun Aixin; Ma Zongyang

CIKM 2016 2016,P85-94 CCF B

74Efficiently mining homomorphic patterns from large data trees

Wu Xiaoying;Theodoratos Dimitri; Peng Zhiyong

DASFAA 2016v 9642, p 180-196, 2016

CCF B

75Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor

Wang Qian*; Hu Shengshan; Wang Jingjun; Ren Kui

ICDCS 2016 2016,P700-710 CCF B

76 Boosted local classifiers for visual trackingRuan Weijian;Chen Jun; Wang Jinqiao; Luo Bo; Huang Wenjun; Hu Ruimin

ICME 2016 2016-August CCF B

77Multichannel reduction based on sound field within two ears

Li Dengshi,Hu Ruimin,Wang Xiaochen ICME 2016 2016 CCF B

78

Distance learning by treating negative samples differently and exploiting impostors with symmetric triplet constraint for person re-identification

Zhu Xiaoke; Jing Xiao-Yuan; Wu Fei; Zheng Weishi; Hu Ruimin; Xiao, Chunxia

ICME 2016 2016 CCF B

79Service recommendation based on social balance theory and collaborative filtering

Qi Lianyong;Dou Wanchun; Zhang Xuyun

ICSOC 2016 2016, P637-645 CCF B

80

Mashup service clustering based on an integration of service content and network via exploiting a two-level topic model

Cao Buqing,Liu Xiaoqing,Li Bing ICWS 2016 2016,p212-219 CCF B

81Efficient computation of ordering relations with time and probability constraints for workflow models

Huang Hua,Peng Rong,Feng Zaiwen ICWS 2016 2016,P546-553 CCF B

Page 10: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

82Interpolant synthesis for quadratic polynomial inequalities and combination with EUF

Gan Ting;Dai, Liyun; Xia Bican; Zhan Naijun; Kapur Deepak; Chen Mingshuai

IJCAR 2016 2016, P195-212 CCF B

83The Impact of Feature Selection on Defect Prediction Performance: An Empirical Comparison

Xu Zhou; Liu Jin; Yang Zijiang; An Gege; Jia Xiangyang

ISSRE 2016 2016,P309-320 CCF B

84Analyzing inter-objective relationships: A case study of software upgradability

Ren Zhilei;Jiang He; Xuan Jifeng; Tang, Ke; Hu Yan

PPSN 2016 2016, p 442-452 CCF B

85Technical debt in MDE: A case study on GMF/EMF-based projects

He Xiao*; Avgeriou Paris*; Liang Peng; Li Zengyang

MODELS 2016 2016, p 162-172 CCF B

86

MICHAC: Defect prediction via feature selection based on Maximal Information Coefficient with Hierarchical Agglomerative Clustering

Xu Zhou,Xuan Jifeng,Liu Jin,Cui Xiaohui SANER 2016 2016,P370-381 CCF B

87A multiple template approach for robust tracking of fast motion target

Sun Jun; He Fa-zhi; Chen Yi-lin; Chen Xiao

Applied Mathematics-A Journal of Chinese Universities Series B

2016,31(2): 177-197 CCF C

88A genetic algorithm-based weighted ensemble method for predicting transposon-derived piRNAs

Li Dingfang; Luo Longqiang; Zhang Wen; Liu Feng; Luo Fei

BMC Bioinformatics 2016,17(1): CCF C

89BioSynther: a customized biosynthetic potential explorer

Tu Weizhong; Zhang Haoran; Liu Juan; Hu, Qian-Nan

Bioinformatics 2016,32(3): 472-473 CCF C

90Meta-operation conflict resolution for human-human interaction in collaborative feature-based CAD systems

Cheng Yuan; He Fazhi; Wu Yiqi; Zhang Dejun

Cluster Computing 2016,19(1): 237-253 CCF C

Page 11: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

91Supervised feature selection method via potential value estimation

Zhao Long; Jiang LinFeng; Dong XiangJun

Cluster Computing 2016,19(4): 2039-2049 CCF C

92

A new crossover mechanism for genetic algorithms with variable-length chromosomes for path optimization problems

Zhang Qiongbing; Ding LixinExpert Systems With Applications

2016,60(): 183-189 CCF C

93Source code fragment summarization with small-scale crowdsourcing based features

Nazar Najam; Jiang He; Gao Guojun; Zhang Tao; Li Xiaochen; Ren Zhilei

Frontiers of Computer Science

2016,10(3): 504-517 CCF C

94Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography

He Debiao; Wang Huaqun; Khan Muhammad Khurram; Wang Lina

IET Communications 2016,10(14): 1795-1802 CCF C

95

A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem

Shen Han; Kumar Neeraj; He Debiao; Shen Jian; Chilamkurti Naveen

Journal Of Supercomputing 2016,72(9): 3588-3600 CCF C

96Template-Based Bitmap View Selection for Optimizing Queries Over Tree Data

Wu Xiaoying; Theodoratos DimitriInternational Journal of Cooperative Information Systems

