中文|English>>
Publications
Dependable and Secure Computing Laboratory (DSCL)
Publications

  1. Dongdong Zhao, Xiaoyi Hu, Jing Tian, Shengwu Xiong, Jianwen Xiang: Iris Template Protection Based on Randomized Response Technique and Aggregated Block Information ISSRE 2018: 248-258
  2. Jianwen Xiang, Caisheng Weng, Dongdong Zhao, Jing Tian, Shengwu Xiong, Lin Li, Artur Andrzejak: A New Software Rejuvenation Model for Android. ISSREW 2018: 293-299
  3. Zhongwei Xie, Lin Li, Xian Zhong, Luo Zhong, Qing Xie, Jianwen Xiang:A hybrid Model Reuse Traning Approach for Multilingula OCR. WISE 2018: 497-512
  4. Ruoyu Wang, Guoqiang Li, Jianwen Xiang, Hongming Cai: A Customised Automata Algorithm and Toolkit for Language Learning and Application. IJBDI 5(1/2): 114-123 (2018)
  5. Dongdong Zhao, Shu Fang, Jianwen Xiang, Jing Tian, Shengwu Xiong: Iris Template Protection Based on Local Ranking. Security and Communication Networks 2018: 4519548:1-4519548:9 (2018)
  6. KPN Jayasena, Lin Li, Mohamed Abd Elaziz, Shengwu Xiong, Jianwen Xiang:Optimizing the energy efficient VM consolidation by a multi-objective algorithm. CSCWD 2018: 81-86
  7. Xing Liu, Haiying Zhou, Jianwen Xiang, Shengwu Xiong, Kun Mean Hou, Christophe De Vaulx, Huan Wang, Tianhui Shen, Qing Wang: Energy and Delay Optimization of Heterogeneous Multicore Wireless Multimedia Sensor Nodes by Adaptive Genetic-Simulated Annealing Algorithm. Wireless Communications and Mobile Computing 2018 (2018)
  8. Jianwen Xiang, Shu Fang, Dongdong Zhao, Jing Tian, Shengwu Xiong, Dong Li, Chunhui Yang:Handling Unreasonable Data in Negative Surveys. DASFAA (2) 2018: 395-403
  9. Yang Liu, Lin Li, Jianwen Xiang: Using Clustering Labels to Supervise Mashup Service Classification. ER Workshops 2018: 35-38
  10. Shouyu Huo, Dongdong Zhao, Xing Liu, Jianwen Xiang*, Yingshou Zhong, Haiguo Yu:Using Machine Learning for Software Aging Detection in Android System. ICACI 2018: 741-746
  11. Erqing Li, Chuangming Xia, Dongdong Zhao, Liping Lu, Jianwen Xiang*, Yueying He, Jin Wang*, Jiangning Wu: Improved Heatmap Visualization of Pareto-Optimal Set in Multi-Objective Optimization of Defensive Strategy. QRS Companion 2018: 345-352
  12. Junwei Zhou, Fang Liu, Lee-Ming Cheng: Image authentication using distributed arithmetic coding. Multimedia Tools Appl. 77(12): 15505-15520 (2018)
  13. Hao Jiang, Wenjian Luo, Dongdong Zhao: A Novel Negative Location Collection Method for Finding Aggregated Locations. IEEE Trans. Intelligent Transportation Systems 19(6): 1741-1753 (2018)
  14. Dongdong Zhao, Wenjian Luo, Ran Liu and Lihua Yue. Negative Iris Recognition. IEEE Transactions on Dependable and Secure Computing, 15(1): 112 - 125, January, 2018

