2019年论文

2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2005 2004 2002

  1. [1] Huang N, Xu M, Zheng N, et al. Deep Android Malware Classification with API-Based Feature Graph[C]. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019: 296-303. [PDF]
  2. [2] Zhu Z, Zheng N, Qiao Tong, Xu M. Robust steganography by modifying sign of dct coefficients [J]. IEEE Access, pp. 1–1, 2019. [PDF]
  3. [3] Huang Z F, Xu J, Zhan G, et al. Passenger Searching from Taxi Traces Using HITS-Based Inference Model[C]. In: 2019 20th IEEE International Conference on Mobile Data Management (MDM). IEEE, 2019: 144-149. [PDF]
  4. [4] Wang Y, Zheng N, Xu M, Qiao T, Zhang Q, Yan F, Xu J. Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App. Sensors, 19(14), 3052. [PDF]
  5. [5] Huang M, Xu M, Qiao T, et al. Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images[J]. Journal of Universal Computer Science, 2019, 25(9): 1151-1173. [PDF]
  6. [6] 夏文菁,徐明,吴铤,郑宁.一种基于预写日志的SQLite快速数据恢复方法[J].通信技术,2019,52(08):1975-1981. [PDF]
  7. [7] Shuling Huang, Ning Zheng, Yiming Wu, Ming Xu. Resilient Consensus-Based Time Synchronization in Asynchronous Sensor Networks, IEEE Access,vol. 7, pp. 115650-115661, 2019. [PDF]
  8. [8] Quanqi. Liu, Tong. Qiao, Ming. Xu and Ning. Zheng, "Fuzzy Localization of Steganographic Flipped Bits via Modification Map," IEEE Access, vol. 7, pp. 74157-74167, 2019. [PDF]
  9. [9] Guanhua. Zhan, Jian. Xu, Zhifeng. Huang, Qiang. Zhang, Ming. Xu and Ning. Zheng, "A Semantic Sequential Correlation Based LSTM Model for Next POI Recommendation," IEEE International Conference on Mobile Data Management, Hong Kong, 2019: pp. 128-137. [PDF]