2016,25(3): 1-28 CCF C

97An Empirical Study of Ranking-Oriented Cross-Project Software Defect Prediction

You Guoan; Wang Feng; Ma YutaoInternational Journal of Software Engineering and Knowledge Engineering

2016,26(9-10): 1511-1538

CCF C

98Exploiting Correlation Subspace to Predict Heterogeneous Cross-Project Defects

Cheng Ming; Wu Guoqing; Wan Hongyan; You Guoan; Yuan, Mengting; Jiang Min

International Journal of Software Engineering and Knowledge Engineering

2016,26(9-10): 1571-1580

CCF C

Page 12: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

99 A Multi-Source Approach for Bug TriageLiu Jin; Tian Yiqiuzi; Yu Xiao; Yang Zhijiang; Jia Xiangyang; Ma Chuanxiang; Xu Zheng

International Journal of Software Engineering and Knowledge Engineering

2016,26(9-10): 1593-1604

CCF C

100Critical data points-based unsupervised linear dimension reduction technology for science data

Wu Di; Xiong Naixue; He Jinrong; Huang Chuanhe

Journal of Supercomputing 2016,72(8): 2962-2976 CCF C

101Optimization of parallel iterated local search algorithms on graphics processing unit

Zhou Yi; He Fazhi; Qiu Yimin Journal of Supercomputing 2016,72(6): 2394-2416 CCF C

102A formalized framework for incorporating expert labels in crowdsourcing environment

Hu Qingyang; He Qinming; Huang Hao; Chiew Kevin; Liu Zhenguang

Journal of Intelligent Information Systems

2016,47(3): 403-425 CCF C

103Security analysis of a user registration approach

Luo Min; Zhang Jingyin; He Debiao; Shen Jian

Journal of Supercomputing 2016,72(3): 900-903 CCF C

104Score level fusion method based on multiple oblique gradient operators for face recognition

Li Zhaokui; Ding Lixin; Wang YanMultimedia Tools and Applications

2016,75(2): 819-837 CCF C

105Group recursive discriminant subspace learning with image set decomposition

Wu Fei; Jing Xiao-Yuan; Yao Yong-Fang; Yue Dong; Chen Jun

Neural Computing & Applications

2016,27(6): 1693-1706 CCF C

106Empirical analysis: stock market prediction via extreme learning machine

Li Xiaodong; Xie Haoran; Wang Ran; Cai Yi; Cao Jingjing; Wang, Feng; Min Huaqing; Deng Xiaotie

Neural Computing & Applications

2016,27(1): 67-78 CCF C

107Tri-Training for authorship attribution with limited training data: a comprehensive study

Qian Tieyun; Liu Bing; Chen Li; Peng Zhiyong; Zhong Ming; He Guoliang; Li Xuhui

Neurocomputing 2016,171: 798-806 CCF C

Page 13: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

108

A batch-mode active learning framework by querying discriminative and representative samples for hyperspectral image classification

Wang Zengmao; Du Bo; Zhang Lefei; Zhang Liangpei

Neurocomputing 2016,179: 88-100 CCF C

109Probabilistic skyline queries on uncertain time series

He Guoliang; Chen Lu; Zeng Chen; Zheng Qiaoxian; Zhou Guofu

Neurocomputing 2016,191: 224-237 CCF C

110Local Rademacher complexity bounds based on covering numbers

Lei Yunwen; Ding Lixin; Bi Yingzhou Neurocomputing 2016,218: 320-330 CCF C

111Online social trust reinforced personalized recommendation

Cheng Yuehua; Liu Jin; Yu XiaoPersonal and Ubiquitous Computing

2016,20(3): 457-467 CCF C

112Automatically constructing course dependence graph based on association semantic link model

Zhou Pingyi; Liu Jin; Yang Xianzhao; Cui Xiaohui; Chang Liang; Zhang Shunxiang

Personal and Ubiquitous Computing

2016,20(5): 731-742 CCF C

113An energy-efficient source-anonymity protocol in surveillance systems

Niu Xiaoguang; Zhang Yihao; Yao Yalan; Chen Xu; Jornet Josep Miquel;Liu Jin

Personal and Ubiquitous Computing

2016,20(5): 771-783 CCF C

114Cryptanalysis of a certificateless aggregate signature scheme with efficient verification

Shen Han; Chen Jianhua; Shen Jian; He Debiao

Security and Communication Networks

2016,9(13): 2217-2221 CCF C

115Message-locked proof of ownership and retrievability with remote repairing in cloud