  1. Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno: Lifetime Extension of Software Execution Subject to Aging. IEEE Trans. Reliability 66(1): 123-134 (2017)
  2. Jianguo Wu, Jianwen Xiang, Dongdong Zhao, Huanhuan Li, Qing Xie, Xiaoyi Hu: Negative Survey with Manual Selection: A Case Study in Chinese Universities . APWeb/WAIM (1) 2017: 57-65
  3. Yiyun Pan, Junwei Zhou, Yongsheng Gao, Jianwen Xiang, Shengwu Xiong, Yanchao Yang: Robust Facial Landmark Localization Using LBP Histogram Correlation Based Initialization. FG 2017: 619-625
  4. Chunhui Yang, Yan Gao, Xuedong Kong, Dingfang Chen, Shengwu Xiong, Jianwen Xiang: Analysis and Estimate the Effect of Knowledge on Software Reliability Distribution. HCC 2017: 561-570
  5. Xiaohong Zhang, Jianwen Xiang, Shengwu Xiong:Shape retrieval using multiscale ellipse descriptor. ICIP 2017: 1042-1046
  6. Caisheng Weng, Dongdong Zhao, Liping Lu, Jianwen Xiang*, Chunhui Yang, Dong Li: A Rejuvenation Strategy in Android. ISSRE Workshops 2017: 273-279
  7. Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang*:An Ontology-Based Knowledge Sharing Portal for Software Testing. QRS Companion 2017: 472-479
  8. Jing Sun, Van-Nam Huynh, Yoshiteru Nakamori, Jianguo Wu, Jing Tian, Jianwen Xiang: Knowledge Management in Graduate Research. QRS Companion 2017: 480-485
  9. Jianguo Wu, Dongdong Zhao, Liping Lu, Jing Tian, Jianwen Xiang*: A Comparative Study of Knowledge Management on Undergraduate by Questionnaire. QRS Companion 2017: 486-492
  10. Shanmuganathan Vasanthapriyan, Jianwen Xiang, Jing Tian, Shengwu Xiong: Knowledge Synthesis in Software Industries: a survey in Sri Lanka. Knowledge Management Research & Practice 15(3): 413-430
  11. Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang*: An Ontology-based Knowledge Management System for Software Testing. SEKE 2017: 230-235
  12. Xinrong Wu, Junwei Zhou, Yiyun Pan: Initial Shape Pool Construction for Facial Landmark Localization Under Occlusion. IEEE Access 5: 16649-16655 (2017)
  13. Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen: Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017)
  14. J. Zhou, F. Liu, and L.-M. Cheng, "Image authentication using distributed arithmetic coding," Multimedia Tools and Applications, pp. 1-16, 2017. (SCI, JCR: Q2)
  15. L. Harn, C.-F. Hsu, Z. Xia, and J. Zhou, " How to share secret efficiently over networks," Security and Communication Networks, vol. 1, pp. 1-7, 2017. (SCI: JCR: Q3)
  16. L. Chen, G. Zhao, J. Zhou*, and L. Kuang, "Real-time traffic sign classification using combined convolutional neural networks," Asian Conference on Pattern Recognition, pp. 1-6, 2017.
  17. G. Zhao, X. Zi, K. Liang, Y. Pan and J. Zhou*, "A modified segmentation approach for overlapping elliptical objects with various sizes," 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 1-15.
  18. Dongdong Zhao, Wenjian Luo: One-time password authentication scheme based on the negative database. Eng. Appl. of AI 62: 396-404 (2017)
  19. Wenjian Luo, Yihui Lu, Dongdong Zhao, Hao Jiang: On Location and Trace Privacy of the Moving Object Using the Negative Survey. IEEE Trans. Emerging Topics in Comput. Intellig. 1(2): 125-134 (2017)
  20. Dongdong Zhao, Wenjian Luo, Ran Liu, Lihua Yue: Experimental analyses of the K-hidden algorithm. Eng. Appl. of AI 62: 331-340 (2017)
  21. Wenjian Luo, Hao Jiang and Dongdong Zhao. Rating Credits of Online Merchants Using Negative Ranks. IEEE Transactions on Emerging Topics in Computational Intelligence, 1(5): 354 - 365, October, 2017

  1. Chuangming Xia, Jing Tian, Erqing Li, Junwei Zhou, Jianwen Xiang, Jin Wang, Liang Bai, Yueying He: An Efficient Tool for Industrial Control System Security Analysis. DASC/PiCom/DataCom/CyberSciTech 2016: 424-427
  2. Caisheng Weng, Jianwen Xiang, Shengwu Xiong, Dongdong Zhao, Chunhui Yang:Analysis of Software Aging in Android.ISSRE Workshops 2016: 78-83
  3. Hanbing Yao, Nana Xing, Junwei Zhou, Zhe Xia: Secure Index for Resource-Constraint Mobile Devices in Cloud Computing. IEEE Access 4: 9119-9128 (2016)
  4. Yanchao Yang, Junwei Zhou, Feipeng Duan, Fang Liu, Lee-Ming Cheng: Wave atom transform based image hashing using distributed source coding. J. Inf. Sec. Appl. 31: 75-82 (2016)
  5. Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu, Jianyong Chen, Weixin Xie: An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing. IEEE Trans. Information Forensics and Security 11(6): 1265-1277 (2016)
  6. Abdelghani Dahou, Shengwu Xiong, Junwei Zhou, Mohamed Houcine Haddoud, Pengfei Duan: Word Embeddings and Convolutional Neural Network for Arabic Sentiment Classification. COLING 2016: 2418-2427
  7. Chuangming Xia, Jing Tian, Erqing Li, Junwei Zhou, Jianwen Xiang, Jin Wang, Liang Bai, Yueying He: An Efficient Tool for Industrial Control System Security Analysis. DASC/PiCom/DataCom/CyberSciTech 2016: 424-427
  8. Ning Wang, Zhe Xia, Jianwen Xiang: Editorial: Special issue on security and dependability of internet of things. J. Inf. Sec. Appl. 31: 1-2 (2016)
  9. Dongdong Zhao, Wenjian Luo, Lihua Yue: Reconstructing Positive Surveys from Negative Surveys with Background Knowledge. DMBD 2016: 86-99