Chen Jing; Zhang Lihong; He Kun; Chen Min; Du Ruiying; Wang Lina

Security and Communication Networks

2016,9(16): 3452-3466 CCF C

116A dynamic trust evaluation mechanism based on affective intensity computing

Zhou Guoqiang; Wang Kuang; Zhao Chen; Zhou Guofu

Security and Communication Networks

2016,9(16): 3752-37611 CCF C

117 A gamma-Strawman privacy-preserving Chen Jing; Zhang Bowen; Chen Min; Security and Communication 2016,9(18): 5625-5638 CCF C

Page 14: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

scheme in weighted social networks Yuan Quan; Du Ruiying Networks

118Gaussian bare-bones artificial bee colony algorithm

Zhou Xinyu; Wu Zhijian; Wang Hui; Rahnamayan Shahryar

Soft Computing 2016,20(3): 907-924 CCF C

119Interactive differential evolution for user-oriented image retrieval system

Yu Fei; Li Yuanxiang; Wei Bo; Kuang Li Soft Computing 2016,20(2): 449-463 CCF C

120

Exploring mutual information-based sentimental analysis with kernel-based extreme learning machine for stock prediction

Wang Feng; Zhang Yongquan; Rao Qi; Li Kangshun; Zhang Hao

Soft Computing 2016 在线 CCF C

121Distance field guided L1-median skeleton extraction

Song Chengfang; Pang Zhiqiang; Jing Xiaoyuan; Xiao Chunxia

Visual Computer p 1-13,2016 CCF C

122Privacy-preserving data aggregation scheme against internal attackers in smart grids

He Debiao; Kumar Neeraj; Lee Jong-Hyouk

Wireless Networks 2016,22(2): 491-502 CCF C

123Modeling for noisy labels of crowd workers

Yan Qian; Huang Hao; Gao Yunjun; Ying Chen; Hu Qingyang; Qian Tieyun; He, Qinming

APWeb 2016 2016, p 227-238 CCF C

124Provably secure threshold paillier encryption based on hyperplane geometry

Xia Zhe;Yang Xiaoyun; Xiao Min; He Debiao

ACISP 2016 2016, p 73-86 CCF C

125A Comparative Study of the Effects of Pull Request on GitHub Projects Liu Jing; Li, Jiahao; He Lulu COMPSAC 2016 2016,P133-142 CCF C

126Code Coverage-Based Failure Proximity without Test Oracles Tu Jingxuan,Xie Xiaoyuan,Xu Baowen COMPSAC 2016 2016,P313-322 CCF C

127 Mining arbitrary shaped clusters and Huang Hao;Wang Song; Wu DEXA 2016 2016, p 153-168 CCF C

Page 15: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

outputting a high quality dendrogramShuangke; Gao Yunjun; Lu Wei; He Qinming; Ying Shi

128Inferring lurkers’ gender by their interest tags

Zhu Peisong;Qian Tieyun; You Zhenni; Li Xuhui

DEXA 2016 2016, p 263-271 CCF C

129A reverse nearest neighbor based active semi-supervised learning method for multivariate time series classification

Li Yifei;He Guoliang; Xia, Xuewen; Li Yuanxiang

DEXA 2016 2016, p 272-286 CCF C

130An approach for prioritizing software features based on node centrality in probability network

Peng Zhenlian; Wang Jian; He Keqing; Li Hongtao

ICSR 2016 2016,P106-121 CCF C

131A ctive learning for multivariate time series classification with positive unlabeled data