  1. Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno: An Imperfect Fault Coverage Model With Coverage of Irrelevant Components. IEEE Trans. Reliability 64(1): 320-332
  2. Fumio Machida, Jianwen Xiang, Kumiko Tadano, Shigeru Hosono:An Asset-Based Development Approach for Availability and Safety Analysis on a Flood Alert System.DSN Workshops 2015: 51-56
  3. Yoshiteru Nakamori, Fei Meng, Michitaka Kosaka, Jing Tian, Jianwen Xiang:Service Systems Development Based on a Knowledge Synthesis Methodology.QRS Companion 2015: 245-250
  4. Junwei Zhou, Kwok-Wo Wong, Yanchao Yang: Distributed arithmetic coding with interval swapping. Signal Processing 116: 29-37 (2015)
  5. J. Zhou, F. Liu, J. Chen, L-M. Cheng and Y. Yang, "Wave atoms based image authentication using Slepian-Wolf coding," The 2nd International Symposium on De-pendable Computing and Internet of Things, pp. 1–5, 2015.
  6. Dongdong Zhao, Wenjian Luo, Ran Liu and Lihua Yue. A Fine-grained Algorithm for Generating Hard-to-reverse Negative Databases. Proceedings of the 2015 International Workshop on Artificial Immune Systems (AIS-2015), July 17-18, 2015, Taormina, Italy, pp. 84-91
  7. Linli Wu, Wenjian Luo and Dongdong Zhao. SvdNPD: A Negative Data Publication Method Based on the Sensitive Value Distribution. Proceedings of the 2015 International Workshop on Artificial Immune Systems (AIS-2015), July 17-18, 2015, Taormina, Italy, pp. 98-106

  1. Jianwen Xiang, Fumio Machida, Kumiko Tadano, Shigeru Hosono: Is Cut Sequence Necessary in Dynamic Fault Trees?ISSRE Workshops 2014: 138-139
  2. .Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno:Analysis of Persistence of Relevance in Systems with Imperfect Fault Coverage.SAFECOMP 2014: 109-124
  3. Guodong Ye, Junwei Zhou: A block chaotic image encryption scheme based on self-adaptive modelling. Appl. Soft Comput. 22: 351-357 (2014)
  4. Q. Lin, K.-W. Wong, J. Zhou and L.-Y. Zhang , "A Comparative Study of Various Simultaneous Compression and Encryption Schemes Based on Chaotic Systems," International Symposium on Nonlinear Theory and its Applications, pp. 381–384, 2014.
  5. Yihui Lu, Wenjian Luo and Dongdong Zhao. Fast Searching Optimal Negative Surveys. Proceedings of the 2014 International Conference of Information and Network Security (ICINS 2014), November 14-16, 2014, Beijing, China, pp. 172-180
  6. Xuehai Du, Wenjian Luo and Dongdong Zhao. Negative Publication of Data. Immune Computation, 2(2): 1-14, December, 2014

  1. Kumiko Tadano, Jianwen Xiang, Fumio Machida, Yoshiharu Maeno: Identification of Smallest Unacceptable Combinations of Simultaneous Component Failures in Information Systems. IEICE Transactions 96-D(9): 1941-1951(2013)
  2. .Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno, Kazuo Yanoo: Coverage of Irrelevant Components in Systems with Imperfect Fault Coverage.IEICE Transactions 96-A(7): 1649-1652 (2013)
  3. Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno, Takashi Horikawa: Performability analysis of RAID10 versus RAID6.DSN 2013: 1-2
  4. Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno: Composing hierarchical stochastic model from SysML for system availability analysis.ISSRE 2013: 51-60
  5. Jianwen Xiang, Fumio Machida, Kumiko Tadano, Kazuo Yanoo, Wei Sun, Yoshiharu Maeno: A Static Analysis of Dynamic Fault Trees with Priority-AND Gates. LADC 2013: 58-67
  6. J. Zhou, K.-W. Wong and J. Chen, "Distributed Block Arithmetic Coding for Equiprobable Sources," IEEE Sensors Journal, 13(7): pp. 2750–2756, July 2013. (SCI, JCR: Q1)
  7. Dongdong Zhao, Wenjian Luo: A Study of the Private Set Intersection Protocol Based on Negative Databases. DASC 2013: 58-64
  8. Dongdong Zhao, Wenjian Luo: Real-Valued Negative Databases. ECAL 2013: 884-890