He Guoliang; Duan Yong; Li Yifei; Qian Tieyun; He Jinrong; Jia Xiangyang

ICTAI 2016 2016,p178-185 CCF C

132Learning user embedding representation for gender prediction

Chen Li;Qian Tieyun; Zhu Peisong; You Zhenni

ICTAI 2016 2016,P263-269 CCF C

133Geodesic-based pavement shadow removal revisited

Zou Qin;Hu, Zhongwen; Chen Long; Wang Qian; Li Qingquan

ICASSP 2016 2016, p 1761-1765 CCF C

134Inferring users’ gender from interests: A tag embedding approach

Zhu Peisong;Qian Tieyun; Zhong Ming; Li Xuhui

ICONIP 2016 2016, p86-94 CCF C

135Robust Sparse Subspace Learning for unsupervised feature selection

Wang Feng,Rao Qi,Zhang Yongquan,Chen Xu

IJCNN 2016 2016,P4205-4212 CCF C

136Sparse tensor discriminative locality alignment for gait recognition

Zhao Nengwen,Zhang Lefei,Du Bo IJCNN 2016 2016, p 4489-4495 CCF C

137Denoising auto-encoders toward robust unsupervised feature representation

Xiong Wei,Du Bo,Zhang Lefei IJCNN 2016 2016,P4721-4728 CCF C

Page 16: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

138Public integrity auditing for dynamic regenerating code based cloud storage

He Kai, Huang Chuanhe,Shi Jiaoli ISCC 2016 2016,P581-588 CCF C

139Research on perception sensitivity of elevation angle in 3D sound field

Wu Yafei;Wang Xiaochen; Yang Cheng; Gao Ge; Chen Wei

PCM 2016 p 242-249, 2016 CCF C

140Fine-grained vehicle recognition in traffic surveillance

Wang Qi;Wang Zhongyuan; Xiao Jing; Xiao Jun; Li Wenbin

PCM 2016 2016, p 285-295 CCF C

141Head related transfer function interpolation based on aligning operation

Wu Tingzhao;Hu Ruimin; Wang Xiaochen; Gao Li; Ke Shanfa

PCM 2016 2016, p 418-427 CCF C

142An analysis-oriented ROI based coding approach on surveillance video data

Liao Liang;Hu Ruimin; Xiao Jing; Zhan Gen; Chen Yu; Xiao Jun

PCM 2016 2016, p 428-438 CCF C

143A stepwise frontal face synthesis approach for large pose non-frontal facial image

Wei Xueli;Hu Ruimin; Han Zhen; Chen Liang; Ding Xin

PCM 2016 2016, p 439-448 CCF C

144Salient object detection in video based on dynamic attention center

Shao Mengling;Hu Ruimin; Wang Xu; Wang Zhongyuan; Xiao Jing; Gao Ge

PCM 2016 2016, p 458-468 CCF C

145Criminal investigation oriented saliency detection for surveillance videos

Chen Yu;Hu Ruimin; Xiao Jing; Liao Liang; Xiao Jun; Zhan Gen

PCM 2016 2016, p 487-496 CCF C

146Audio bandwidth extension using audio super-resolution

Lin Jiang,Ruimin Hu,Xiaochen Wang PCM 2016 2016, p 540-549 CCF C

147An approach of service discovery based on service goal clustering

Zhang Neng; Wang Jian; He Keqing; Li Zheng

SCC 2016 2016,P114-121 CCF C

148Where to fix temporal violations: A novel handling point selection strategy for business cloud workflows

Luo Haoyu,Liu Xaio,Liu Jin SCC 2016 2016,P155-162 CCF C

149A time-aware method to process behavioral similarity calculation

Huang Hua,Peng Rong,Feng Zaiwen SCC 2016 2016,P395-402 CCF C

Page 17: sklse.whu.edu.cnsklse.whu.edu.cn/sklse/data/attachment/file/...  · Web viewFumin Qi, Xiao-Yuan Jing*, Xiaoke Zhu, Fei Wu ... Gong Yili; Hu Chuang; Xu Yanyan ... Exploiting flexible-constrained

150A ranking-oriented approach to cross-project software defect prediction: An empirical study

You Guoan;Ma Yutao SEKE 2016 2016,P159-164 CCF C

151Heterogeneous defect prediction via exploiting correlation subspace

Cheng Ming,Wu Guoqing,Jiang Min SEKE 2016 2016,P171-176 CCF C

152Developer recommendation with awareness of accuracy and cost

Liu Jin,Tian Yiqiuzi,Hong Liang SEKE 2016 2016,P213-218 CCF C

153A multi-source tradaboost approach for cross-company defect prediction

Yu Xiao; Liu Jin*; Fu Mandi, ; Ma Chuanxiang*; Nie Guoping4; Chen Xu

SEKE 2016 2016,P237-242 CCF C

154Securing fast learning! Ridge regression over encrypted big data

Hu Shengshan,Wang QianWang JingjunTrustCom/BigDataSE/ISPA 2016

2016,P19-26 CCF C

155Virtual TPM dynamic trust extension suitable for frequent migrations

Yu Fajiang*; Chen Lie; Zhang HuanguoTrustCom/BigDataSE/ISPA 2016

2016,P57-65 CCF C

156Android app malicious behavior detection based on user intention

Fu Jianming;Li Pengwei; Lin, Yan; Ding Shuang

TrustCom/BigDataSE/ISPA 2016

2016,P560-567 CCF C

157OSim: An OLAP-based similarity search service solver for dynamic information networks

Niu Xiaoguang;Zhang Yihao; Huang Ting; Wu Xiaoping

WASA 2016 2016, 536-547 CCF C

158Planning roadside units for information dissemination in urban VANET

Zhu Junyu; Huang, Chuanhe,; Fan Xiying

WASA 2016 2016,P548-559 CCF C

159Fast and accurate identification of implicit enterprise users in social media

You F Zhenni;Wu Diqian; Wang Yi; Qian Tieyun

WebDB 2016 2016 CCF C